Cyberbit Ltd. 22 Zarhin St. P.O.B 690 Ra’anana 4310602, Israel Tel: 972-9-8864525, Fax: 972-9-8864556 sales@cyberbitc.com www.cyberbitc.com 6/2015 This brochure contains CYBERBIT proprietary information @ 2015 CYBERBIT Ltd and others PN 2505_ENG ?53 CYBERBIT Vii? PROTECTING A NEW DIMENSION GETTING THE RIGHT INSIGHTS TO THE RIGHT PEOPLE AT THE RIGHT TIME Solution for extracting valuable intelligence from remote Personal Computers CYBERBIT PC Surveillance System (PSS) is a comprehensive solution for monitoring and extracting information from remote PCs. The dramatic increase in packet data usage, the complexity of producing intelligence from the traffic and above all the abundance of encryption in use in IP traffic, impose great difficulties in producing valuable intelligence from intercepted traffic and hinder the Law Enforcement Agencies and intelligence organizations to stop their targets. This creates a need to actively operate in order to bypass encryption and extract the target information. CYBERBIT PSS helps LEAs and intelligence organizations to reduce crime, prevent terrorism and maintain public safety by gaining access, monitoring, extracting and analyzing information from remote PCs such as VoIP calls, files, emails, audio recordings, keylogs and virtually any information available on the target device, while bypassing encryptions and overcoming coverage boundaries. Key Benefits Covert Operation Bypass Encryption PSS employs multiple measures in order for the whole solution to stay undetected through the entire operational cycle - from deployment, through operation and communications with the Back End. This includes individually unidentified agents, anonymous transaction servers and covert control panels Most encryptions are used in order to transmit information safely. By accessing the information while stored on the device, most encryptions are irrelevant to the PSS solution. Moreover, even when information is stored on the device in an encrypted manner, PSS can combine between machine administrator capabilities and user capabilities in order to bypass the encryption. On Demand Extraction Unlike traditional COMINT, PSS acquisition does not depend on how, when and if our targets decide to transmit their information or make communications. PSS extracts information residing on the device on demand. Go Beyond Borders Acquiring information via PSS does not require cooperation from a certain Service Provider. Moreover, covering the regular communication channels is not necessary. PSS allows collection from the target device no matter where the device is in the world, and regardless of coverage limitations, providing the target is connected to the internet. operation, and allow customers to enjoy enhanced intelligence extraction while maintaining operational simplicity and security: In-House Turnkey Solution All system components are developed, integrated and tested end-to-end in the CYBERBIT labs. CYBERBIT experts are in charge of system deployment, Training and maintenance. Trigger Intelligence On top of extraction of existing intelligence, PSS allows customers to acquire information that wouldn’t have exist if the PSS was not in use. This may include microphone recordings, screenshots, and camera pictures. Flexible Extraction Schemes Technology Highlights Customer Configured Agents The world of active cyber acquisition poses many technical challenges and operational complexities. CYBERBIT PSS provides innovative technology and in-house tools that help simplify the The PSS system includes a unique ‘agent factory’, allowing CYBERBIT customers to generate their own agents according to the required configuration and deployment scheme. Customer operations PSS solution includes multiple extraction schemes for different operational uses. Intelligence extraction can be on-demand, scheduled, recurring or triggered based on the remote user’s action. Global Solution Provider CYBERBIT is a global industry leader and a trusted solution provider. Our accumulated experience and proven commitment to quality and customer satisfaction ensure that your technology investment is guaranteed. Extraction Capabilities remain confidential and known only to the operating customer. Enhanced Security Architecture PSS is created for LEAs and intelligence organizations by cyber-intelligence experts that understand the acute need for security and confidentiality. Each component in the system is designed according to these requirements, eliminating the possibility that the operation will be traced back to the origin. COMINT inter-operability PSS solution integrated with the other COMINT solutions available by CYBERBIT, which allows synergy between the extracted intelligence. Information gathered by other COMINT systems can increase agent deployment success rates, and the PSS agents can enable and enhance interception capabilities, in addition to completing the intelligence picture by supplying additional information.