National Security on Internet - ME Version

download National Security on Internet - ME Version

of 41

Transcript of National Security on Internet - ME Version

  • 8/2/2019 National Security on Internet - ME Version

    1/41

    NATIONAL SECURITY ON INTERNET

    Marketing Division

    Decision Group

  • 8/2/2019 National Security on Internet - ME Version

    2/41

    SRAH AL-NIS': 58, QUR'AN

    Whenever you judge between people, youshould judge with justice.

  • 8/2/2019 National Security on Internet - ME Version

    3/41

    LESSONS

    Violent riot

    Large scale of protest

    Elites and foreigninvestors flee

    Division of different ethic

    and religion groups

    Military curfew

    Ruin, poverty, hunger,

    business halt, more

    violent, unrest uprisings

    and civil wars in society

    All are LosersEventually

  • 8/2/2019 National Security on Internet - ME Version

    4/41

    YULIYA TYMOSHENKO, Former Prime Minister of Ukraine

    But, as someone who led a peaceful revolution, I hope that their

    pride is tempered by pragmatism - because a change of regime isonly the first step in establishing a democracy backed by the rule of

    law. Indeed, as my country, Ukraine, is now demonstrating, after

    revolutionary euphoria fades and normality returns, democratic

    revolutions can be betrayed and reversed.

    In her Revolution Betrayed, she said

  • 8/2/2019 National Security on Internet - ME Version

    5/41

    DID IT HAPPEN ONLY IN DEVELOPING COUNTRIES?

    Landon Riot in Aug. 2011 lasted for 6 days in

    London, Manchester, Liverpool, and other area

    in England, and damaged millions USD of loss

    Occupy Movement in New York, US in Sept.

    2011

    Large scale of civil protest in Israel in summer,

    2011

    And many others in the future

  • 8/2/2019 National Security on Internet - ME Version

    6/41

    More Challenges More Risks More Opportunities

    WHAT HAPPENING IN NOWADAYS SOCIETY

  • 8/2/2019 National Security on Internet - ME Version

    7/41

    NEW CHALLENGES IN MODERN SOCIETY

    More educated younger generation with lessresponsibility

    More influential information from mass media of

    cross-border satellite with less moral constraints More westernized living habits with less respect on

    tradition and heritage

    More popular mobile phones with cheaper rate

    More communication tools on Internet with less

    abiding by law

  • 8/2/2019 National Security on Internet - ME Version

    8/41

    EMERGING RISKS

    Higher unemployed rate Higher inflation rate on food supply

    More extreme religious elements

    Higher demanded bourgeois Sporadic corruptive bureaucracy

    Uneven wealth distribution

    Instablized Society!!!

  • 8/2/2019 National Security on Internet - ME Version

    9/41

    POTENTIAL OPPORTUNITIES

    High acceptance for new social renovation More national capital for new large infrastructure

    More private investment on civil construction

    Balanced health facilities between rural and urban

    areas Higher literacy rate

    Lower death rate

    Those need time and stable society!!!

  • 8/2/2019 National Security on Internet - ME Version

    10/41

    FADHEL ZAWADI, A TUNISIAN 27-YEAR-OLD ACTIVISTfrom Aljazeera website, Dec. 2011

    Since the uprising, people have been able to participate in thecountrys 2011 October election, and that they now havefreedom of speech. Yet nothing has been done to solve theirmost pressing problems of socio-economic marginalization.

    TESTMONY FROM A

    TUNISIANACTIVIST

  • 8/2/2019 National Security on Internet - ME Version

    11/41

    STABLE SOCIETY VS. NATIONAL PROGRESS

    Asian value helps Asian countries develop theirown countries with national dignity, culture value

    and social heritage for the past 30 years

    Taiwan

    Singapore

    Korean

    Japan

    China More advanced society give citizens more

    economic freedom and democratic right

  • 8/2/2019 National Security on Internet - ME Version

    12/41

    VOICE FROM DEEP HEART OF AN IRAQI ARAB

    AFTER TEN YEAR TURMOIL

    It means more bloodshed, and we are fed up with this.

    Look at people in the countries of the Arab Spring. They

    are fighting each other.

    Hussain Ali, a common Arab in Sadr City, Bagdad, Iraq

    News from Reuter, 16 Nov. 2011

  • 8/2/2019 National Security on Internet - ME Version

    13/41

    RUMOR HAS IT THAT

    Rumor is a pipe blown by surmises, jealousies,

    conjectures William Shakespeare

    Rumor is the biggest enemy in modern society

    Disrupting trust between government and citizens

    Utilized by ambitious politic, gang member, social

    movement or religious elements

    Causing social and economic disturbance

    Wide-spreading by SMS and Internet, which are

    hardly controlled

  • 8/2/2019 National Security on Internet - ME Version

    14/41

    RUMOR SPREADING FASTING AND FASTING

    By emerging mobile and social media, such astweeter and black berry messenger, rumor can

    mobilize mob faster than you can image

    New studies on London Riots also prove it. See Guardian Reports:

    http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-

    rumours-riots

    http://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-

    communication-method-choice

    How rumor spreads is like this:http://www.guardian.co.uk/uk/interactive/2011/dec/07/london-riots-

    twitter

    http://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/bbm-rioters-communication-method-choicehttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riotshttp://www.guardian.co.uk/uk/2011/dec/07/how-twitter-spread-rumours-riots
  • 8/2/2019 National Security on Internet - ME Version

