WOLE INTELLIGENCE INTELLIGENCE WITHOUT LIMIT Locate Monitor Intercept Jamming Executive Summary Wolf Intelligence, an Internationally recognized World?s First company in the Cyber warfare field, offers Remote Control Intelligence. They offer realistic and practical solutions to counter threats. Law enforcement agencies. intelligence agencies. governments. corporations and financial institutions throughout the world rely on Wolf Intelligence for their products. services, consultancy skills and intelligence solutions. Goa Purpose Wolf Intelligence purpose is to solve unsolved problems innovatively, while their mission is to be the premier innovator in intelligence, security, electronic protection and digital threat management in the world. Solution Wolf Intelligence has customers throughout the world in all major continents. Governments, law enforcement agencies, corporations, intelligence agencies and financial institutions have all grew to rely on Intelligence services for their customer cyber intelligence solutions and consultancy skills, products and services. Capathes A-Z solutions for Interception, Remote Monitoring, Consulting, Intelligence Locate Monitor Intercept Local 8: Remote Jamming (IP, Phone, Email, all Al Remote Control System for Systems Interception over Local 8: Remote Jamming Instant Messaging like (All operating systems supported) 1Wifi, GSM, LAN (DDOS) whatsapp, Skype, etc) . including Keylogger, File Access, Protocol supported - Any Protocol (HTTP, SS1 Sounds, HTTP BOT, etc SMS, etc To Deploy more than 22 Zero day - System (Phone, GSM, ZG, Exploits (file,server. url) VOIP, Websites) . Server Penetration 8: Hacking - Web, Database, HAS, etc Others: - Intelligence Surveillance . Information Intelligence Consulting - Anti Surveillance 8: Snooping Systems Information Security Management System - Consulting 3! Offensive Cyber Lab setup - 27'001 Audit 8: Implementation - Information Security Management System is ISO 27001 Changeis axiom is particularly true in warfare. There are no second chances in war, no moment to call time out, and you need to make only one mistake at the wrong moment to create defeat. The theater of action has shifted from traditional battlefields and nation-states as combatants to asymmetrical warfare with a multitude of actors. The new area of warfare that terrorists. rogue nations, and criminals are increasingly focusing on is cyber threats. Our Mission, Wolf Intelligence will be the premier innovator in offensive security, cyber intelligence, electronic protection, and digital threat management in the world Sector: Cyber Weapon Sub sector: PC Surveillance, Covert Interception, Lawful a Interception/VoIP Monitoring, Exploits, IP Traffic Analysis, Cellular Phone Wolf Intelligence, an internationally recognized leader in the Cyber warfare field, offers practical and realistic solutions to counter threats. With customers across the globe in all major continents, law enforcement at a agencies, governments, intelligence agencies, corporations, and financial institutions have come to rely on Wolf Intelligence for the skills, products, and services it offers. Wolf Intelligence has met with considerable fl fo yo . success in recent years, leading to large profits and the potential for future growth. In fact, the fields of cyber warfare and security will be a four trillion dollar market next year. This success has been the result of some of the services offered by Wolf Intelligence which include unparalleled support, innovative product mix, reliability even under Terrorism, Corruption, Drug traffic. smuggling, Child pornography, Many more adverse conditions, and cost effective solutions for today?s tough economic times. Please consider just a sample of what we have to offer. We provide Our Focus Areas Tra I I Rate is a key aspect of war innovative capabilities. . Remote Control Intelligence . . - Offensive Zero day Exploits Intelligence gathering, Intelligence . Advanced Solutions for - OTP, Biometric authentication - Ipv6 Attacks, SCADA attacks - VPN 8: UPS Proxy - Source Analysis?Locate 8: Match (Ip, cell, other multi factors) - Advanced Jamming 3: Crashing system for wifi, GPS, 36, GSM, Mobile apps, Emails, etc I3 rOj Ct - Next Generation Micro UAV - Fiber Optics Interception Technical surveillance, IT Exploitation - National Interception - Source Tracing (Email, Youtube, Skype, IP, etc) - Blackbox Penetration System (linux, unix, windows servers) - Covert VideofAudio Surveillance Devices - Live Video Streaming, Car Surveillance System 32Cyber warfare and largest growing defense and security field at the moment and in the future. Anyone with access to a laptop, enough time, and with the right skills can play havoc with a nation?s infrastructure, finances, electronics, and information. It is no longer enough to be defensive or reactionary in countering threats. Waiting for an attack that has the potential to cause real and long?lasting damage is the wrong course of action as the best defense is a good offense. Additionally, the continual emergence of new technologies and new threats from previously docile groups, and ever changing geo? political factors means that you simply can?t sit still. Customer Relations Our company is not in business to maximize profit; we are in business to fulfill a calling to exceed all of our customers" expectations, each and every time. If our customers are not happy and completely satisfied with us then we are not happy. This simple philosophy; put the customer first and exceed their expectations beyond what they want, is what has helped lead us to success. We have a dedication to providing quality products and service. clone right the first time, each and every time. In this type of a business failure, mistakes, or errors are simply not an option, and we do not expect our clients to ever have to deal with any of the above. Our commitment to customer concerns and relationships is foremost in our thoughts each and every moment. if we can ever be of service; please do not hesitate to contact us. I a 3 1 qgf?. >i?N Cr . gm ation Herc rity mm .