Cisa Final

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 28

Strengthen IIT capability

Magnify big data processing


Amplify overall surveillance capability
Integration of Security Software and Hardware tools
Increase efficiency of counter terrorism operations
Foreign threat
1
Religious Fundamentalists 2
Political Rivals 3

Opportunists/
Government Threat Individual criminals 4

Cyber Crime 5

Terrorists 6
Local/ national underworld criminal gangs
7
What CIL will do
Cyber Space Monitoring & Interception:
To keep track of data traffic used by target people
To generate lead to criminal case investigations
To predict intentions of target individuals
Stored internet data traffic analysis
What CIL will do
Social Media Engineering:
For surveillance of interpersonal communication,
For Pre-event analysis and Prediction of occurrence
For post event analysis and lead generation
To monitor public sentiment and public opinion
What CIL will do
Telecom Surveillance:
Creation of man pack mobile tracker
Surveillance of target mobile using IMSI catcher
What CIL will do
Audio/Video Surveillance:
Voice recognition and transcription
To detect movement of criminals in mass populated areas
To detect suspicious movement in mass gatherings, high value places
like airports or diplomatic areas etc.
A single intelligent computer
system equipped with
advanced software and
hardware technology for the
Peoples Republic of
Bangladesh.
Analog Research Auto
Research

Research Unit
Mainframe
Computer

School/college
CIL
university Collection of Mainframe
System

Train/ Bus

Immigration

NID/
passport

Social Banking
Phone call SMS Email driving license
media
ANPR
FACE RECOGNITION
HUMAN COMMUNICATION
OBJECT DETECTION
RLAY INFO Mathematicians

Computer Engineers

Linguistics
Analog Research Auto
Research

Research Unit
Mainframe
Computer

School/college
CIL
university Collection of Mainframe
System

Train/ Bus

Immigration

NID/
passport

Social Banking
Phone call SMS Email driving license
media
System Tools
Internet Traffic Monitoring
Internet Traffic Analyzer
Social Media Engineering
Individual Profiling
Face Recognition Software
Automated Number Plate Recognition
Optical Character Recognition (Bangla & English)

OTT Decryption
Trojan Virus
Web warfare agent
Spectrum Monitoring
IMSI Catcher
Man pack mobile tracker
IP Camera Interceptor
Internet Traffic Monitoring

Internet Data Capture Platform integration Preliminary grounding


Protocol Analysis Social media monitoring and Data collection
listening Data preparation
Net flow Analysis
Scheduling Data mining
Protocol Data Analysis Engagement Interpretation
Analytics Application
Collaboration Institutional decision
Content library and sources
Tool integration

Internet Traffic Social Media Individual


Analyzer Engineering Profiling
Internet Traffic Monitoring
Face Identification High accuracy of working Create PDF files for electronic
Access Control Capture cars moving with speeds archives.
Security Colored and B/W number plate The accuracy of the system is
recognition targeted above 90%.
Image database investigations
Supports any number plate letters OCR speed and support for multi-
General identity verification
Entrances & exists with calculation of core CPUs.
Surveillance occupancy Batch processing modes.
Export support to excel, pdf etc.
Integrated with existing IT platforms,
DB & infrastructures

Face Automated Optical


Recognition Number Plate Character
Software Recognition Recognition
OTT Decryption
Deleting data Prevent cyber-attacks
Blocking data against critical infrastructure
Modifying data Reduce national vulnerability
Copying data to cyber attacks
Disrupting the performance Minimize damage and
of computers or computer recovery time from cyber
networks attacks

Web warfare
Trojan Virus
agent
Spectrum Monitoring
Multi-bands and multicell (GSM and Can monitor 850/900/1800/1900 MHz Interception through HTTP
DCS) GSM network Intercepting IP cameras which are
Fast 2G/3G scanner Different parameters for target connected to LAN through physical
Target identification, target acquisition access.
localization, Integrated with 3G & 4G modules Brute force attack if a camera is not
SMS interception, SMS sending, connected to WPA2 encrypted network,
3G -> 2G switch,
mobile disabling,
interception of called numbers,

Man pack IP Camera


IMSI Catcher
Mobile Tracker Interceptor
Mosque
CCTV Camera LOCATION 1 Face Detection & ANPR
Access to ISP LOCATION 2 LOCAL COMMAND CENTER Crime Scene & Report
Individual Software Personnel Information
Household Data LOCATION 3

