Difference between revisions of "QOSMOS"
(8 intermediate revisions by the same user not shown) | |||
Line 28: | Line 28: | ||
F: + 1-301-5288302 | F: + 1-301-5288302 | ||
+ | |||
+ | ==== Involved Persons ==== | ||
+ | |||
+ | * [[DUVAUCHELLE, JEAN-BAPTISTE]] | ||
=== Singapore === | === Singapore === | ||
Line 107: | Line 111: | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
|- | |- | ||
− | |22.01.2012||taz.de||[http://www.taz.de/Aus-Le-Monde-diplomatique/!85882/ Software für Diktatoren: Von Peking bis Damaskus spionieren Geheimdienstler das Netz aus. Das System "Deep Packet Inspection" (DPI) aus dem Hause der kalifornischen Firma Narus hilft dabei.]||[[LY]] [[SY]] [[AMESYS]] [[NARUS]] [[QOSMOS]] | + | |26.07.2012||reuters.com||[http://www.reuters.com/article/2012/07/26/syria-france-qosmos-idUSL6E8IQN9520120726 France investigates tech firm accused of aiding Syria]||[[QOSMOS]] / [[SY]] |
+ | |- | ||
+ | |22.01.2012||taz.de||[http://www.taz.de/Aus-Le-Monde-diplomatique/!85882/ Software für Diktatoren: Von Peking bis Damaskus spionieren Geheimdienstler das Netz aus. Das System "Deep Packet Inspection" (DPI) aus dem Hause der kalifornischen Firma Narus hilft dabei.]||[[CN]] [[LY]] [[SY]] [[AMESYS]] [[NARUS]] [[QOSMOS]] | ||
+ | |- | ||
+ | |00.01.2012||monde-diplomatique.fr||[http://www.monde-diplomatique.fr/2012/01/CHAMPAGNE/47183 Une technologie qui intéresse Etats et entreprises: Surveillance « profonde » sur Internet]||[[CN]] [[LY]] [[SY]] [[AMESYS]] [[NARUS]] [[QOSMOS]] | ||
|- | |- | ||
|04.11.2011||bloomberg.com||[http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html Syria Crackdown Gets Italy Firm’s Aid With U.S.-Europe Spy Gear]||[[SY]] [[AREA]] [[UTIMACO]] [[QOSMOS]] | |04.11.2011||bloomberg.com||[http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html Syria Crackdown Gets Italy Firm’s Aid With U.S.-Europe Spy Gear]||[[SY]] [[AREA]] [[UTIMACO]] [[QOSMOS]] | ||
|- | |- | ||
− | |01.10.2011||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/58_interception-at-100-gbps-and-more.html Interception at 100 Gbps and more (Presentation)]||QOSMOS COMINT | + | |01.10.2011||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/58_interception-at-100-gbps-and-more.html Interception at 100 Gbps and more (Presentation)]||[[QOSMOS]] COMINT |
|- | |- | ||
− | |01.10.2011||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/67_dealing-with-an-ever-changing-sea-of-application-protocols.html Dealing with an ever changing sea of application protocols (Presentation)]||QOSMOS DPI | + | |01.10.2011||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/67_dealing-with-an-ever-changing-sea-of-application-protocols.html Dealing with an ever changing sea of application protocols (Presentation)]||[[QOSMOS]] DPI |
|- | |- | ||
− | |01.10.2011||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/58_interception-at-100-gbps-and-more.html Interception at 100 Gbps and more (Presentation)]||QOSMOS COMINT | + | |01.10.2011||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/58_interception-at-100-gbps-and-more.html Interception at 100 Gbps and more (Presentation)]||[[QOSMOS]] COMINT |
|- | |- | ||
− | |01.06.2009||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/50_managing-virtual-identities-across-ip-networks.html Managing Virtual Identities Across IP Networks (Presentation)]||QOSMOS Identification | + | |01.06.2009||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/50_managing-virtual-identities-across-ip-networks.html Managing Virtual Identities Across IP Networks (Presentation)]||[[QOSMOS]] Identification |
|- | |- | ||
− | |01.10.2008||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/37_layer-7-identity-management-for-lawful-interception.html Layer 7 Identity Management for Lawful Interception (Presentation)]||LI | + | |01.10.2008||wikileaks.org||[http://www.wikileaks.org/spyfiles/docs/qosmos/37_layer-7-identity-management-for-lawful-interception.html Layer 7 Identity Management for Lawful Interception (Presentation)]||[[QOSMOS]] LI |
|- | |- | ||
|} | |} | ||
− | [[Category:FR]] [[Category: | + | [[Category:Vendors]] [[Category:FR]] [[Category:Deep Packet Inspection]] [[Category:Lawful Interception]] [[Category:US]] [[Category:SG]] |
Latest revision as of 08:06, 2 August 2018
Official Coordinates
Corporate Headquarters
Immeuble Le Cardinet
5, impasse Chalabre
75017 Paris – France
T : +33 1 78 09 14 40
F: +33 1 40 37 00 02
Other Offices
USA
Qosmos Inc.
Germantown,
MD 20874
T: + 1-301-5288301
F: + 1-301-5288302
Involved Persons
Singapore
Qosmos Pte Ltd.
7500A Beach Road
- 06-307 The Plaza
Singapore 199590
T: +65 6396 6401
People Involved
Executive Team
Supervisory Board
Products / Services
Lawful Interception (LI)
With the development of the Internet, criminals have started to use new communication means such as chats, blogs or Webmail and are even hijacking applications such as online gaming to hide communications. Law Enforcement Agencies (LEAs) therefore need ways to tap all Internet communications for their investigations.
Qosmos solution
Qosmos provides LEAs and Lawful Intercept system suppliers with a powerful solution to identify a target using multiple identifiers and intercept all its IP-based communications. Intercept is initiated when a trigger such as “user login = TARGET” is detected across several Web applications such as Skype or Webmail. When a target is identified, the entire IP traffic related to the corresponding IP address is intercepted.
Benefits
For LI suppliers
- Focus on core competence by outsourcing advanced protocol and application expertise to identify targets more accurately
- Improved time-to-market by embedding powerful target detection technology
For Law Enforcement Agencies
- Detect targets more accurately in the complex environment of IP communications
- Launch interception more rapidly and be sure to keep a full copy of all IP communications
Vendor Appearances
- Syria in 11/2011
Articles / Events / Situations