Intelligence Runs Deep in Intercepted PCAP Data

There is a lot of actionable intelligence hidden within the encrypted and unknown transactions of IP data.

Cleartext is only the tip of PCAP data comprising of

FTP, TELNET, SMTP, HTTP, POP3, IMAPv4, NETBIOS, SNMP, etc.

Majority of the PCAP Data is encrypted

such as communication over WhatsApp, Telegram, Line, Signal, Twitter, Facebook, and usage of TOR, VPN, etc.

Thousands of unknown communication channels

are used for chatting, audio/video calling, uploading & downloading content; which is missed by the conventional Deep Packet Inspection (DPI) tools.

Get 100% visibility into terabytes of PCAP Data in minutes

Now unleash intelligence from every actionable bit of PCAP data to uncover correlations, build a suspect’s profile and connect all the data points across cleartext data, encrypted data and unknown data transactions to reveal what is truly actionable such as

Messaging Events

Voice/Video Call Events

Social Media Activities

Devices Used

Locations Visited

Sensitive Images & Videos

Applications Used

Domains Accessed

Introducing

CARBON

Deep Packet Inspection meets Advanced Analytics and Automation

CARBON is an IP traffic analytics system designed for Federal & Law Enforcement Agencies.  It has a technically advanced DPI engine which has evolved over 20 years’ experience of decoding and analysing 100s of Gbps of real-time IP traffic.

It is built on an open architecture based intelligence delivery platform that helps Intelligence Analysts to automate most of their manual tasks to derive meaningful intelligence.

Deep Packet Inspection

Classifies 1000s of protocols and applications, extracts entities from cleartext content, performs metadata analysis and generates actionable intelligence.

Auto Extract Personally Identifiable Information

Extract names, email addresses, phone numbers, etc. from millions of reconstructed resources and identifies case relevant objects from images & videos.

People Network from Encrypted Messaging Services

Special analysis mechanism to get a complete picture of communication patterns and connections over encrypted messaging services.

Correlation with CDR & IPDR Data

Decoded internet data can be correlated with CDR and IPDR to help track details of a mobile call or message generated by a phone device and plotted over a timeline graph.

Ready to use Investigation Modules

Comes with a library of ready to use investigation modules that save hours of manual work for a technical investigator. These modules auto provide insights, identify connections and behavioural aspects of a person of interest.

Trusted by

Government and Law Enforcement Agencies across

APAC

Europe

GCC Countries

Oceania

USE-CASE

Multiple suspects and no way of knowing how are they collaborating over the internet?

One of the biggest challenges being faced by technical investigators involved in the lawful interception of IP data is knowing multiple suspects are collaborating over encrypted messaging applications such as Skype, WhatsApp, Facebook, Telegram and others but not finding a way to establish a clear pattern of communication of their internet activity over a period of time.

Request Case Study

Extract intelligence from PCAP data 20x better and faster

Technical investigators spend a lot of time making sense out of reconstructed data extracted from images, texts, videos, GPS leaks, virtual identities, device information and other relevant information all jumbled together. This causes not just a loss of precious time but also makes investigators lose vital information.

Request Case Study

See CARBON in Action

Want to find out how CARBON can transform the way you analyse intercepted PCAP data? Share your details and we will arrange for your 1 month free trial.