MetroPolitan Security

Friday, 24 April 2020 09:24

a word to the world

Monday, 22 March 2021 09:24
Thursday, 19 March 2020 09:28

Tracking possible COVID -19 infection and epidemic outbreak areas

The analysis of telephone records belonging to persons affected by pathologies such as the coronavirus (COVID-19) can pinpoint geographical areas of possible infection and outbreak of the disease.

A blueprint of potential investigative interest can be charted by linking all the cell towers connected to their phones and thus proceed with the appropriate health procedures to contain the epidemic.

The following figure describes a hypothetical scenario loaded with randomized data.

It displays an example of connections to cell towers and movements made by two telephone devices used by two separate subjects found to be affected by the virus. One is displayed in red and the other in green.

Note the areas of possible contact, where the cells displayed in red and those in green are close to each other, and the areas where the green subject moved on the map.



phonelog 1


      Figure 1: Example of the display of cell tower connection and movements for two separate users (RANDOMIZED DATA)


Information drawn from telephone records is based on hard and defined facts, not on the testimony of persons infected with the virus or people in contact with them: these depositions may be sketchy at best, influenced by an altered or self-protective state of mind, given the potential of hysteria typical of cases of viral outbreaks.

Worse of all, this type of investigation is time consuming when in fact time is not an option.

The use of this resource is therefore necessary in order to efficiently harness movements and meetings retroactively, and quickly optimize health procedures focused on searching for other potential infection zones and limiting the spread of a virus.


Once an area of interest has been traced out, an added and useful activity is defining the real coverage of the cell towers connected to the subject of an investigation.

There is a difference between what is assumed as being the area in which a cell tower operates and what in reality may be the real geographical coverage of that cell tower. This is critical when defining a red zone.

Performing coverage surveys with dedicated tools, called BTS Trackers, and verifying where cell towers actually are able to connect to mobile devices is critical in a well-performed investigation.

For instance, a tall glass building can completely affect a cell tower signal and possibly reflect coverage to another zone which should not be part of that tower’s theoretical coverage area. In this case the device will have no possibility of generating traffic in the theoretical area but be in contact with that cell tower somewhere else.

This means a person could have been in a different part of a city, in contact with other persons not contemplated by a less detailed investigation scenario.

As an example, in figure 2 the theoretical cell tower coverage is highlighted in blue, whereas the red points show the real coverage generated by the same cell as surveyed by a BTS tracker.

In these positions, the cell tower can accept calls made by the user of interest, even though theoretically there should not be a signal in those areas at all.

This careful and thorough analysis allows investigators to refine and expand an area of possible contamination, by understanding whether or not the cell tower connected to the user’s device covers, as an example, the inside of a public building and consequently verify the hypothesis that that person may have been there.


phonelog 2

       Figure 2: example of a cell tower’s theoretical coverage as opposed to its real coverage


Some background information of Call Detail Records analytics and BTS survey technology

A Call Detail Record is produced by service providers with information relative to calls and data traffic generated by landlines and cell phones: the device identification, transmission date, time, duration, completion status, source and destination number, amount of data transmitted or received, relative to a requested period.

For billing reasons, carriers store a phone’s activity, an incredible source of the highest level of inalterability compared to others. These data are normally used in digital investigations in criminal cases, for the resolution of the many types of crimes.

Integrating this knowledge with sound facts collected on how and where the cell tower infrastructure actually spreads its signal is the canvass on which an investigation can spot the movements and interactions of a person of interest not only in the digital environment but in the real world.

A wider view and use of this information, objective data that is automatically created when using mobile phones, can be highlighted as being an additional means to help those tasked with the responsibility of enhancing the national security of citizens around the world.


Metropolitan Security is a digital forensics company specialized in developing technology for the analysis of Call Detail Records and cell tower real coverage investigation.

The team cooperates with law enforcement agencies and digital experts committed to the examination of electronic devices and related data, providing them consultancy as well as support and training.

Phonelog is a software solution created from the imagination and desire of Nicola Chemello and Massimo Bastianon, two young IT engineers who in 2010 set out to create a system which would help investigative forensic data analysis: not a highlighter, a pen, and stacks of paper phone records, but a user-friendly, modern and efficient tool to save time and create strong forensic analysis.

