Professional Documents
Culture Documents
01 National Security On Internet
01 National Security On Internet
LESSONS
All are Losers Eventually
Military curfew Large scale of protest
Ruin, poverty, hunger, business halt, more violent and unrest uprisings in society
Violent riot
More educated younger generation with less responsibility More influential information from mass media of cross-border satellite with less moral constraints More westernized living habits with less respect on tradition and heritage More popular mobile phones with cheaper rate More communication tools on Internet with less abiding by law
EMERGING RISKS
Higher unemployed rate Higher inflation rate on food supply More extreme religious elements Higher demanded bourgeois Sporadic corruptive bureaucracy Uneven wealth distribution
Instablized Society!!!
POTENTIAL OPPORTUNITIES
High acceptance for new social renovation More national capital for new large infrastructure More private investment on civil construction Balanced health facilities between rural and urban areas Higher literacy rate Lower death rate
Since the uprising, people have been able to participate in the countrys 2011 October election, and that they now have freedom of speech. Yet nothing has been done to solve their most pressing problems of socio-economic marginalization.
FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVIST
from Aljazeera website, Dec. 2011
Asian value helps Asian countries develop their own countries with national dignity, culture value and social heritage for the past 30 years
Taiwan Singapore
Korean
Japan China
More advanced society give citizens more economic freedom and democratic right
VOICE FROM DEEP HEART OF AN IRAQI ARAB AFTER TEN YEAR TURMOIL
It means more bloodshed, and we are fed up with this. Look at people in the countries of the Arab Spring. They are fighting each other. Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq
News from Reuter, 16 Nov. 2011
Egypt
Economy 0.8% down in 2011 Unemployment one million Egyptian lost jobs in 2011 Budget Deficit up to 10% of GDP in 2011 Foreign Investment
Budget Deficit
2011
Egypt
Economy 0.8% down in 2011 Unemployment one million Egyptian lost jobs in 2011 Budget Deficit up to 10% of GDP in 2011 Foreign Investment
Budget Deficit
2011
Economic Espionage
Quite
Cyber Crime
Very
Cyber Terrorism
Potential
threats by extremist
Disrupting trust between government and citizens Utilized by ambitious politic, gang member, social movement or religious elements Causing social and economic disturbance Wide-spreading by SMS and Internet, which are hardly controlled
RUMOR CONTROL AND CRISIS MANAGEMENT Frequent news announcement through mass media Monitoring
SMS Internet
twitter
Content
Wael Ghonim, Google Regional Marketing Executive in Dubai, UAE He created We are all Khaled Said page in Facebook to spark protest movement against and overthrow President Hosni Mubarak of Egypt in 2011
Riots from Tottenham on 6 August 2011 lasted for 5 days, and spread from London cross Liverpool, Manchester Millions of GBP and several lives lost within few days Mob were mobilized by social media, SMS and other online services
Occupy Movement started in New York in mid-Sept 2011, and spread over hundreds of cities in the world Protest major on jobless and wealth disparity Participants are mobilized by online social media and SMS
Mountains and oceans are hard to move, but portions of cyberspace can be turned on and off by throwing a switch.
JOSEPH S. NYE,
FORMER US ASSISTANT SECRETARY OF DEFENSE AND CHAIRMAN OF THE US NATIONAL INTELLIGENCE COUNCIL
DG E-DETECTIVE
Effective Internet Activity Monitor
Solution for Government and Interior Security Force: Internet Activities Monitoring Sensitive words, suspects and groups monitoring and alarm Data Retention and Archiving
MAJOR FEATURES
Real-time Internet Interception, monitoring system that captures, decodes and reconstructs various types of internet traffic Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA, GLBA, ETSI, CALEA, ISO 27001etc Full text search (search by key words with boolean support), conditional search, similar search and association with relationship search Alert and notification (throughput, conditional and key words alert) functions for user behavior analysis IP tracking on outbound and inbound messages Open ODBC Interface with report system (Crystal Report) or data mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)
USER BEHAVIOR
Summary screen on service type, frequency/quantity, throughput/volume Daily report on data volume in different time slot Internet content usage information collection Prevention of dispute between customers and banks by proofing it with captured records All data can be retrieved by 3rd party solutions, such as Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, for further analysis
BEHAVIOR REPORT
Data volume used by different service or application Quantity or frequency The type of services or applications subscribers use
Decision Group
USAGE REPORT
Usage by Time Slot
Usage by User
Decision Group
Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC Friend List data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system
Conversation
Friend List
Facebook, twitter, Plurk, Orkutetc Friend list data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system
Conditional Search
Full Text Search Association Search
Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. Throughput alert function also available!
OTHER FEATURES
Support 1.2 Gbps bandwidth throughput supported by single system Distributed deployment with central management system in data centers of head quarter and regional hub through Intranet Support +150 protocols or services Backup function allows user to backup the captured raw data files or reconstructed contents. Functions available are bookmark, captured file list (comparing the content of two files), online IP list, authority assignment, syslog server etc
ADVANTAGES
Take DG E-Detective for effective Internet activity monitor Imperatives to manage abnormal communication on Internet Maintain national security on Internet Can be integrated with 3rd party text mining system against international terrorism groups Easy deployment and maintenance