Specifications
FIELDMARSHAL INTEGRATED SECURITY SERVICES
23
• Video mosaic in a « simple » PC
Best system to exchange video to many other stations
• More powerfull than FTP exchange system
• It takes 20min to exchange 20min video whatever the number of destination
Time
• The best way to exchange one video to many destination in the same time.
It costs only the time of the media, in opposite for FTP many users.
WORKSTATION M5 - Digital
forensics lab
Compact Digital Forensics Lab - Network and System Forensics
Collection. Data is identified, labeled, recorded and acquired from all of the
possible sources of relevant data, using procedures that preserve the integrity of
the data. Data should be collected in a timely manner to avoid the loss of dynamic
data, such as a list of current network connections, and the data collected in cell
phones, PDAs, and other battery-powered devices.
Examination. The data that is collected should be examined using a combination
of automated and manual methods to assess and extract data of particular
interest for the specific situation, while preserving the integrity of the data.
Analysis. The results of the examination should be analyzed, using well-
documented methods and techniques, to derive useful information that addresses
the questions that were the impetus for the collection and examination.
Reporting. The results of the analysis should be reported.
Items to be reported may include: a description of the actions employed; an
explanation of how tools and procedures were selected.
SYS-DOCU- INFORMATION
SYSTEM FOR FALSE AND
AUTHENTIC DOCUMENTS
The system provides support for the capturing and verification of identity
documents authenticity (passports, identity cards, driving license, VISA
documents, residence permits) and of suspected currencies.
Currently used in the main ports and airports areas of southern Italy, the system
is addressed to all the institutions , governmental or else, which require
verification of documents validity.
It allows to query and entry into a database, images and descriptions of safety
characteristics of various National and International documents, as well as
integrating database of pre-existing specimen.
It also offers the opportunity to file false documents, thereby providing a further
database of reference for the attempted forging.
!
Sdsr: Psychophysics analysis
system for interrogation
The LVA 6.50 provides the ultimate investigation focus tool for homeland
security, intelligence, military and law enforcement use.
LVA 6.50 is a security-level advanced voice analysis solution providing instant
truth verification, threat assessment, and emotion identification. LVA 6.50
analyzes voice samples in real-time to provide timely and reliable results for quick
and effective decision-making. LVA technology was designed specifically for
security, law-enforcement and multi-purpose intelligence use, and is available in
three different usage modes:
• Online Mode - Enables users to tailor their investigation questions in real-
time, allowing them to pursue leads discovered during the test itself.
• Offline Mode - Provides in-depth analysis of pre-recorded conversations.
• Investigation Mode - Uses a polygraph-like questionnaire and methodology
to quickly get to the facts.
LVA works with any spoken language - analyzing not "what" is being said,
but "how."
LVA 6.50
The security arena is routinely challenged by new types of threats, more
sophisticated criminal activity and more advanced sources of investigation data.
The need to identify harmful intentions and crime suspects coupled with the need
to differentiate between relevant and insignificant information is crucial for
success. With the ability to detect and measure a wide spectrum of emotions and
cognitive processes in real-time and/or offline, LVA 6.50 provides a critical edge.
)
!