Quick Contact Links


The M1 is tailored toward specific needs in the areas of lawful intercept, network intelligence collection, and communications policy enforcement. It is a complete turnkey Lawful Intercept solution fully contained in a proprietary hardware/software platform. Offering the most affordable approach to CALEA and other lawful intercept requirements, the comprehensive system is designed for flexibility and can be enhanced to support several other applications related to network surveillance.

Key Advantages of the M1 Network Surveillance Platform:

•Allows for drop-in technical CALEA compliance
•Communicates directly with law enforcement using Safe Harbor standards
•Provides both IAP/Probe and Mediation functions
•Performs dialed digit extraction using multiple methods
•Records network traffic with intelligent ring buffering
•Surveils networks using deep packet inspection
•Enables carrier-class performance and stability
•Exceeds standard LI criteria selection capabilities
•Uses advanced firmware-update to support evolving LI standards
•Allows add-on applications to operate on separate physical interfaces

Value-Add Solution

Packet Forensics adds value and reduces costs and installation challenges by using a unified hardware/software solution. This approach eliminates the expense of traditional systems that require separate IAPs and mediation devices, and integrates these functions into one streamlined system. This approach also avoids back-haul of data from edge collection probes back inside the core to mediation and then out again to the LEA. Management and maintenance of the single device is also greatly simplified to save time and reduce steps to comply with time-critical intercept orders.

LI Specific to Court Orders

Unlike many competitive solutions, Packet Forensics' surveillance software goes beyond identifying voice traffic and gives it the special handling it deserves. Instead of delivering a data intercept containing voice, our solution uses the proper mediation methodology and delivery protocol to treat voice intercepts differently than data intercepts. This affords you the most specific form of compliance while doing the best job of upholding the privacy of your constituents.

Specs at a Glance

  • Feature Highlights
    Ethernet, IP & MPLS Probe
    Dialed Digit Extraction
    Integrated Mediation Server
  • Network Interfaces
    Up to 10x Gigabit Copper
    Up to 4x Gigabit SFP
    Up to 3x Bypass Domains
  • Storage Capacity
    8GB Internal SLC NAND
    B-Y-O-D via eSATA
    B-Y-O-D via USB
  • General Specs
    1U w/ Rack Rails
    OS in Flash Memory
    Serial or SSH Console CLI
    Redundant Power Supplies
    ... or 48VDC
    LCD Status Display
    High-performance Fans
  • Optional Features
    GUI for Windows/MacOS X
    Crypto Accelerator

Intercept Support

  • Targeting
    RADIUS Triggers
    DHCP Triggers
    Protocol Fields
    User-Defined Logic Chain
    Static Characteristics
  • Voice over Packet
    MGCP (partial)
  • Data Intercept
    Unaltered Frame Forwarding
    Short Term Storage (ATIS)
    Chunked PCap capture

Other Standards Support

  • Voice over Packet
    RFC 3261
    RFC 1889
    RFC 2833
    RFC 2198
    RFC 2327
    RFC 3077
    RFC 3924
    RFC 3378
    RFC 3031

  • * = Performance characteristics and published statistics are examples only and are dependent on operating environment and software policies.

Copyright © Packet Forensics, LLC • 4535 S. Lakeshore Drive, #4A • Tempe, AZ 85282 US

Terms & Conditions • Domestic US +1 (800) 807-6140 • International +1 (757) 320-2002 • Privacy Notice