Qosmos technology makes lawful comms interception a lot easier

Milipol - which takes place in Paris between 17 and 20 November - is where European spies and police officials with an interest in security technology meet and the ixMachine is extraordinarily interesting in this context.

Features of the ixMachine - which have been "optimised for the unique demands of lawful interception" users - include the ability to perform real-time network intelligence across "multiple applications, physical locations, terminals and web identities".

It's the web identities that are the most intriguing, as the eavesdropping unit uses a security function called a `Sessionizer' to correlate data flows into sessions, and sessions into applications, "targeting individuals across all their digital identities".

Delving into the specifications of the deep-level packet instepction and analysis appliance reveals a single system that is capable of monitoring several hundred internet users' various network sessions, including instant messaging, internet telephony, email and, of course, regular voice communications made using PSTN or cellular connections.

The eavesdropping unit is billed as interconnecting with existing mediation devices and management devices - which translates to eavesdropping systems used by law enforcement officials - and uses what Qosmos calls "standards-compliant probes" to perform the interfacing.

In use, the ixMachine LI edition is said to recognise more than 300 internet protocols and their variants - and the hundreds of applications that use them - and extracts more than 4000 types of metadata.

"The ability to capture granular details among so many attributes in real time, combined with the ability to analyse patterns in massive sets of data from a holistic point of view, provides a powerful investigative tool for IP-based lawful interception applications", Qosmos said in a statement.

There was no word on how much this piece of eavesdropping hardware will set you back, but only governments and their agencies can purchase the system.

What’s hot on Infosecurity Magazine?