- security is vital to your our.) a Ion succes;Wolf Intelligence .1 In: 9 and protect your data from ceivable theat. lin the range of pc surveillance, covert lintelligence gathering, trojan Interception, lVolP monitoring, exploit protection, IP traffic lanalysis, and cellular phone and ladvanced social network interception across lall platforms. Defense The government of your country has a duty to protect its citizens from terrorism, ever more sophisticated types of crime, fraud, and hacking. Unfortunately, criminals or terrorists only have to get lucky once, while the law enforcement and intelligence agencies must have a 100% success rate each and every time to prevent tragedy. This is where Wolf Intelligence comes in with its products and services that are exclusively sold only to governments. Wolf has been developing next generation artificial intelligence to fight terror. While not quite the work of science fiction just yet, a variety of affordable telecom, internet, audio, and communications solutions are available for police, intelligence, and telecommunications providers to intercept, monitor, and pinpoint suspicious communications traffic. To help make sense of the deluge of information. analysis and sorting systems are included. Once a threat has been located, the ability to track and locate it is the last step to help apprehend terrorists with this cutting edge system that Wolf offers. No matter what source, hardware, or application the target is using to communicate, Wolf will be able to defeat it. Wolf has a dedicated, professional team of programmers committed to new products. They are able to brainstorm, create, test, and implement any custom intelligence gathering software you may have a need for. From Solutions voice recognition software to remote spying via laptop cameras to cell phone tracking, to anything you may think of, we can do it all. Since systems and products are only as good as the people using them, an investment in training will pay off with quality results later on down the road. You can rest assured that Wolf will bring your team up to speed in record time and provide them with confidence. We provide trainings to help your people master the following skills; Intelligence gathering, Intelligence Analysis, Technical surveillance, and IT Exploitation. Military Applications Wolf security has expertise in assisting nation?s militaries in their unique role. Electronic Warfare is one of our specialties and considerable solutions are available for COMINT, ELINT, and SIGINT. We are able to successfully jam and crash Wifi, GPS. 36, GSM, mobile communications, and Internet. To help make this more effective we are developing the next generation of aerial drones to enable electronic warfare. In particular, electronic jammers have been developed to help defeat the threat of IED attacks and car bombings. These types of terrorist attacks wreaked havoc on American forces in Iraq for years, resulting in widespread casualties and loss of morale. The laying of radio-controlled explosives is difficult to prevent given the nature of low-intensity conflict. However, they can be countered with successful jamming of communications to prevent detonation. Intelligence Keeping abreast of what rival nations or organizations are up to is what allows you to be positioned for future growth or to take advantage of previously unknown opportunities. Often, attacks can be stopped if learned about ahead of time. As fringe groups and rogue nations further develop their technology law enforcement and intelligence services must stay one step ahead of them in the field of surveillance. Product Services We provide High-tech intelligence systems to Government agencies for Information extraction for actionable intelligence. 1. Remote Control Intelligence This is different from others because of its compatibility with all types of operating system which helps us take automated decisions on the basis of the type 05. Wolf intelligence works in the area of providing remote control intelligence software. It in itself is a complete solution with indefeatable features of invisibility, persistence (root level) for attacking, infecting and monitoring target computers and smart phones. Benefits Uniqueness Mass level interception is the utmost challenge for government agencies especially when it comes to messages. Our solutions? attack not on the channel but it woks on the level of provider or the level of initiation of message. It cannot be traced by any forensic application. It wont interference in the normal execution of the system. It wont appear neither in the task manager nor in the network connectivity. Anonymity It works on the idea of distributed server control (multiple hopes) which makes it safer as it cannot be run without from all hopes. We provide highest anonymity to our customers through features like VPN Jumping, Tunneling, Code Sign, Anti Reverse Enginerring Toolkits. Wolf?s Uniqueness Beyond our above factors that have pushed us to the apex of our industry. we offer the following unique features that make us stand out: - Artificial intelligence to improve speed, quality and reliability - Automation and less wrong decisions. - ell Module in one system - Technology Challenges for