Marketing Division Decision Group Feb.

2011

NATIONAL SECURITY ON INTERNET

LESSONS
All are Losers Eventually…

Military curfew Large scale of protest Division of citizen groups

Ruin, poverty, hunger, business halt and more violence

Violent riot

Elites and foreign investors flee

But, as someone who led a peaceful revolution, I hope that their pride is tempered by pragmatism - because a change of regime is only the first step in establishing a democracy backed by the rule of law. Indeed, as my country, Ukraine, is now demonstrating, after revolutionary euphoria fades and normality returns, democratic revolutions can be betrayed and reversed. YULIYA TYMOSHENKO, Former Prime Minister of Ukraine

In her “Revolution Betrayed”, she said

WHAT HAPPENING IN NOWADAYS SOCIETY
More Challenges More Risks More Opportunities

NEW CHALLENGES IN MODERN SOCIETY
More educated younger generation with less responsibility More influential cross-border satellite mass media with less moral constraints More westernized living habits with less respect on tradition and heritage More popular mobile phones with cheaper rate More communication tools on Internet with less abiding by law

EMERGING RISKS
• • • • • •

Higher unemployed citizens Higher inflation rate on food supply More extreme religious elements Higher demanded bourgeois Sporadic corruptive bureaucracy Uneven wealth distribution

Instablized Society!!!

POTENTIAL OPPORTUNITIES
• • • • • •

High acceptance for new social renovation More capital for new large infrastructure More civil investment on social construction Balanced health condition between rural and urban areas Higher literacy rate Lower death rate

Those need time and stable society!!!

STABLE SOCIETY VS. NATIONAL PROGRESS
Asian value helps Asian countries develop their own countries with national dignity, culture value and heritage for the past 50 years
Taiwan Singapore Korean Japan

More advanced society give citizens more economic freedom and democratic right

RUMOR HAS IT…
Rumor is the biggest enemy in modern society
Disrupting trust between government and citizens Untilized by ambitious politic or religious elements Causing social and economic disturbance Wide-spreading by SMS and Internet, which are hardly controlled

RUMOR CONTROL AND CRISIS MANAGEMENT Frequent news announcement through mass media Monitoring
SMS Internet Content
Facebook twitter

Lawsuit against rumor spreaders

Mike Smith – Las Vegas Sun, Feb 1, 2011

POWERFUL INFLUENCE ON INTERNET…
Wael Ghonim, Google Regional Marketing Executive in Dubai, UAE He created “We are all Khaled Said” page in Facebook to spark protest movement against President Hosni Mubarak in Egypt in Jan. 2011

MONITOR TOOL ON INTERNET
Target on rumors of social network and instant message on Internet under country LI law Keep on tracking the sender and routes Instant alarms on keywords, target suspects, and groups Block or filter extreme comments on Internet Good data retention management utility Highly confidential operation with capability on more protocols and encryption ways

DG E-DETECTIVE

Effective Internet Activity Monitor

Solution for Government and Interior Security Force: Internet Activities Monitoring Sensitive words, suspects and groups monitoring and alarm Data Retention and Archiving Decision Group E-Detective Tactic System

MAJOR FEATURES
Real-time Internet Interception, monitoring system that captures, decodes and reconstructs various types of internet traffic Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA, GLBA, ETSI, CALEA, ISO 27001…etc Full text search (search by key words with boolean support), conditional search, similar search and association with relationship search Alert and notification (throughput, conditional and key words alert) functions for user behavior analysis IP tracking on outbound and inbound messages Open ODBC Interface with report system (Crystal Report) or data mining/warehouse (Oracle, SAP, SAS or Teradata)

USER BEHAVIOR
Summary screen on service type, frequency/quantity, throughput/volume Daily report on data volume in different time slot Internet content usage information collection Prevention of dispute between customers and banks by proofing it with captured records All data can be retrieved by 3rd party solutions, such as Crystal Report, Oracle, SAP, SAS, Teradata…etc, for further analysis

BEHAVIOR REPORT

Data volume used by different service or application Quantity or frequency

The type of services or applications subscribers use

Decision Group

USAGE REPORT
Usage by Time Slot

Usage by User

Decision Group

WEBPAGE CONTENT COLLECTION

Whois function provides you the actual URL Link IP Address

HTTP Web Page content can be reconstructed

TRANSACTION RECORD BY EMAIL

INSTANT MESSAGE MONITOR
Instant Messaging Monitor
Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC Friend List data reconstruction File attachment capture Standard report format provided Open ODBC Interface with 3rd party Text Mining system

Open Interface for Text Mining System

IM -YAHOO, MSN, ICQ, IRC, QQ, GTALK ETC…

Conversation Friend List

SEARCH – FULL TEXT, CONDITION, ASSOCIATION
Complete Search – Full Text Search, Conditional Search, Similar Search and Association Search

Conditional Search

Full Text Search Association Search

ALERT AND NOTIFICATION – ALERT WITH CONTENT

Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by Email or SMS if SMS Gateway is available. Throughput alert function also available!

OTHER FEATURES
• •

• •

Support 1.2 Gbps bandwidth throughput supported by single system Distributed deployment with central management system in data centers of head quarter and regional hub through Intranet Support +150 protocols or services Backup function allows user to backup the captured raw data files or reconstructed contents. Functions available are bookmark, captured file list (comparing the content of two files), online IP list, authority assignment, syslog server … etc

ADVANTAGES
• • • • •

Take DG E-Detective for effective Internet activity monitor Imperatives to manage abnormal communication on Internet Maintain national security on Internet Can be integrated with 3rd party text mining system against international terrorism groups Easy deployment and maintenance

Reference upon request

Thank you for your attention Q&A
http://www.edecision4u.com

Sign up to vote on this title
UsefulNot useful