National Security On Internet - ME Version

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

Marketing Division Decision Group

NATIONAL SECURITY ON INTERNET

Whenever you judge between people, you should judge with justice.
S RAH AL-NIS': 58, QUR'AN

LESSONS
All are Losers Eventually
Military curfew Large scale of protest

Division of different ethic and religion groups

Violent riot

Elites and foreign investors flee

Ruin, poverty, hunger, business halt, more violent, unrest uprisings and civil wars in society

In her Revolution Betrayed, she said


But, as someone who led a peaceful revolution, I hope that their pride is tempered by pragmatism - because a change of regime is only the first step in establishing a democracy backed by the rule of law. Indeed, as my country, Ukraine, is now demonstrating, after revolutionary euphoria fades and normality returns, democratic revolutions can be betrayed and reversed.

YULIYA TYMOSHENKO, Former Prime Minister of Ukraine

DID IT HAPPEN ONLY IN DEVELOPING COUNTRIES?

Landon Riot in Aug. 2011 lasted for 6 days in London, Manchester, Liverpool, and other area in England, and damaged millions USD of loss Occupy Movement in New York, US in Sept. 2011 Large scale of civil protest in Israel in summer, 2011 And many others in the future

WHAT HAPPENING IN NOWADAYS SOCIETY


More Challenges More Risks More Opportunities

NEW CHALLENGES IN MODERN SOCIETY

More educated younger generation with less responsibility More influential information from mass media of cross-border satellite with less moral constraints More westernized living habits with less respect on tradition and heritage More popular mobile phones with cheaper rate More communication tools on Internet with less abiding by law

EMERGING RISKS

Higher unemployed rate Higher inflation rate on food supply More extreme religious elements Higher demanded bourgeois Sporadic corruptive bureaucracy Uneven wealth distribution

Instablized Society!!!

POTENTIAL OPPORTUNITIES

High acceptance for new social renovation More national capital for new large infrastructure More private investment on civil construction Balanced health facilities between rural and urban areas Higher literacy rate Lower death rate

Those need time and stable society!!!

TESTMONY FROM A TUNISIAN ACTIVIST

Since the uprising, people have been able to participate in the countrys 2011 October election, and that they now have freedom of speech. Yet nothing has been done to solve their most pressing problems of socio-economic marginalization.
FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVIST
from Aljazeera website, Dec. 2011

STABLE SOCIETY VS. NATIONAL PROGRESS

Asian value helps Asian countries develop their own countries with national dignity, culture value and social heritage for the past 30 years

Taiwan Singapore Korean Japan China

More advanced society give citizens more economic freedom and democratic right

VOICE FROM DEEP HEART OF AN IRAQI ARAB AFTER TEN YEAR TURMOIL
It means more bloodshed, and we are fed up with this. Look at people in the countries of the Arab Spring. They are fighting each other. Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq
News from Reuter, 16 Nov. 2011

RUMOR HAS IT THAT


Rumor is a pipe blown by surmises, jealousies, conjectures William Shakespeare Rumor is the biggest enemy in modern society

Disrupting

trust between government and citizens Utilized by ambitious politic, gang member, social movement or religious elements Causing social and economic disturbance Wide-spreading by SMS and Internet, which are hardly controlled

RUMOR SPREADING FASTING AND FASTING


By emerging mobile and social media, such as tweeter and black berry messenger, rumor can mobilize mob faster than you can image New studies on London Riots also prove it.

See Guardian Reports:


http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spreadrumours-riots http://www.guardian.co.uk/uk/2011/dec/07/bbm-rioterscommunication-method-choice

How rumor spreads is like this:


http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riotstwitter

CYBER WARS ON INTERNET

Some governments organize cyber army against online rumors from anti-government hackers
Syrian

government organizes electronic army against online social media and foreign propaganda Chinese government organizes network army to disturb and fight with cyber dissidents

Its only a suppressing tool instead of information collection way, and works little effective!

RUMOR CONTROL AND CRISIS MANAGEMENT Frequent news announcement through mass media Monitoring

SMS Internet
twitter

Content

Facebook

Lawsuit against rumor spreaders

Mike Smith Las Vegas Sun, Feb 1, 2011

INFLUENCE ON INTERNET IN MEAZR

Wael Ghonim, Google Regional Marketing Executive in Dubai, UAE He created We are all Khaled Said page in Facebook to spark protest movement against and overthrow President Hosni Mubarak of Egypt in 2011

INFLUENCE BY INTERNET IN UK

Riots from Tottenham on 6 August 2011 lasted for 5 days, and spread from London cross Liverpool, Manchester Millions of GBP and several lives lost within few days Mob were mobilized by social media, SMS and other online services

INFLUENCE BY INTERNET IN US

Occupy Movement started in New York in mid-Sept 2011, and spread over hundreds of cities in the world Protest major on jobless and wealth disparity Participants are mobilized by online social media and SMS

ADVANCEMENTS IN COMMUNICATIONS TECHNOLOGIES HAVE BROUGHT ABOUT FUNDAMENTAL CHANGES TO SOCIETY. MARGINALIZED SECTORS OF THE POPULATION HAVE NOW FOUND A VOICE ON THE INTERNET AND THROUGH SOCIAL NETWORKING SERVICES. SATELLITE COMMUNICATIONS HAVE MADE GLOBAL NEWS COVERAGE INSTANTANEOUS AND IN THE REACH OF HUNDREDS OF MILLIONS.

