Monday, December 20, 2010

The Target Eye Core Elements

The Target Eye Monitoring System was developed since 2000 till 2007. It is a unique system designed to be used by law enforcement agencies, to provide them a surveillance tool for computers. The infrastructure which was used, has the capabilities of collecting evidence and keeping them in a way that will be accepted by a court of law.


This system was developed using a Human Intelligence (Huminet) model, which is based on a Secret Agent, which is planted on the Target PC, given initial instructions, which are basically: what type of information to gather, and how and when to sent it to it's operators. You can then, dynamically change and add more instructions, on the fly, and entirely change the scope of the Secret Agent.

A Compiler software is used, as the “factory” of the Secret Agents created. Each Secret Agent is different than the others, which brings you an unlimited number of potential settings, and also provides tool for creating a Cover Story, to be built in as part of the Secret Agent Envelope.

Such Envelope could be ANY file, program or document, which can be packed using a large number of file formats.

Many presets can be used for different types of outgoing and incoming communication. For example, data can be collected internally (stored in a completely hidden set of files and folders), and sent in small packets on given times (such as every day at 03:00).



A Unique Hot Words mechanism, can be used to perform any given tasks as a result of a word or characters combination keyed in, regardless the application which is used.

But the most important characteristic, Target Eye Monitoring System has, is it's flexibility.

It can do whatever you ask it to do:

●         Download files and programs, and run or open them, dynamically as a request sent by it's operator.

●         Delete, install, uninstall, start or terminate programs, processes, documents and files.

●         It always ready to AutoUpdate itself, from any Generic or Specific updates placed on the server.

Encryption methods, Brute Force techniques, User Interface, can all be customized especially for any Law Enforcement customer.

©2000-2013 Michael Haephrati and Target Eye LTD
All materials contained on this site are protected by International copyright law and may not be used, reproduced, distributed, transmitted, displayed, published or broadcast without the prior written permission given by Michael Haephrati and Target Eye LTD. You may not alter or remove any trademark, copyright or other notice from copies of the content.

No comments:

Post a Comment