The result is able to absorb, analyze and correlate data from different sources: call detail records, cell tower data, mobile extractions, GPS logs, and more. It simplifies the investigative task offering many ways to manage, organize and show visual results in a simple and efficient fashion.

Phonelog offers a variety of functions which range from map positioning to defining user habits and interactions with other entities.


BTS tracker is a hardware device designed to scan an area of interest and define its radio environment. It specifically searches for all the cell towers active in that area and logs their real coverage: this helps an investigator define and understand the how cell towers really perform and connect to mobile devices and have a deeper understanding of the digital environment that surrounds us and fine-tuning research and the mapping of a device’s movements.




Friday, 26 October 2018 09:00

MS specializes in providing security services for Oil and Gas companies, offering a variety of solutions to the Oil and Gas industry, enabling them to operate in high-risk areas. MS supports International Oil Companies with security advice and risk management solutions. Our expert team will provide you with:

• Risk assessments
• Operational plans, procedures and physical security infrastructure
• Emergency plans and response
• Medical services and Health & Safety management
• Demining expertise

Friday, 26 October 2018 08:59

Airport Security
Terrorism has been a problem for airlines and air travelers since the 1970s. Airports and airlines require a unique range of security measures, from protecting the restricted areas and the aircraft on the ground via a command and control center to advanced passenger profiling and CCTV monitoring of passengers and staff, conducting cabin security checks, ensuring cargo, airport and in-flight supplies are screened, right through to the protection of the flight deck and cabin crew stopovers. Whatever the requirements MS has the solution because your safety is our priority.

Port Security
MS covers all aspects of marine associated risk. We can provide you with a designed program for your specific maritime needs. Our maritime programs ensure effective communication strategies that provide a high level of security awareness throughout your facility. We have a cadre of operational leaders and training managers who are skilled in all aspects of maritime compliance such as:

1. Maritime Transportation Safety Act (MTSA)
2. International Ship and Port Security Code (ISPS)
3. Customs-Trade Partnership Against Terrorism (C-TPAT)
4. Safe Ports Act

Friday, 26 October 2018 08:52

Digital Forensics
MS is the global leader in forensic technology for mobile device examination, intelligent tool and CDR analysis, with offices in Europe and in the Lebanon, as well as a network of distributors across the globe. The company has been involved with mobile communications since 2017 and now has a dedicated department has singular focus on the forensic recovery of data from mobile devices and CDR analysis. Our tool software has been used by investigators to quickly and effectively retrieve information, such as pictures, SMS, call history, contact lists and intelligent kits and Call Data Record analyzer can import and analyze CDR/Tower CDR logs of any service provider and generates a comprehensive report of frequency statistics including service provider details and subscriber details (SDR) of CDR Numbers. 

Our tool/software is used by Police, Law Enforcement, Military, Government Intelligence Agencies and Forensic Laboratories in many countries worldwide to investigate crime, gather intelligence, investigate fraud and fight corruption. Our sole focus is a quality forensic solution that creates secure and trusted results for end users. The core business today produces world class products which have the capability to recover deleted data from mobile devices; smart-phones, mobile phones, 3G modems, GPS and Tablet devices and CDR Analysis is Smart Mobile Data Analysis Solutions for Call Records. Easy to trace calls record & reduce time consumption and provide results in short time by using CDR Analysis Software. Analyze call records, and get various types
of desired reports in few minutes. CDR Analysis Software used for investigation/forensic departments like police department, Special Crime Investigation Departments etc... 

Radio Planning and Network Optimization
MS provide turnkey services for any kind of network (2G /3G HSDPA/ WiMAX/ 4G/ WIFI/ Broadcast/ PMR/MW networks). Our module is being used by a large number of operators worldwide for all types of networks. Our module is based on sophisticated optimization techniques (automatic frequency planning and optimization of TRX allocation vs. interference conditions) and specific advanced features such as the allocation of frequency hopping parameters, intermodulation product, multi layers analysis, inter system interference, neighbor list, user-definable constraints. The capabilities of this module allow to perform successful automatic frequency plan even in worst situation in very dense urban area. MS have a long experience of this kind of optimization
and recently in west Europe operator chose MS’s mobile network optimization solution in order to perform the of their 2G/3G network (991 DCS and 2334 GSM cells with at least 4 TRX/cells, 5664 3G cells 2 carriers), in Africa operators choose MS for the GSM-R radio planning (ETCS and Non-ETCS): 7000 km railways. The propagation models used by our tool allow to perform coverage with high level of accuracy with or without our automatic digital map tuning module. The calibration stage can be done to improve the final result (if drive test measurement files are available).

