01 National Security on Internet

download 01 National Security on Internet

of 39

Transcript of 01 National Security on Internet

  • 7/30/2019 01 National Security on Internet

    1/39

    NATIONAL SECURITY ON INTERNET

    Marketing Division

    Decision Group

    2012

  • 7/30/2019 01 National Security on Internet

    2/39

    LESSONS

    Violent riot

    Large scale of protest

    Elites and foreigninvestors flee

    Division of different ethic

    and religion groups

    Military curfew

    Ruin, poverty, hunger,business halt, more

    violent and unrest

    uprisings in society

    All are LosersEventually

  • 7/30/2019 01 National Security on Internet

    3/39

    YULIYA TYMOSHENKO, Former Prime Minister of Ukraine

    But, as someone who led a peaceful revolution, I hope that their

    pride is tempered by pragmatism - because a change of regime isonly the first step in establishing a democracy backed by the rule of

    law. Indeed, as my country, Ukraine, is now demonstrating, after

    revolutionary euphoria fades and normality returns, democratic

    revolutions can be betrayed and reversed.

    In her Revolution Betrayed, she said

  • 7/30/2019 01 National Security on Internet

    4/39

    More Challenges More Risks More Opportunities

    WHAT HAPPENING IN NOWADAYS SOCIETY

  • 7/30/2019 01 National Security on Internet

    5/39

    NEW CHALLENGES IN MODERN SOCIETY

    More educated younger generation with lessresponsibility

    More influential information from mass media of

    cross-border satellite with less moral constraints More westernized living habits with less respect on

    tradition and heritage

    More popular mobile phones with cheaper rate

    More communication tools on Internet with less

    abiding by law

  • 7/30/2019 01 National Security on Internet

    6/39

    EMERGING RISKS

    Higher unemployed rate Higher inflation rate on food supply

    More extreme religious elements

    Higher demanded bourgeois Sporadic corruptive bureaucracy

    Uneven wealth distribution

    Instablized Society!!!

  • 7/30/2019 01 National Security on Internet

    7/39

    POTENTIAL OPPORTUNITIES

    High acceptance for new social renovation More national capital for new large infrastructure

    More private investment on civil construction

    Balanced health facilities between rural and urban

    areas Higher literacy rate

    Lower death rate

    Those need time and stable society!!!

  • 7/30/2019 01 National Security on Internet

    8/39

    FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVISTfrom Aljazeera website, Dec. 2011

    Since the uprising, people have been able to participate in thecountrys 2011 October election, and that they now havefreedom of speech. Yet nothing has been done to solve theirmost pressing problems of socio-economic marginalization.

    TESTMONY FROM A

    TUNISIAN

    ACTIVIST

  • 7/30/2019 01 National Security on Internet

    9/39

    STABLE SOCIETY VS. NATIONAL PROGRESS

    Asian value helps Asian countries develop theirown countries with national dignity, culture

    value and social heritage for the past 30 years

    TaiwanSingapore

    Korean

    Japan

    China

    More advanced society give citizens more

    economic freedom and democratic right

  • 7/30/2019 01 National Security on Internet

    10/39

    VOICE FROM DEEP HEART OF AN IRAQI ARAB

    AFTER TEN YEAR TURMOIL

    It means more bloodshed, and we are fed up with this.

    Look at people in the countries of the Arab Spring. They

    are fighting each other.

    Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq

    News from Reuter, 16 Nov. 2011

  • 7/30/2019 01 National Security on Internet

    11/39

    Tunisia

    Economy 1.8% down

    in 2011

    Unemployment rate

    2011 - 18% 2010 13%

    Budget Deficit

    2011 6% of GDP

    2010 2.6% of GDP

    CRUEL RESULTS AFTER REVOLUTION

    Egypt Economy 0.8% down in

    2011

    Unemployment one million

    Egyptian lost jobs in 2011

    Budget Deficit up to 10% of

    GDP in 2011

    Foreign Investment

    2011 US$ 500M

    2010 US$ 6.4B

    Foreign Reserve down to

    US$ 15B in 2011

    only enough for 3 month importbill

  • 7/30/2019 01 National Security on Internet

    12/39

    Tunisia

    Economy 1.8% down

    in 2011

    Unemployment rate

    2011 - 18% 2010 13%

    Budget Deficit

    2011 6% of GDP

    2010 2.6% of GDP

    CRUEL RESULTS AFTER REVOLUTION

    Egypt

    Economy 0.8% down in

    2011

    Unemployment one million

    Egyptian lost jobs in 2011

    Budget Deficit up to 10% of

    GDP in 2011

    Foreign Investment

    2011 US$ 500M

    2010 US$ 6.4B

    Foreign Reserve down to

    US$ 15B in 2011

    only enough for 3 month importbill

  • 7/30/2019 01 National Security on Internet

    13/39

    4 THREATS TO NATIONAL SECURITY

    Cyber Wars among States

    It is not likely at this moment

    Economic Espionage

    Quite common in business

    Cyber Crime

    Very popular in the world now

    Cyber Terrorism

    Potential threats by extremist

  • 7/30/2019 01 National Security on Internet

    14/39

    RUMOR HAS IT THAT

    Rumor is a pipe blown by surmises, jealousies,conjectures - William Shakespeare

    Rumor is the biggest enemy in modern society

    Disrupting trust between government and citizens Utilized by ambitious politic, gang member, social movement

    or religious elements

    Causing social and economic disturbance

    Wide-spreading by SMS and Internet, which are hardlycontrolled

  • 7/30/2019 01 National Security on Internet

    15/39

    RUMOR SPREADING FASTER AND FASTER

    By emerging mobile and social media, such astweeter and black berry messenger, rumor can

    mobilize mob faster than you can image

    New studies on London Riots also prove it. See Guardian Reports:

    http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-

    rumours-riots

    http://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-

    communication-method-choice

    How rumor spreads is like this:http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-

    twitter

    http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riots
  • 7/30/2019 01 National Security on Internet

    16/39

    RUMOR CONTROL AND CRISIS MANAGEMENT

    Frequent news announcement through mass

    media

    Monitoring

    SMS

    Internet Content

    Facebook

    twitter

    Lawsuit against rumor spreaders

  • 7/30/2019 01 National Security on Internet

    17/39Mike Smith Las Vegas Sun, Feb 1, 2011

  • 7/30/2019 01 National Security on Internet

    18/39

    POWERFUL INFLUENCE BY INTERNET IN ME

    Wael Ghonim, GoogleRegional Marketing

    Executive in Dubai, UAE

    He created We are allKhaled Said page in

    Facebook to spark

    protest movement

    against and overthrowPresident Hosni

    Mubarak of Egypt in

    2011

  • 7/30/2019 01 National Security on Internet

    19/39

    POWERFUL INFLUENCE BY INTERNET IN UK

    Riots from Tottenham on 6

    August 2011 lasted for 5

    days, and spread from

    London cross Liverpool,

    Manchester Millions of GBP and several

    lives lost within few days

    Mob were mobilized by

    social media, SMS andother online services

  • 7/30/2019 01 National Security on Internet

    20/39

    POWERFUL INFLUENCE BY INTERNET IN US

    Occupy Movement

    started in New York in

    mid-Sept 2011, and

    spread over hundreds ofcities in the world

    Protest major on jobless

    and wealth disparity

    Participants are

    mobilized by online

    social media and SMS

  • 7/30/2019 01 National Security on Internet

    21/39

    JOSEPH S. NYE,FORMER US ASSISTANT SECRETARY OF DEFENSE AND CHAIRMAN OF THE US

    NATIONAL INTELLIGENCE COUNCIL

    Mountains and oceans are hard to move, but portions ofcyberspace can be turned on and off by throwing a switch.

    In his The Future of Power, he said

  • 7/30/2019 01 National Security on Internet

    22/39

    MONITOR TOOL ON INTERNET

    Target on rumors of social network and instantmessage on Internet under country LI law

    Keep on tracking the sender and routes

    Instant alarms on keywords, target suspects,and groups

    Block or filter extreme comments on Internet

    Good data retention management utility

    Highly confidential operation with capability on

    more protocols and encryption ways

  • 7/30/2019 01 National Security on Internet

    23/39

    DG E-DETECTIVE

    Solution for Government and Interior Security Force:

