You are on page 1of 27

Marketing Division

Decision Group
Feb. 2011

NATIONAL SECURITY ON INTERNET


LESSONS

All are Losers


Eventually…
Military curfew

Large scale of protest

Division of citizen
Ruin, poverty, hunger,
groups
business halt and more
violence

Violent riot Elites and foreign


investors flee
In her “Revolution Betrayed”, she said
But, as someone who led a peaceful revolution, I hope that their
pride is tempered by pragmatism - because a change of regime is
only the first step in establishing a democracy backed by the rule of
law. Indeed, as my country, Ukraine, is now demonstrating, after
revolutionary euphoria fades and normality returns, democratic
revolutions can be betrayed and reversed.

YULIYA TYMOSHENKO, Former Prime Minister of Ukraine


WHAT HAPPENING IN NOWADAYS SOCIETY

 More Challenges
 More Risks

 More Opportunities
NEW CHALLENGES IN MODERN SOCIETY
 More educated younger generation with less
responsibility
 More influential cross-border satellite mass
media with less moral constraints
 More westernized living habits with less respect
on tradition and heritage
 More popular mobile phones with cheaper rate

 More communication tools on Internet with less


abiding by law
EMERGING RISKS
• Higher unemployed citizens
• Higher inflation rate on food supply
• More extreme religious elements
• Higher demanded bourgeois
• Sporadic corruptive bureaucracy
• Uneven wealth distribution

Instablized Society!!!
POTENTIAL OPPORTUNITIES
• High acceptance for new social renovation
• More capital for new large infrastructure
• More civil investment on social construction
• Balanced health condition between rural and urban
areas
• Higher literacy rate
• Lower death rate

Those need time and stable society!!!


STABLE SOCIETY VS. NATIONAL PROGRESS

 Asian value helps Asian countries develop their


own countries with national dignity, culture
value and heritage for the past 50 years
 Taiwan

 Singapore

 Korean

 Japan

 More advanced society give citizens more


economic freedom and democratic right
RUMOR HAS IT…

 Rumor is the biggest enemy in modern society


 Disrupting trust between government and citizens
 Untilized by ambitious politic or religious elements

 Causing social and economic disturbance

 Wide-spreading by SMS and Internet, which are


hardly controlled
RUMOR CONTROL AND CRISIS MANAGEMENT

 Frequent news announcement through mass


media
 Monitoring
 SMS

 Internet Content
 Facebook

 twitter

 Lawsuit against rumor spreaders


Mike Smith – Las Vegas Sun, Feb 1, 2011
POWERFUL INFLUENCE ON INTERNET…

 Wael Ghonim, Google


Regional Marketing
Executive in Dubai, UAE
 He created “We are all
Khaled Said” page in
Facebook to spark
protest movement
against President Hosni
Mubarak in Egypt in Jan.
2011
MONITOR TOOL ON INTERNET
 Target on rumors of social network and instant
message on Internet under country LI law
 Keep on tracking the sender and routes

 Instant alarms on keywords, target suspects,


and groups
 Block or filter extreme comments on Internet

 Good data retention management utility

 Highly confidential operation with capability on


more protocols and encryption ways
DG E-DETECTIVE
Effective Internet Activity Monitor
Solution for Government and Interior Security Force:
 Internet Activities Monitoring

 Sensitive words, suspects and groups monitoring and alarm

 Data Retention and Archiving

Decision Group E-Detective Tactic System


MAJOR FEATURES
 Real-time Internet Interception, monitoring system that captures,
decodes and reconstructs various types of internet traffic
 Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA,
GLBA, ETSI, CALEA, ISO 27001…etc
 Full text search (search by key words with boolean support), conditional
search, similar search and association with relationship search
 Alert and notification (throughput, conditional and key words alert)
functions for user behavior analysis
 IP tracking on outbound and inbound messages
 Open ODBC Interface with report system (Crystal Report) or data
mining/warehouse (Oracle, SAP, SAS or Teradata)
USER BEHAVIOR
 Summary screen on service type, frequency/quantity,
throughput/volume
 Daily report on data volume in different time slot
 Internet content usage information collection
 Prevention of dispute between customers and banks by
proofing it with captured records
 All data can be retrieved by 3rd party solutions, such as
Crystal Report, Oracle, SAP, SAS, Teradata…etc, for further
analysis
BEHAVIOR REPORT

Data volume used by


different service or
application

Quantity or frequency
The type of services or
applications subscribers
use

Decision Group
USAGE REPORT

Usage by Time Slot

Usage by User

Decision Group
WEBPAGE CONTENT COLLECTION

Whois function provides


you the actual URL Link IP
Address

HTTP Web Page content can be reconstructed


TRANSACTION RECORD BY EMAIL
INSTANT MESSAGE MONITOR
 Instant Messaging Monitor
 Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC
 Friend List data reconstruction
 File attachment capture
 Open Interface for Text Mining System
 Standard report format provided
 Open ODBC Interface with 3rd party Text Mining system
IM -YAHOO, MSN, ICQ, IRC, QQ, GTALK ETC…

Conversation
Friend List
SEARCH – FULL TEXT, CONDITION, ASSOCIATION
Complete Search – Full Text Search, Conditional Search, Similar Search and
Association Search

Conditional Search
Full Text Search

Association Search
ALERT AND NOTIFICATION – ALERT WITH CONTENT

Alert configured from


different service
categories and different
parameters such as key
word, account, IP etc.

Alert can be sent to


Administrator by Email
or SMS if SMS Gateway
is available.
Throughput alert function also available!
OTHER FEATURES
• Support 1.2 Gbps bandwidth throughput supported by
single system
• Distributed deployment with central management
system in data centers of head quarter and regional
hub through Intranet
• Support +150 protocols or services
• Backup function allows user to backup the captured
raw data files or reconstructed contents.
• Functions available are bookmark, captured file list
(comparing the content of two files), online IP list,
authority assignment, syslog server … etc
ADVANTAGES
• Take DG E-Detective for effective Internet activity
monitor
• Imperatives to manage abnormal communication on
Internet
• Maintain national security on Internet
• Can be integrated with 3rd party text mining system
against international terrorism groups
• Easy deployment and maintenance

Reference upon request


Thank you for your attention
Q&A
http://www.edecision4u.com

You might also like