Professional Documents
Culture Documents
National Security On Internet - ME Version
National Security On Internet - ME Version
National Security On Internet - ME Version
Whenever you judge between people, you should judge with justice.
S RAH AL-NIS': 58, QUR'AN
LESSONS
All are Losers Eventually
Military curfew Large scale of protest
Violent riot
Ruin, poverty, hunger, business halt, more violent, unrest uprisings and civil wars in society
Landon Riot in Aug. 2011 lasted for 6 days in London, Manchester, Liverpool, and other area in England, and damaged millions USD of loss Occupy Movement in New York, US in Sept. 2011 Large scale of civil protest in Israel in summer, 2011 And many others in the future
More educated younger generation with less responsibility More influential information from mass media of cross-border satellite with less moral constraints More westernized living habits with less respect on tradition and heritage More popular mobile phones with cheaper rate More communication tools on Internet with less abiding by law
EMERGING RISKS
Higher unemployed rate Higher inflation rate on food supply More extreme religious elements Higher demanded bourgeois Sporadic corruptive bureaucracy Uneven wealth distribution
Instablized Society!!!
POTENTIAL OPPORTUNITIES
High acceptance for new social renovation More national capital for new large infrastructure More private investment on civil construction Balanced health facilities between rural and urban areas Higher literacy rate Lower death rate
Since the uprising, people have been able to participate in the countrys 2011 October election, and that they now have freedom of speech. Yet nothing has been done to solve their most pressing problems of socio-economic marginalization.
FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVIST
from Aljazeera website, Dec. 2011
Asian value helps Asian countries develop their own countries with national dignity, culture value and social heritage for the past 30 years
More advanced society give citizens more economic freedom and democratic right
VOICE FROM DEEP HEART OF AN IRAQI ARAB AFTER TEN YEAR TURMOIL
It means more bloodshed, and we are fed up with this. Look at people in the countries of the Arab Spring. They are fighting each other. Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq
News from Reuter, 16 Nov. 2011
Disrupting
trust between government and citizens Utilized by ambitious politic, gang member, social movement or religious elements Causing social and economic disturbance Wide-spreading by SMS and Internet, which are hardly controlled
Some governments organize cyber army against online rumors from anti-government hackers
Syrian
government organizes electronic army against online social media and foreign propaganda Chinese government organizes network army to disturb and fight with cyber dissidents
Its only a suppressing tool instead of information collection way, and works little effective!
RUMOR CONTROL AND CRISIS MANAGEMENT Frequent news announcement through mass media Monitoring
SMS Internet
twitter
Content
Wael Ghonim, Google Regional Marketing Executive in Dubai, UAE He created We are all Khaled Said page in Facebook to spark protest movement against and overthrow President Hosni Mubarak of Egypt in 2011
INFLUENCE BY INTERNET IN UK
Riots from Tottenham on 6 August 2011 lasted for 5 days, and spread from London cross Liverpool, Manchester Millions of GBP and several lives lost within few days Mob were mobilized by social media, SMS and other online services
INFLUENCE BY INTERNET IN US
Occupy Movement started in New York in mid-Sept 2011, and spread over hundreds of cities in the world Protest major on jobless and wealth disparity Participants are mobilized by online social media and SMS
ADVANCEMENTS IN COMMUNICATIONS TECHNOLOGIES HAVE BROUGHT ABOUT FUNDAMENTAL CHANGES TO SOCIETY. MARGINALIZED SECTORS OF THE POPULATION HAVE NOW FOUND A VOICE ON THE INTERNET AND THROUGH SOCIAL NETWORKING SERVICES. SATELLITE COMMUNICATIONS HAVE MADE GLOBAL NEWS COVERAGE INSTANTANEOUS AND IN THE REACH OF HUNDREDS OF MILLIONS.
Find a proper lawful interception for Internet surveillance and deploy it in major ISPs Develop an evaluation matrix to analyze rumors and threats for potential exposure and threats Develop full set of strategy and network to keep National Security Officers informed on a daily basis of all threats and responses Prepare a crisis management plan that includes Internet attacks and rumors
SURVEILLANCE ON INTERNET
Target on rumors of social network and instant message on Internet under country LI law Keep on tracking the sender and routes Instant alarms on keywords, target suspects, and groups Block or filter extreme comments on Internet Good data retention management utility Highly confidential operation with capability on more protocols and encryption ways
DG E-DETECTIVE
Effective Internet Activity Monitor
Solution for Government and Interior Security Force: Internet Activities Monitoring Sensitive words, suspects and groups monitoring and alarm Data Retention and Archiving
MAJOR FEATURES
Real-time Internet Interception, monitoring system that captures, decodes and reconstructs various types of internet traffic Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA, GLBA, ETSI, CALEA, ISO 27001etc Full text search (search by key words with boolean support), conditional search, similar search and association with relationship search Alert and notification (throughput, conditional and key words alert) functions for user behavior analysis IP tracking on outbound and inbound messages Open ODBC Interface with report system (Crystal Report) or data mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)
USER BEHAVIOR
Summary screen on service type, frequency/quantity, throughput/volume Daily report on data volume in different time slot Internet content usage information collection Prevention of dispute between customers and banks by proofing it with captured records All data can be retrieved by 3rd party solutions, such as Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, for further analysis
BEHAVIOR REPORT
Data volume used by different service or application Quantity or frequency The type of services or applications subscribers use
Decision Group
USAGE REPORT
Usage by Time Slot
Usage by User
Decision Group
Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC Friend List data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system
Conversation
Friend List
Facebook, twitter, Plurk, Orkutetc Friend list data reconstruction File attachment capture
Standard report format provided Open ODBC Interface with 3rd party Text Mining system
Conditional Search
Full Text Search Association Search
Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. Throughput alert function also available!
Suitable for Deployment in Network Service Providers, Global Enterprises, and Law Enforcement Authority
OTHER FEATURES
Support 1.2 Gbps bandwidth throughput supported by single system Distributed deployment with central management system in data centers of head quarter and regional hub through Intranet Support +150 protocols or services Backup function allows user to backup the captured raw data files or reconstructed contents. Functions available are bookmark, captured file list (comparing the content of two files), online IP list, authority assignment, syslog server etc
ADVANTAGES
Take DG E-Detective for effective Internet activity surveillance Imperatives to manage abnormal communication on Internet Maintain national security on Internet Can be integrated with 3rd party text mining system against international terrorism groups Easy deployment and maintenance