LEA - Maximum Deployment options - Highest Success Rate with untraceable features Securhy This service claims to provides full proof authorisation by its users through its biometric security like dynamic voice recognition, face recognition etc. Its level of security can be assessed from the fact that it can proceed to 12 stages of security on the basis of point of mismatch of the biometric features. After the accomplishment of its job, the software can be customised to self destruction by locking itself and not allowing its properties to be seen by anybody. It works on 5-6 parameters like Mac Address, System Properties, OS installation Time, etc and makes its own unique hardware id which doesn?t allow to disassociate and access information of all its properties by reverse engineering process and thus diminishes the prospects of propping up of any consequences. Automation It can be modified into self ?automated by defining the tasks before. Deployment We have maximum Remote 8: Local Deployment options like Zero day exploits (file, server, URL), MITM Injection, Router Proxy, and many more. Remote Control (Wolf Intelligence) Automated Silent Remote Location Module for Target IP, Browser, OS Automated Decision Making Module to Monitor Target According to output (OS, Browser) Multi OS Payload (BOT, RAT) File Based URL Based Server Based Interce tion Exploits Exploits Exploits Web Server IIS, MS Office DOC Browsers Apache Zero Day Zero day Sendmail, Dmail, WIFI Adobe PDF Cpanel, Router GSM CHM 50+ Custom Mobile HTML Templates Exploitation 2. Global Location Tracking The Advanced Location Tracking and Mobile Information 3: Deception System provide the capability to locate and report the location of a specific mobile phone device anywhere in the world, if within the range ofthe nearest antennae. The system, in addition to locating single targets or groups of targets across the mobile operator network, also displays their respective location and movement history in both graphical and textual form. The System is comprised of a suite of powerful tools, such as GSMIGPS geofencing, SMS spoofing, MSISDN jamming and others, to provide a unique strategic solution for collecting, analyzing and presenting the mobile users location and sequential movement. Global Interception Systems GSM Passive Interception The CROSS system is wideband Monitoring and Interception System designed to monitor cellular communication systems of the EGSM-QOO, GEM-850, and PCS-1900 types intercepting, displaying the information in real time as well as saving it for future analysis. Wifi Interception Wolf Shadow is a Tactical Mobile System that Intercept Wi Fi and Wired Data transmission over TCPIIP network. The System enables the operator to place the Application in MITM (Man in the Middle) mode and by redirecting all the network communication through out the system, intercept logs and manipulate the transferred data over the network. The White Shadow is appointed to Law forces and with User Friendly manual it required basis Network Knowledge in order to be fully operated. It was built for field agents who don't necessarily have IT qualifications. Information Security Training Special Advanced Training on: Ethical Hacking 3: Cyber war Training, SCADA Defense Expert, OSINT Expert, Forensic Expert, Reverse Engineering Expert, Exploit Writing Expert. Lan Interception CYBEREYE (Tactical LAN Intercepting System) CYBEREYE is a Tactical LAN interception, monitoring 8: forensics system that captures, decodes and reconstructs various types of Internet traffic in Mid Large scale Enterprise Networks. It is used for organization Internet behavioral monitoring, auditing, record keeping, forensics analysis, and investigation, for lawful enforcement agencies such as Police Intelligence, Military Intelligence, Cyber Security Departments, National Security Agencies, Criminal Investigation Agencies, and Counter Terrorism Agencies etc. ,3 Our solutions are sold to government agencies only 5. Special Hardwares Wolf Anti?Tracing Anti? Tapping Secure Phone GSM Interceptor Proximity Alert - Call Interception Alert - Dynamic IMEI - A5 Change Alert (NofChange Alert} - LlnPing (Localization Alert) - Channel Lock (ARFCN Lock) - Show TMSI - Clear Call Log - Voice Call Recording - Hunting Mode High Power Handheld Signal Jammer Police, Bomb disposal squads, VIP protection, Special Police (S.W.A.T), military security forces, bomb squads, anti-terror units, anti- drug units. Border control units. checkpoint personnel, Meeting room, Hospitals, Banks, Conference Rooms, Classrooms and so on, such types of law enforcement personnel who benefit greatly from the deployment of any state in the art portable RF jamming solutions, who can conduct the law enforcement process more effectively to reduce the chance that the criminals leak the information. . . .. - a av 1 . . 54. -.-- 1 I I I Wolf Intelligence Ltd. Head Quarter: MENA: FEM): Hanau, Germany Bur Dubai, Dubai Zug SWItzerland 0 +44 20 3514 5480 United Arab Emirates Sales: 0 +44 20 8242 4859 UK, USA a. UAE For more information, please send us an email at 9 a Support 0 Investors 0 Media media@wolfintelligencecom ntelligence.com Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Wolf Intelligence is strictly prohibited. By providing this document. Wolf Intelligence is not making any representation regrading the correctness or completeness or its contents and reserve the right to alter to this document at any time without notice. Features listed in this document are subjected to change. Please contact Wolf for current product features and specifications. 1:1 2015 Wolf Intelligence Ltd. All Rights Reserved Worldwide.