CENTRAL COMMAND REGIONAL COMMAND CENTER

Wi-Fi Interceptor
Face Detection Network Router
ANPR Limited Access to
Crime Scene Spectrum Monitoring
Crime Report Social Media
Personnel Information Monitoring Software
Gantt Chart: Computer Intelligence Lab
ISO WEEK NUM W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14 W15 W16 W17 W18 W19 W20 W21 W22 W23 W24 W25 W26 W27 W28 W29 W30 W31 W32 W33 W34 W35

MONTH July August September October November December January February

DAY 02 09 16 23 30 06 13 20 27 05 12 19 26 02 09 16 23 30 07 14 21 28 04 11 18 25 02 09 16 23 30 06 13 20 27
A Individual Profiling Development Testing Period Hardware
Social Media
B
Engineering
Development Testing Period Hardware
C Agent Based Trojan Development Testing Period Hardware
D IMSI Catcher Development
D1 Hardware acquisition D1 Testing Period Hardware
D2 Product Development D2
Face Recognition
E
Software
Development Testing Period Hardware
F OCR Development Testing Period Hardware
G IP Camera Interception Development Testing Period Hardware
H Internet Traffic Analyzer Development Testing Period Hardware
I Web Warfare Agent Development Testing Period Hardware
J OTT Decryption Development Testing period Hardware
Establishment of Main
K
Frame
Development Testing period Hardware
Integration of software &
L
Main Frame
Development Testing Period Hardware
M Project initiation Continued
Tentative Software Development Time (Task wise)
Task Required Time
Individual Profiling 3 Months
Social Media Engineering 3 Months
Trojan 3 Months
IMSI Catcher 3 Months
Face Recognition 3 Months
OCR 6 Months
IP Camera Interception 3 Months
Internet Traffic Analyzer 3 Months
Web warfare Agent 2 Months
OTT Decryption 5 Months
Financial Projection
Item Quantity Unit Price Total Price
Software
Internet Traffic monitoring 1 20,000,000 20,000,000
OTT Decryption 1 27,000,000 27,000,000
Spectrum Monitoring 1 16,000,000 16,000,000
Hardware
Mainframe computer 3 10,000,000 30,000,000
PC 4 176,000 704,000
Online UPS (40 KVA) with 1 hours backup 1 2,000,000 2,000,000
65 TV 4 200,000 800,000
48 TV 12 60,000 720,000
PC Monitor 20 10,000 200,000
Printer 2 42,000 84,000
Furniture
Small work table (18x36x30) 20 6,000 120,000
Monitoring table (24x108x30) 3 15,000 45,000
Financial Projection
Item Quantity Unit Price Total Price
Table for stationary & printer
1 12,000 12,000
(18x48x30)
Small revolving chair 36 4,000 144,000
Rack for hardware & instrument
2 16,000 32,000
(16x48x84)
Dress change locker (16x96x84) 1 24,000 24,000
Cabinet for belongings 1 16,000 16,000
Other Appliances
CCTV Camera with DVR 14 200,000
Air condition (24 ton) 24 35,000 840,000
Double Door Entry 200,000
Internal network solution 1,500,000
Internet connectivity 560,000
Payment Procedure
Advance payment : 40%

After month 3 : 30%

After completing : 30%


Human Resource (DGFI)

Designation No. of Employees Day Shift Night Shift

Hardware Engineer 1 1 -
Maintenance Engineer 3 2 1
Software Engineer 7 4 3
Software Operator 20 14 6
Clark 3 2 1
Human Resource (Celltron)

Designation No
Software & Hardware Engineer 40
Admin / Management 6
Data handling analyst 30
Recruitment

Application Screening
Preselection Process
Interview
Psychological Background Check
Personal Background Check
Physiological Check
Polygraph Test
Project Location

DGFI Celltron

All HOD Software Team (Individual


Software Integration Platform)
Hardware Integration Hardware Development
Internal Data Analyst Data Researcher
Administration & Supervision Machine Learning
Applications
Monitoring propaganda
Monitor public sentiment
Monitor public opinion
Monitor communication of black listed criminals
Cloud interception
Social media interception
Data mining
Predict criminal activities from data feeds from past criminal records and analyzing
their activity pattern using AI
Increase surveillance capability by using Spectrum Monitoring
Increase real-time surveillance capability at mass gatherings using new
technologies like automatic anomaly detection, face recognition etc.

You might also like