    Internet Activities Monitoring

    Sensitive words, suspects and groups monitoring and alarm

    Data Retention and Archiving

    Decision Group E-Detective Tactic System

    Effective Internet Activity Monitor

  • 7/30/2019 01 National Security on Internet

    24/39

    MAJOR FEATURES

    Real-time Internet Interception, monitoring system that captures,

    decodes and reconstructs various types of internet traffic

    Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA,

    GLBA, ETSI, CALEA, ISO 27001etc

    Full text search (search by key words with boolean support), conditionalsearch, similar search and association with relationship search

    Alert and notification (throughput, conditional and key words alert)

    functions for user behavior analysis

    IP tracking on outbound and inbound messages

    Open ODBC Interface with report system (Crystal Report) or data

    mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)

  • 7/30/2019 01 National Security on Internet

    25/39

    USER BEHAVIOR

    Summary screen on service type, frequency/quantity,

    throughput/volume

    Daily report on data volume in different time slot

    Internet content usage information collection Prevention of dispute between customers and banks by

    proofing it with captured records

    All data can be retrieved by 3rd party solutions, such as

    Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, forfurther analysis

  • 7/30/2019 01 National Security on Internet

    26/39

    BEHAVIOR REPORT

    Decision Group

    The type of services or

    applications subscribers

    use

    Quantity or frequency

    Data volume used by

    different service or

    application

  • 7/30/2019 01 National Security on Internet

    27/39

    USAGE REPORT

    Decision Group

    Usage by Time Slot

    Usage by User

  • 7/30/2019 01 National Security on Internet

    28/39

    WEBPAGE CONTENT COLLECTION

    Whois function provides

    you the actual URL Link IP

    Address

    HTTP Web Page content can be reconstructed

  • 7/30/2019 01 National Security on Internet

    29/39

    TRANSACTION RECORD BY EMAIL

  • 7/30/2019 01 National Security on Internet

    30/39

    INSTANT MESSAGE MONITOR

    Instant Messaging Monitor

    Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC

    Friend List data reconstruction

    File attachment capture Open Interface for Text Mining System

    Standard report format provided

    Open ODBC Interface with 3rd party Text Mining system

  • 7/30/2019 01 National Security on Internet

    31/39

    IM -YAHOO, MSN, ICQ, IRC, QQ, GTALK ETC

    Friend List

    Conversation

  • 7/30/2019 01 National Security on Internet

    32/39

    SOCIAL NETWORK MONITOR

    Social Network Monitor

    Facebook, twitter, Plurk, Orkutetc

    Friend list data reconstruction

    File attachment capture Open Interface for Text Mining System

    Standard report format provided

    Open ODBC Interface with 3rd party Text Mining system

  • 7/30/2019 01 National Security on Internet

    33/39

    Content of Facebook,friend list and attachedfiles

    Facebook, Plurk, Orkutetc

  • 7/30/2019 01 National Security on Internet

    34/39

    Twitter

    Content of twitter, time, and eachparticipantetc

  • 7/30/2019 01 National Security on Internet

    35/39

    SEARCH FULL TEXT, CONDITION, ASSOCIATIONComplete Search Full Text Search, Conditional Search, Similar Search and

    Association Search

    Conditional SearchFull Text Search

    Association Search

  • 7/30/2019 01 National Security on Internet

    36/39

    ALERT AND NOTIFICATION ALERT WITH CONTENT

    Alert configured from

    different servicecategories and different

    parameters such as key

    word, account, IP etc.

    Alert can be sent to

    Administrator by Email

    or SMS if SMS Gateway

    is available.

    Throughput alert function also available!

  • 7/30/2019 01 National Security on Internet

    37/39

    OTHER FEATURES

    Support 1.2 Gbps bandwidth throughput supported bysingle system

    Distributed deployment with central managementsystem in data centers of head quarter and regionalhub through Intranet

    Support +150 protocols or services Backup function allows user to backup the captured

    raw data files or reconstructed contents.

    Functions available are bookmark, captured file list

    (comparing the content of two files), online IP list,authority assignment, syslogserver etc

  • 7/30/2019 01 National Security on Internet

    38/39

    ADVANTAGES

    Take DG E-Detective for effective Internet activitymonitor

    Imperatives to manage abnormal communication onInternet

    Maintain national security on Internet Can be integrated with 3rd party text mining system

    against international terrorism groups

    Easy deployment and maintenance

    Reference upon request

  • 7/30/2019 01 National Security on Internet

    39/39

    Thank you for your attentionQ & A

    http://www.edecision4u.com