Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

Marketing Division Decision Group 2012

NATIONAL SECURITY ON INTERNET

LESSONS
All are Losers Eventually
Military curfew Large scale of protest

Division of different ethic and religion groups

Ruin, poverty, hunger, business halt, more violent and unrest uprisings in society

Violent riot

Elites and foreign investors flee

In her Revolution Betrayed, she said


But, as someone who led a peaceful revolution, I hope that their pride is tempered by pragmatism - because a change of regime is only the first step in establishing a democracy backed by the rule of law. Indeed, as my country, Ukraine, is now demonstrating, after revolutionary euphoria fades and normality returns, democratic revolutions can be betrayed and reversed.

YULIYA TYMOSHENKO, Former Prime Minister of Ukraine

WHAT HAPPENING IN NOWADAYS SOCIETY


More Challenges More Risks More Opportunities

NEW CHALLENGES IN MODERN SOCIETY

More educated younger generation with less responsibility More influential information from mass media of cross-border satellite with less moral constraints More westernized living habits with less respect on tradition and heritage More popular mobile phones with cheaper rate More communication tools on Internet with less abiding by law

EMERGING RISKS

Higher unemployed rate Higher inflation rate on food supply More extreme religious elements Higher demanded bourgeois Sporadic corruptive bureaucracy Uneven wealth distribution

Instablized Society!!!

POTENTIAL OPPORTUNITIES

High acceptance for new social renovation More national capital for new large infrastructure More private investment on civil construction Balanced health facilities between rural and urban areas Higher literacy rate Lower death rate

Those need time and stable society!!!

TESTMONY FROM A TUNISIAN ACTIVIST

Since the uprising, people have been able to participate in the countrys 2011 October election, and that they now have freedom of speech. Yet nothing has been done to solve their most pressing problems of socio-economic marginalization.
FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVIST
from Aljazeera website, Dec. 2011

STABLE SOCIETY VS. NATIONAL PROGRESS

Asian value helps Asian countries develop their own countries with national dignity, culture value and social heritage for the past 30 years
Taiwan Singapore

Korean
Japan China

More advanced society give citizens more economic freedom and democratic right

VOICE FROM DEEP HEART OF AN IRAQI ARAB AFTER TEN YEAR TURMOIL
It means more bloodshed, and we are fed up with this. Look at people in the countries of the Arab Spring. They are fighting each other. Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq
News from Reuter, 16 Nov. 2011

CRUEL RESULTS AFTER REVOLUTION

Egypt

Economy 0.8% down in 2011 Unemployment one million Egyptian lost jobs in 2011 Budget Deficit up to 10% of GDP in 2011 Foreign Investment

Tunisia Economy 1.8% down in 2011 Unemployment rate


2011

- 18% 2010 13%

Budget Deficit
2011

2011 US$ 500M 2010 US$ 6.4B

6% of GDP 2010 2.6% of GDP

Foreign Reserve down to US$ 15B in 2011

only enough for 3 month import bill

CRUEL RESULTS AFTER REVOLUTION

Egypt

Economy 0.8% down in 2011 Unemployment one million Egyptian lost jobs in 2011 Budget Deficit up to 10% of GDP in 2011 Foreign Investment

Tunisia Economy 1.8% down in 2011 Unemployment rate


2011

- 18% 2010 13%

Budget Deficit
2011

2011 US$ 500M 2010 US$ 6.4B

6% of GDP 2010 2.6% of GDP

Foreign Reserve down to US$ 15B in 2011

only enough for 3 month import bill

4 THREATS TO NATIONAL SECURITY

Cyber Wars among States


It

is not likely at this moment


common in business

Economic Espionage
Quite

Cyber Crime
Very

popular in the world now

Cyber Terrorism
Potential

threats by extremist

RUMOR HAS IT THAT

Rumor is a pipe blown by surmises, jealousies,


conjectures - William Shakespeare Rumor is the biggest enemy in modern society

Disrupting trust between government and citizens Utilized by ambitious politic, gang member, social movement or religious elements Causing social and economic disturbance Wide-spreading by SMS and Internet, which are hardly controlled

RUMOR SPREADING FASTER AND FASTER


By emerging mobile and social media, such as tweeter and black berry messenger, rumor can mobilize mob faster than you can image New studies on London Riots also prove it.

