MABIT: Israeli System Intercepts Cloud Stored Data

In 2015, 83% of all Internet traffic worldwide is expected to run to and from mobile devices. This information is safeguarded and protected by sophisticated encryption mechanisms and processes designed to make sure that no-one gets access to our own data. For the most part, the key to this information is our username and password. There are additional, other, sophisticated cybersecurity methods.

The various types of software installed on most smartphones are based on a common operating system (iPhones on IOS, other smartphones on Android, RIM and so on). Each user installs his or her own favorite and required “Apps” – specific, dedicated, applications that provide certain functionality and utility (or game) features. Quite often, these Apps are only “reps” of the actual application, which resides in the cloud. For example “Gmail”, a free e-mail service offered by Google. Our account is somewhere in the world; our Gmail App interfaces with our account – sends and receives e-mails.

All those “bad guys” make use of this privacy haven in order to communicate between themselves worldwide, to train, plan and exchange information and data, all the way from how to build a bomb according to Al-Qaeda E-learning courses, to storing financial information and chain of contacts, such as drug lords.

There is a major technology gap in terms of the capabilities used for intercepting this kind of encrypted data on our smartphones. This technology, featuring the ability to intercept Apps and Cloud-based information for lawful interception goals – is new and fresh, truly the last word in the field.

A unique Israeli company called “MAGEN” (Hebrew for ‘Shield’), a start-up founded by young engineers and software programmers, all veterans of the IDF’s Intelligence Corps, has been applying their technical skills and operational know-how to develop “MABIT” (Hebrew for ‘Watching’), a tactical Apps and Cloud interception tool, which performs magic – no less.

A field agent barely has to walk inside a stadium or a restaurant – and this device starts collecting nearby information and data from the surrounding smartphones off the air. The data ranges from phone numbers, through user pictures, location history, browsing history and so on, to the “Holy Grail” – namely, the key to the ‘gates’ of the cloud storage. This is where the target’s username and password are stored, thereby enabling the agent to access different cloud based services (Gmail, Hotmail, Exchange, Dropbox, LinkedIn, Instagram, Facebook, YouTube and so on). These are applications and services we all use, and as far as we are aware, they are cyber-secure. The agent in our example gathers the data without the target noticing anything; the agent gains access to all classified and encrypted information without leaving so much as a trace – unless a trained professional examines the target’s platform later on. Then, an intelligence analyst will use all this data, along with additional material, to put together an intelligence picture of the target in particular and the whole surveillance in general.

Once all this data is gathered, different capabilities come into play. These range from Business Intelligence (BI) to Data Mining tools. The process involves analyzing, correlating and distinguishing the “signal from the noise” – using crawlers, semantics taxonomy analyzers, link analysis tools, un-structured to structured converters, meta-data extractors and many other intelligence-unique data mining tools. The key to these capabilities is achieving the data – a task, which the MABIT system enables.

i_HLS

 

« Denmark Plans $75 Million For Cyber Control
Data Breaches in Europe »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Acuity RM Group

Acuity RM Group

Acuity RM Group helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

OCM Business Systems

OCM Business Systems

OCM are experts in the safe, secure and responsible disposal of IT & EPoS assets.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

SeQure

SeQure

SeQure is a novel cybersecurity and data observability company that offers Fortune 100 and Governments a zero-trust service to continuously monitor large network environments.