Some examples of services provided by MS:
Optimizations via a set of ACP (Automatic cell planning) and Automatic Optimization tools allowing
operators to perform the following optimization:
- Antenna azimuth optimizing (in order to improve existing coverage according to specific target coverage)
- Antenna tilt optimizing (in order to improve existing coverage and/or reduce interference issues)
- Antenna model selection (in order to improve existing coverage and/or reduce interference issues)
- Antenna height optimizing (in order to improve existing coverage and/or reduce interference issues)
- Best equipment selection (Huawei, NSN, Ericsson...)
- New sites or sector adding with Before & After coverage plots
- Repeaters or new sites in order to resolve (outdoor/indoor) coverage or traffic issues

Fraud is a diverse and rapidly evolving challenge for mobile network operators today. MS Fraud Management (FM) is a reliable and scalable solution focused on a Software-as-a-Service (SaaS) Cloud model – providing networks with the peace of mind that their fraud solution will adapt to meet the changing environment. MS FM is quick to market and modular, without the heavy up-front infrastructure expense. MS FM includes the Gatekeeper Bypass Fraud Detection module (SIM-box Detection). MS FM additionally provides a host of standard fraud modules, including reports for International Revenue Share Fraud (IRSF), Premium Rate Services (PRS) Fraud, Subscription Fraud, Roaming Fraud, Dealer Fraud, Equipment Change Reports, High Usage Reports and more.

The MS Bypass Fraud Detection (Gatekeeper Solution) works to analyze traffic and data to detect multiple types of fraud. MS issues both Standard Reports (On-net, Off-net, Cells, Equipment, Refiling, Dealers, Summary & Details Reports, SIM Verification Report, Test Call report, etc.) as well as Other Reports (High Usage, Hot IMEI, Hot MSISDN Ranges, IMEI Change Report, etc.). We also produce other modules to manage fraud: interconnect, Dealer, PRS, Subscriber, Roaming, etc.

Bypass (SIM-box) Detection
MS’ Gatekeeper is a breakthrough software service for the detection of SIM-box GSM “bypass” termination devices. By utilizing a combination of traditional call record analysis with test call generation (TCG) and an innovative SIM verification module, the Gatekeeper solution can identify fraudulent bypass SIMs in a matter of hours – significant improvement over any competitive product on the market. The SIM-box Fraud Bypass Problem: SIM-boxes bypass international tolls by routing calls over the Internet
and through a local SIM, causing significant operator loss.

• Direct Gateway Revenue Loss: SIM-box calls bypass an operator’s international toll, typically causing $0.05 to $0.25 per subscriber of losses monthly.
• Indirect Network Costs: SIM-boxes also overload cell towers unnecessarily and provide low-quality routes for international terminations.

MS Experience with SIM-box Detection
MS has successfully deployed its Gatekeeper solution at multiple operators, encountering a variety of fraud strategies, where operators were losing millions of USD monthly. Rapid Initial Savings: MS projects typically save the GSM operator more than $1 million USD annually – savings that can be quickly demonstrated in the first month of the project. Ongoing Fraud Detection: Bypass Fraud will always return after shutdown, and MS Gatekeeper remains on watch to immediately shut down new fraud attempts within hours.

Gatekeeper SIM-box Detection Approach
More sophisticated SIM-box operators are now using SIM servers and multiple remote gateways to simulate movement, automate calls and SMSs between SIMs, fake IMEIs, and use very low profile calling patterns. CDR analysis alone is not enough to detect fraud!