Sheikh Salman al-Oadah, Saudi Arabia

THE POLICIES AND STRATEGIES

Find a proper lawful interception for Internet surveillance and deploy it in major ISPs Develop an evaluation matrix to analyze rumors and threats for potential exposure and threats Develop full set of strategy and network to keep National Security Officers informed on a daily basis of all threats and responses Prepare a crisis management plan that includes Internet attacks and rumors

SURVEILLANCE ON INTERNET
Target on rumors of social network and instant message on Internet under country LI law Keep on tracking the sender and routes Instant alarms on keywords, target suspects, and groups Block or filter extreme comments on Internet Good data retention management utility Highly confidential operation with capability on more protocols and encryption ways

DG E-DETECTIVE
Effective Internet Activity Monitor
Solution for Government and Interior Security Force: Internet Activities Monitoring Sensitive words, suspects and groups monitoring and alarm Data Retention and Archiving

Decision Group E-Detective Tactic System

MAJOR FEATURES

Real-time Internet Interception, monitoring system that captures, decodes and reconstructs various types of internet traffic Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA, GLBA, ETSI, CALEA, ISO 27001etc Full text search (search by key words with boolean support), conditional search, similar search and association with relationship search Alert and notification (throughput, conditional and key words alert) functions for user behavior analysis IP tracking on outbound and inbound messages Open ODBC Interface with report system (Crystal Report) or data mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)

USER BEHAVIOR

Summary screen on service type, frequency/quantity, throughput/volume Daily report on data volume in different time slot Internet content usage information collection Prevention of dispute between customers and banks by proofing it with captured records All data can be retrieved by 3rd party solutions, such as Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, for further analysis

BEHAVIOR REPORT

Data volume used by different service or application Quantity or frequency The type of services or applications subscribers use

Decision Group

USAGE REPORT
Usage by Time Slot

Usage by User

Decision Group

WEBPAGE CONTENT COLLECTION

Whois function provides you the actual URL Link IP Address

HTTP Web Page content can be reconstructed

TRANSACTION RECORD BY EMAIL

INSTANT MESSAGE MONITOR

Instant Messaging Monitor


Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC Friend List data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system

Open Interface for Text Mining System


IM -YAHOO, MSN, ICQ, IRC, QQ, GTALK ETC

Conversation
Friend List

SOCIAL NETWORK MONITOR

Social Network Monitor


Facebook, twitter, Plurk, Orkutetc Friend list data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system

Open Interface for Text Mining System


Facebook, Plurk, Orkutetc

Content of Facebook, friend list and attached files

Twitter

Content of twitter, time, and each participantetc

SEARCH FULL TEXT, CONDITION, ASSOCIATION


Complete Search Full Text Search, Conditional Search, Similar Search and Association Search

Conditional Search
Full Text Search Association Search

ALERT AND NOTIFICATION ALERT WITH CONTENT

Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. Throughput alert function also available!

CENTRALIZED MANAGEMENT SYSTEM


Complete Solution for Distributed Network Surveillance
Deployment with: Central Access Management for all Users on Intercepted Data with Different Authentication in Distributed Environment Remote System Management on Multiple ED, ED2S, ED/LEMF and WDEX through Secured Connection Remote System and Data Management on Data Retention Management System through Secured Connection Separate Processes of Data Collection, Decoding, User Access, and Data Management in Order to Fulfill State Mandates

Suitable for Deployment in Network Service Providers, Global Enterprises, and Law Enforcement Authority

OTHER FEATURES

Support 1.2 Gbps bandwidth throughput supported by single system Distributed deployment with central management system in data centers of head quarter and regional hub through Intranet Support +150 protocols or services Backup function allows user to backup the captured raw data files or reconstructed contents. Functions available are bookmark, captured file list (comparing the content of two files), online IP list, authority assignment, syslog server etc

ADVANTAGES

Take DG E-Detective for effective Internet activity surveillance Imperatives to manage abnormal communication on Internet Maintain national security on Internet Can be integrated with 3rd party text mining system against international terrorism groups Easy deployment and maintenance

Reference upon request

Thank you for your attention Q&A


http://www.edecision4u.com

You might also like