Professional Documents
Culture Documents
01 National Security On Internet
01 National Security On Internet
2011
LESSONS
All are Losers Eventually
Military curfew Large scale of protest
Ruin, poverty, hunger, business halt, more violent and unrest uprisings in society
Violent riot
EMERGING RISKS
Higher unemployed citizens Higher inflation rate on food supply More extreme religious elements Higher demanded bourgeois Sporadic corruptive bureaucracy Uneven wealth distribution
Instablized Society!!!
POTENTIAL OPPORTUNITIES
High acceptance for new social renovation More national capital for new large infrastructure More private investment on civil construction Balanced health facilities between rural and urban areas Higher literacy rate Lower death rate
Since the uprising, people have been able to participate in the countrys 2011 October election, and that they now have freedom of speech. Yet nothing has been done to solve their most pressing problems of socio-economic marginalization.
FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVIST
from Aljazeera website, Dec. 2011
Asian value helps Asian countries develop their own countries with national dignity, culture value and social heritage for the past 30 years
Taiwan Singapore
Korean
Japan China
More advanced society give citizens more economic freedom and democratic right
VOICE FROM DEEP HEART OF AN IRAQI ARAB AFTER TEN YEAR TURMOIL
It means more bloodshed, and we are fed up with this. Look at people in the countries of the Arab Spring. They are fighting each other. Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq
News from Reuter, 16 Nov. 2011
Disrupting trust between government and citizens Utilized by ambitious politic, gang member, social movement or religious elements Causing social and economic disturbance Wide-spreading by SMS and Internet, which are hardly controlled
RUMOR CONTROL AND CRISIS MANAGEMENT Frequent news announcement through mass media Monitoring
SMS Internet
twitter
Content
Wael Ghonim, Google Regional Marketing Executive in Dubai, UAE He created We are all Khaled Said page in Facebook to spark protest movement against and overthrow President Hosni Mubarak of Egypt in 2011
Riots from Tottenham on 6 August 2011 lasted for 5 days, and spread from London cross Liverpool, Manchester Millions of GBP and several lives lost within few days Mob were mobilized by social media, SMS and other online services
Occupy Movement started in New York in mid-Sept 2011, and spread over hundreds of cities in the world Protest major on jobless and wealth disparity Participants are mobilized by online social media and SMS
DG E-DETECTIVE
Effective Internet Activity Monitor
Solution for Government and Interior Security Force: Internet Activities Monitoring Sensitive words, suspects and groups monitoring and alarm Data Retention and Archiving
MAJOR FEATURES
Real-time Internet Interception, monitoring system that captures, decodes and reconstructs various types of internet traffic Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA, GLBA, ETSI, CALEA, ISO 27001etc Full text search (search by key words with boolean support), conditional search, similar search and association with relationship search Alert and notification (throughput, conditional and key words alert) functions for user behavior analysis IP tracking on outbound and inbound messages Open ODBC Interface with report system (Crystal Report) or data mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)
USER BEHAVIOR
Summary screen on service type, frequency/quantity, throughput/volume Daily report on data volume in different time slot Internet content usage information collection Prevention of dispute between customers and banks by proofing it with captured records All data can be retrieved by 3rd party solutions, such as Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, for further analysis
BEHAVIOR REPORT
Data volume used by different service or application Quantity or frequency The type of services or applications subscribers use
Decision Group
USAGE REPORT
Usage by Time Slot
Usage by User
Decision Group
Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC Friend List data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system
Conversation
Friend List
Facebook, twitter, Plurk, Orkutetc Friend list data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system
Conditional Search
Full Text Search Association Search
Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. Throughput alert function also available!
OTHER FEATURES
Support 1.2 Gbps bandwidth throughput supported by single system Distributed deployment with central management system in data centers of head quarter and regional hub through Intranet Support +150 protocols or services Backup function allows user to backup the captured raw data files or reconstructed contents. Functions available are bookmark, captured file list (comparing the content of two files), online IP list, authority assignment, syslog server etc
ADVANTAGES
Take DG E-Detective for effective Internet activity monitor Imperatives to manage abnormal communication on Internet Maintain national security on Internet Can be integrated with 3rd party text mining system against international terrorism groups Easy deployment and maintenance