See Guardian Reports:


http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spreadrumours-riots http://www.guardian.co.uk/uk/2011/dec/07/bbm-rioterscommunication-method-choice

How rumor spreads is like this:


http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riotstwitter

RUMOR CONTROL AND CRISIS MANAGEMENT Frequent news announcement through mass media Monitoring

SMS Internet
twitter

Content

Facebook

Lawsuit against rumor spreaders

Mike Smith Las Vegas Sun, Feb 1, 2011

POWERFUL INFLUENCE BY INTERNET IN ME

Wael Ghonim, Google Regional Marketing Executive in Dubai, UAE He created We are all Khaled Said page in Facebook to spark protest movement against and overthrow President Hosni Mubarak of Egypt in 2011

POWERFUL INFLUENCE BY INTERNET IN UK

Riots from Tottenham on 6 August 2011 lasted for 5 days, and spread from London cross Liverpool, Manchester Millions of GBP and several lives lost within few days Mob were mobilized by social media, SMS and other online services

POWERFUL INFLUENCE BY INTERNET IN US

Occupy Movement started in New York in mid-Sept 2011, and spread over hundreds of cities in the world Protest major on jobless and wealth disparity Participants are mobilized by online social media and SMS

In his The Future of Power, he said

Mountains and oceans are hard to move, but portions of cyberspace can be turned on and off by throwing a switch.
JOSEPH S. NYE,
FORMER US ASSISTANT SECRETARY OF DEFENSE AND CHAIRMAN OF THE US NATIONAL INTELLIGENCE COUNCIL

MONITOR TOOL ON INTERNET


Target on rumors of social network and instant message on Internet under country LI law Keep on tracking the sender and routes Instant alarms on keywords, target suspects, and groups Block or filter extreme comments on Internet Good data retention management utility Highly confidential operation with capability on more protocols and encryption ways

DG E-DETECTIVE
Effective Internet Activity Monitor
Solution for Government and Interior Security Force: Internet Activities Monitoring Sensitive words, suspects and groups monitoring and alarm Data Retention and Archiving

Decision Group E-Detective Tactic System

MAJOR FEATURES

Real-time Internet Interception, monitoring system that captures, decodes and reconstructs various types of internet traffic Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA, GLBA, ETSI, CALEA, ISO 27001etc Full text search (search by key words with boolean support), conditional search, similar search and association with relationship search Alert and notification (throughput, conditional and key words alert) functions for user behavior analysis IP tracking on outbound and inbound messages Open ODBC Interface with report system (Crystal Report) or data mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)

USER BEHAVIOR

Summary screen on service type, frequency/quantity, throughput/volume Daily report on data volume in different time slot Internet content usage information collection Prevention of dispute between customers and banks by proofing it with captured records All data can be retrieved by 3rd party solutions, such as Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, for further analysis

BEHAVIOR REPORT

Data volume used by different service or application Quantity or frequency The type of services or applications subscribers use

Decision Group

USAGE REPORT
Usage by Time Slot

Usage by User

Decision Group

WEBPAGE CONTENT COLLECTION

Whois function provides you the actual URL Link IP Address

HTTP Web Page content can be reconstructed

TRANSACTION RECORD BY EMAIL

INSTANT MESSAGE MONITOR

Instant Messaging Monitor


Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC Friend List data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system

Open Interface for Text Mining System


IM -YAHOO, MSN, ICQ, IRC, QQ, GTALK ETC

Conversation
Friend List

SOCIAL NETWORK MONITOR

Social Network Monitor


Facebook, twitter, Plurk, Orkutetc Friend list data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system

Open Interface for Text Mining System


Facebook, Plurk, Orkutetc

Content of Facebook, friend list and attached files

Twitter

Content of twitter, time, and each participantetc

SEARCH FULL TEXT, CONDITION, ASSOCIATION


Complete Search Full Text Search, Conditional Search, Similar Search and Association Search

Conditional Search
Full Text Search Association Search

ALERT AND NOTIFICATION ALERT WITH CONTENT

Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. Throughput alert function also available!

OTHER FEATURES

Support 1.2 Gbps bandwidth throughput supported by single system Distributed deployment with central management system in data centers of head quarter and regional hub through Intranet Support +150 protocols or services Backup function allows user to backup the captured raw data files or reconstructed contents. Functions available are bookmark, captured file list (comparing the content of two files), online IP list, authority assignment, syslog server etc

ADVANTAGES

Take DG E-Detective for effective Internet activity monitor Imperatives to manage abnormal communication on Internet Maintain national security on Internet Can be integrated with 3rd party text mining system against international terrorism groups Easy deployment and maintenance

Reference upon request

Thank you for your attention Q&A


http://www.edecision4u.com

You might also like