01 national security on internet
TRANSCRIPT
-
7/30/2019 01 National Security on Internet
1/39
NATIONAL SECURITY ON INTERNET
Marketing Division
Decision Group
2012
-
7/30/2019 01 National Security on Internet
2/39
LESSONS
Violent riot
Large scale of protest
Elites and foreigninvestors flee
Division of different ethic
and religion groups
Military curfew
Ruin, poverty, hunger,business halt, more
violent and unrest
uprisings in society
All are LosersEventually
-
7/30/2019 01 National Security on Internet
3/39
YULIYA TYMOSHENKO, Former Prime Minister of Ukraine
But, as someone who led a peaceful revolution, I hope that their
pride is tempered by pragmatism - because a change of regime isonly the first step in establishing a democracy backed by the rule of
law. Indeed, as my country, Ukraine, is now demonstrating, after
revolutionary euphoria fades and normality returns, democratic
revolutions can be betrayed and reversed.
In her Revolution Betrayed, she said
-
7/30/2019 01 National Security on Internet
4/39
More Challenges More Risks More Opportunities
WHAT HAPPENING IN NOWADAYS SOCIETY
-
7/30/2019 01 National Security on Internet
5/39
NEW CHALLENGES IN MODERN SOCIETY
More educated younger generation with lessresponsibility
More influential information from mass media of
cross-border satellite with less moral constraints More westernized living habits with less respect on
tradition and heritage
More popular mobile phones with cheaper rate
More communication tools on Internet with less
abiding by law
-
7/30/2019 01 National Security on Internet
6/39
EMERGING RISKS
Higher unemployed rate Higher inflation rate on food supply
More extreme religious elements
Higher demanded bourgeois Sporadic corruptive bureaucracy
Uneven wealth distribution
Instablized Society!!!
-
7/30/2019 01 National Security on Internet
7/39
POTENTIAL OPPORTUNITIES
High acceptance for new social renovation More national capital for new large infrastructure
More private investment on civil construction
Balanced health facilities between rural and urban
areas Higher literacy rate
Lower death rate
Those need time and stable society!!!
-
7/30/2019 01 National Security on Internet
8/39
FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVISTfrom Aljazeera website, Dec. 2011
Since the uprising, people have been able to participate in thecountrys 2011 October election, and that they now havefreedom of speech. Yet nothing has been done to solve theirmost pressing problems of socio-economic marginalization.
TESTMONY FROM A
TUNISIAN
ACTIVIST
-
7/30/2019 01 National Security on Internet
9/39
STABLE SOCIETY VS. NATIONAL PROGRESS
Asian value helps Asian countries develop theirown countries with national dignity, culture
value and social heritage for the past 30 years
TaiwanSingapore
Korean
Japan
China
More advanced society give citizens more
economic freedom and democratic right
-
7/30/2019 01 National Security on Internet
10/39
VOICE FROM DEEP HEART OF AN IRAQI ARAB
AFTER TEN YEAR TURMOIL
It means more bloodshed, and we are fed up with this.
Look at people in the countries of the Arab Spring. They
are fighting each other.
Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq
News from Reuter, 16 Nov. 2011
-
7/30/2019 01 National Security on Internet
11/39
Tunisia
Economy 1.8% down
in 2011
Unemployment rate
2011 - 18% 2010 13%
Budget Deficit
2011 6% of GDP
2010 2.6% of GDP
CRUEL RESULTS AFTER REVOLUTION
Egypt Economy 0.8% down in
2011
Unemployment one million
Egyptian lost jobs in 2011
Budget Deficit up to 10% of
GDP in 2011
Foreign Investment
2011 US$ 500M
2010 US$ 6.4B
Foreign Reserve down to
US$ 15B in 2011
only enough for 3 month importbill
-
7/30/2019 01 National Security on Internet
12/39
Tunisia
Economy 1.8% down
in 2011
Unemployment rate
2011 - 18% 2010 13%
Budget Deficit
2011 6% of GDP
2010 2.6% of GDP
CRUEL RESULTS AFTER REVOLUTION
Egypt
Economy 0.8% down in
2011
Unemployment one million
Egyptian lost jobs in 2011
Budget Deficit up to 10% of
GDP in 2011
Foreign Investment
2011 US$ 500M
2010 US$ 6.4B
Foreign Reserve down to
US$ 15B in 2011
only enough for 3 month importbill
-
7/30/2019 01 National Security on Internet
13/39
4 THREATS TO NATIONAL SECURITY
Cyber Wars among States
It is not likely at this moment
Economic Espionage
Quite common in business
Cyber Crime
Very popular in the world now
Cyber Terrorism
Potential threats by extremist
-
7/30/2019 01 National Security on Internet
14/39
RUMOR HAS IT THAT
Rumor is a pipe blown by surmises, jealousies,conjectures - William Shakespeare
Rumor is the biggest enemy in modern society
Disrupting trust between government and citizens Utilized by ambitious politic, gang member, social movement
or religious elements
Causing social and economic disturbance
Wide-spreading by SMS and Internet, which are hardlycontrolled
-
7/30/2019 01 National Security on Internet
15/39
RUMOR SPREADING FASTER AND FASTER
By emerging mobile and social media, such astweeter and black berry messenger, rumor can
mobilize mob faster than you can image
New studies on London Riots also prove it. See Guardian Reports:
http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-
rumours-riots
http://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-
communication-method-choice
How rumor spreads is like this:http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-
twitter
http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riots -
7/30/2019 01 National Security on Internet
16/39
RUMOR CONTROL AND CRISIS MANAGEMENT
Frequent news announcement through mass
media
Monitoring
SMS
Internet Content
Facebook
twitter
Lawsuit against rumor spreaders
-
7/30/2019 01 National Security on Internet
17/39Mike Smith Las Vegas Sun, Feb 1, 2011
-
7/30/2019 01 National Security on Internet
18/39
POWERFUL INFLUENCE BY INTERNET IN ME
Wael Ghonim, GoogleRegional Marketing
Executive in Dubai, UAE
He created We are allKhaled Said page in
Facebook to spark
protest movement
against and overthrowPresident Hosni
Mubarak of Egypt in
2011
-
7/30/2019 01 National Security on Internet
19/39
POWERFUL INFLUENCE BY INTERNET IN UK
Riots from Tottenham on 6
August 2011 lasted for 5
days, and spread from
London cross Liverpool,
Manchester Millions of GBP and several
lives lost within few days
Mob were mobilized by
social media, SMS andother online services
-
7/30/2019 01 National Security on Internet
20/39
POWERFUL INFLUENCE BY INTERNET IN US
Occupy Movement
started in New York in
mid-Sept 2011, and
spread over hundreds ofcities in the world
Protest major on jobless
and wealth disparity
Participants are
mobilized by online
social media and SMS
-
7/30/2019 01 National Security on Internet
21/39
JOSEPH S. NYE,FORMER US ASSISTANT SECRETARY OF DEFENSE AND CHAIRMAN OF THE US
NATIONAL INTELLIGENCE COUNCIL
Mountains and oceans are hard to move, but portions ofcyberspace can be turned on and off by throwing a switch.