MS 3-Steps Hybrid Approach
• CDR Pattern Analysis Engine – quickly catches 95% certainty of fraud
• SIM Verification – confirms to 99.9% by communicating with the SIM card U allows for the detection of low-profile SIM-box Fraud!
• Call Generation – enhances effectiveness of solution using test calls


Friday, 26 October 2018 08:48

1. Information and Communications Technology (ICT) Solution
Our highly qualified team can perform an analysis for any technological site and report a situation for the current structure, and finally advise or implement a better alternative or integrated solution. ETS provides ICT solutions for corporate and organizations for the Telecom, financial, healthcare, education, hospitality, and different other sectors:

Data: routing, switching, security, wireless, structured cabling
Voice: IP telephony, VoIP, unified communications, recording Integration
Video: conferencing, telepresence, IP TV, VOD/MOD, video walls
Computing: servers, storage, workstations, consoles, tablets, Ruggedized field products, right sized hardware, Virtualization, Cloud Services. 
Software: video analytics, command and control, network and infrastructure management


2. Cyber Security
As agencies and organizations become more reliant on modern technology, they also become more vulnerable to cyber-attacks such as Corporate Security Breaches, Fraud, Identity Theft, and others. Our cyber security solutions have been developed in response to the growing and persistent threats and malware used against critical infrastructures, industrial control systems, and smart cities using state-of-the-art Firewalls, Intrusion Prevention Systems, and Unified Threat Management.

3. Data Centers
The safe and reliable storage of data is fundamental requirement in the successful running of any organization. Databases, client records, and confidentiality depend upon systems that are secure and fast. METS provides highly secure data center design and infrastructure solutions according to international standards. They are climate controlled, and monitored and secured by world-class technologies.

4. Research and Development
The aim of research and development (R&D) is to improve the current technologies offered by an organization or to develop innovations that strengthen the organization’s position in the marketplace. The sector includes many companies that are dedicated research and development businesses that focus on particular fields or areas of work. For example, Metropolitan Security works in Security field, so the innovation scope should be around Defense Techs, and Security Techs. You will also find R&D divisions within many forward-looking, innovative engineering and technology organizations.

- Analyze and understand the positioning of the product, service or process.
- Translate functional needs into specifications.
- Design and develop the product, service or process.
- Set up the test and validation phases.
- Correct and improve the product, service or process.
- Support the production start-up and product launch.
- Gather business intelligence (patent, technology and competitive intelligence) to identify new scientific trends and conduct strategic planning.
- Participate in benchmarking and test competitive products to gain relevant information that can be applied to product specifications.
- Gather any legal documents, including laws, regulations and patents that are necessary for determining the project’s feasibility.


Friday, 26 October 2018 08:42

The safety and security industry includes equipment, solutions, and services used for public security, personal protection, residential security, industrial safety, corporate and infrastructure protection (e.g. access control, ID, and perimeter security), as well as various solutions and systems designed for law enforcement and defense agencies’ use.

Friday, 26 October 2018 08:39

At MS we recognize that there is risk in-built in everything we do. We believe risks can be eliminated through reliable application of sound management strategies, and that a ZERO loss workplace is achievable. We provide companies in oil & gas industry, factories, buildings and others with safety management and consulting services to promote and maintain an ethical workplace atmosphere that equally values health, safety, and environmental responsibility.

Our Health, Safety, and Environmental (HSE) consultants and specialists are equipped and available to address your company’s relevant challenges and concerns. The SMS team of safety specialists recognize that each company is unique. We review your company’s needs and customize the best HSE management solution to meet them.

In addition to worker safety and medical attention, job site security is a top priority. By protecting your employees and property, your day-to-day operations are made safer. We offer a full spectrum of security and monitoring solutions, including manned and video security, virtual guards, GPS-based fleet tracking and monitoring, and personnel monitoring. Whether offshore, on a construction site or at a refinery, MS provides peace of mind with wide-ranging security options.

Friday, 26 October 2018 08:36

Fire detection, alarm and firefighting solutions are also a main service under ETS Scope of work. MS offers a wide range of fire system solutions tailored to meet the demands of your business. Our monitoring, testing, inspection and maintenance services allow fire systems to operate at peak performance We will aid you in choosing the suitable fire protection system for your needs for simplicity, reliability, andease of maintenance.

Each of our proposed fire protection system is able to be customized and designed as per the required specifications to meet appropriate codes, time, and budgetary guidelines. Besides fire extinguishers, we provide automatic fire alarm system which is designed to detect the presence of fire by monitoring environmental changes associated with combustion.

Conventional or Analog addressable, our fire alarm systems are used to notify people to evacuate in the event of a fire or other emergency, to request such civil defense as fire brigades’ emergency services, and to send digital signals to associate systems interface to control the spread of fire and smoke.

Page 1 of 9