Miciowsky Group offers a wide range of Cyber Security solutions and services. Miciowsky Group provides a hollistic protection suitable for both enterprises and National cyber security centers.


Miciowsky Group provides full tactical and strategic interception capabilities in several methods such as: Active GSM Interception System Passive GSM Interception System 3G and 4G (LTE) Interception System IMSI Catcher WIFI Interception System iDEN Interception System Satellite Interception System HF Interception System - Coax Interception System.


Miciowsky Group provides cyber offensive capabilities for government and federal agencies to covertly gather information from elements of interest with systems such as: Trojan system for computers Trojan system for mobile devices Miciowsky Group’s capabilities provides our clients intelligence information regarding: Files Photos Calendar Web browsing Passwords E-mails Regular and VOIP calls Skype conversations and chats Contact list SMS and instant messages (whatsapp, line etc.) Hosting services (dropbox, google drive, icloud etc.) Target’s device details and system Info Locations (cell signal info, GPS info).


Location Miciowsky Group’s flag ship system in the location field is the GeoMatrix system, which provides law enforcement agencies the ability to locate, track and manipulate GSM/UMTS/3G/4G subscribers covertly virtually anywhere in the world. The GeoMatrix System provides the benefit from the combination of geographical intelligence and mobile phones location. In addition to the GeoMatrix system, location of suspected target could be gathered by IMSI Catcher, tactical interception system , IP data, social media check-in (provided from OSINT system for example), trojan horse for mobile phones, etc.


OSINT Miciowsky Group provides OSINT & WebINT comprehensive package. The outcomes of the systems is produced from publicly available information that is collected, stored and analyzed. Our OSINT capabilities include: Private crawlers Harvesting Virtual HUMINT Social media monitoring Blogs monitoring