In his The Future of Power, he said
-
7/30/2019 01 National Security on Internet
22/39
MONITOR TOOL ON INTERNET
Target on rumors of social network and instantmessage on Internet under country LI law
Keep on tracking the sender and routes
Instant alarms on keywords, target suspects,and groups
Block or filter extreme comments on Internet
Good data retention management utility
Highly confidential operation with capability on
more protocols and encryption ways
-
7/30/2019 01 National Security on Internet
23/39
DG E-DETECTIVE
Solution for Government and Interior Security Force:
Internet Activities Monitoring
Sensitive words, suspects and groups monitoring and alarm
Data Retention and Archiving
Decision Group E-Detective Tactic System
Effective Internet Activity Monitor
-
7/30/2019 01 National Security on Internet
24/39
MAJOR FEATURES
Real-time Internet Interception, monitoring system that captures,
decodes and reconstructs various types of internet traffic
Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA,
GLBA, ETSI, CALEA, ISO 27001etc
Full text search (search by key words with boolean support), conditionalsearch, similar search and association with relationship search
Alert and notification (throughput, conditional and key words alert)
functions for user behavior analysis
IP tracking on outbound and inbound messages
Open ODBC Interface with report system (Crystal Report) or data
mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)
-
7/30/2019 01 National Security on Internet
25/39
USER BEHAVIOR
Summary screen on service type, frequency/quantity,
throughput/volume
Daily report on data volume in different time slot
Internet content usage information collection Prevention of dispute between customers and banks by
proofing it with captured records
All data can be retrieved by 3rd party solutions, such as
Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, forfurther analysis
-
7/30/2019 01 National Security on Internet
26/39
BEHAVIOR REPORT
Decision Group
The type of services or
applications subscribers
use
Quantity or frequency
Data volume used by
different service or
application
-
7/30/2019 01 National Security on Internet
27/39
USAGE REPORT
Decision Group
Usage by Time Slot
Usage by User
-
7/30/2019 01 National Security on Internet
28/39
WEBPAGE CONTENT COLLECTION
Whois function provides
you the actual URL Link IP
Address
HTTP Web Page content can be reconstructed
-
7/30/2019 01 National Security on Internet
29/39
TRANSACTION RECORD BY EMAIL
-
7/30/2019 01 National Security on Internet
30/39
INSTANT MESSAGE MONITOR
Instant Messaging Monitor
Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC
Friend List data reconstruction
File attachment capture Open Interface for Text Mining System
Standard report format provided
Open ODBC Interface with 3rd party Text Mining system
-
7/30/2019 01 National Security on Internet
31/39
IM -YAHOO, MSN, ICQ, IRC, QQ, GTALK ETC
Friend List
Conversation
-
7/30/2019 01 National Security on Internet
32/39
SOCIAL NETWORK MONITOR
Social Network Monitor
Facebook, twitter, Plurk, Orkutetc
Friend list data reconstruction
File attachment capture Open Interface for Text Mining System
Standard report format provided
Open ODBC Interface with 3rd party Text Mining system
-
7/30/2019 01 National Security on Internet
33/39
Content of Facebook,friend list and attachedfiles
Facebook, Plurk, Orkutetc
-
7/30/2019 01 National Security on Internet
34/39
Twitter
Content of twitter, time, and eachparticipantetc
-
7/30/2019 01 National Security on Internet
35/39
SEARCH FULL TEXT, CONDITION, ASSOCIATIONComplete Search Full Text Search, Conditional Search, Similar Search and
Association Search
Conditional SearchFull Text Search
Association Search
-
7/30/2019 01 National Security on Internet
36/39
ALERT AND NOTIFICATION ALERT WITH CONTENT
Alert configured from
different servicecategories and different
parameters such as key
word, account, IP etc.
Alert can be sent to
Administrator by Email
or SMS if SMS Gateway
is available.
Throughput alert function also available!
-
7/30/2019 01 National Security on Internet
37/39
OTHER FEATURES
Support 1.2 Gbps bandwidth throughput supported bysingle system
Distributed deployment with central managementsystem in data centers of head quarter and regionalhub through Intranet
Support +150 protocols or services Backup function allows user to backup the captured
raw data files or reconstructed contents.
Functions available are bookmark, captured file list
(comparing the content of two files), online IP list,authority assignment, syslogserver etc
-
7/30/2019 01 National Security on Internet
38/39
ADVANTAGES
Take DG E-Detective for effective Internet activitymonitor
Imperatives to manage abnormal communication onInternet
Maintain national security on Internet Can be integrated with 3rd party text mining system
against international terrorism groups
Easy deployment and maintenance
Reference upon request
-
7/30/2019 01 National Security on Internet
39/39
Thank you for your attentionQ & A
http://www.edecision4u.com