    15/41

  • 8/2/2019 National Security on Internet - ME Version

    16/41

    RUMOR CONTROL AND CRISIS MANAGEMENT

    Frequent news announcement through mass

    media

    Monitoring

    SMS

    Internet Content

    Facebook

    twitter

    Lawsuit against rumor spreaders

  • 8/2/2019 National Security on Internet - ME Version

    17/41Mike Smith Las Vegas Sun, Feb 1, 2011

  • 8/2/2019 National Security on Internet - ME Version

    18/41

    INFLUENCE ON INTERNET IN MEAZR

    Wael Ghonim, Google

    Regional Marketing

    Executive in Dubai, UAE

    He created We are allKhaled Said page in

    Facebook to spark

    protest movement

    against and overthrowPresident Hosni

    Mubarak of Egypt in

    2011

  • 8/2/2019 National Security on Internet - ME Version

    19/41

    INFLUENCE BY INTERNET IN UK

    Riots from Tottenham on 6

    August 2011 lasted for 5

    days, and spread from

    London cross Liverpool,

    Manchester

    Millions of GBP and several

    lives lost within few days

    Mob were mobilized by

    social media, SMS andother online services

  • 8/2/2019 National Security on Internet - ME Version

    20/41

    INFLUENCE BY INTERNET IN US

    Occupy Movement

    started in New York in

    mid-Sept 2011, and

    spread over hundreds ofcities in the world

    Protest major on jobless

    and wealth disparity

    Participants are

    mobilized by online

    social media and SMS

  • 8/2/2019 National Security on Internet - ME Version

    21/41

    ADVANCEMENTS IN COMMUNICATIONS TECHNOLOGIES HAVE

    BROUGHT ABOUT FUNDAMENTAL CHANGES TO SOCIETY.MARGINALIZED SECTORS OF THE POPULATION HAVE NOW

    FOUND A VOICE ON THE INTERNET AND THROUGH SOCIAL

    NETWORKING SERVICES. SATELLITE COMMUNICATIONS HAVE

    MADE GLOBAL NEWS COVERAGE INSTANTANEOUS AND IN THE

    REACH OF HUNDREDS OF MILLIONS.

    Sheikh Salman al-Oadah, Saudi Arabia

  • 8/2/2019 National Security on Internet - ME Version

    22/41

    THE POLICIES AND STRATEGIES

    Find a proper lawful interception for Internet

    surveillance and deploy it in major ISPs

    Develop an evaluation matrix to analyze rumors and

    threats for potential exposure and threats Develop full set of strategy and network to keep

    National Security Officers informed on a daily basis of

    all threats and responses

    Prepare a crisis management plan that includes

    Internet attacks and rumors

  • 8/2/2019 National Security on Internet - ME Version

    23/41

    SURVEILLANCE ON INTERNET

    Target on rumors of social network and instantmessage on Internet under country LI law

    Keep on tracking the sender and routes

    Instant alarms on keywords, target suspects,

    and groups

    Block or filter extreme comments on Internet

    Good data retention management utility

    Highly confidential operation with capability on

    more protocols and encryption ways

  • 8/2/2019 National Security on Internet - ME Version

    24/41

    DG E-DETECTIVE

    Solution for Government and Interior Security Force:

    Internet Activities Monitoring

    Sensitive words, suspects and groups monitoring and alarm

    Data Retention and Archiving

    Decision Group E-Detective Tactic System

    Effective Internet Activity Monitor

  • 8/2/2019 National Security on Internet - ME Version

    25/41

    MAJOR FEATURES

    Real-time Internet Interception, monitoring system that captures,

    decodes and reconstructs various types of internet traffic

    Compliance with many standards like Sarbanes Oxley Act (SOX), HIPAA,

    GLBA, ETSI, CALEA, ISO 27001etc

    Full text search (search by key words with boolean support), conditionalsearch, similar search and association with relationship search

    Alert and notification (throughput, conditional and key words alert)

    functions for user behavior analysis

    IP tracking on outbound and inbound messages

    Open ODBC Interface with report system (Crystal Report) or data

    mining/warehouse (Oracle, SAP, SAS, i2 or Teradata)

  • 8/2/2019 National Security on Internet - ME Version

    26/41

    USER BEHAVIOR

    Summary screen on service type, frequency/quantity,

    throughput/volume

    Daily report on data volume in different time slot

    Internet content usage information collection Prevention of dispute between customers and banks by

    proofing it with captured records

    All data can be retrieved by 3rd party solutions, such as

    Crystal Report, Oracle, SAP, SAS, i2, Teradataetc, forfurther analysis

  • 8/2/2019 National Security on Internet - ME Version

    27/41

  • 8/2/2019 National Security on Internet - ME Version

    28/41

    USAGE REPORT

    Decision Group

    Usage by Time Slot

    Usage by User

  • 8/2/2019 National Security on Internet - ME Version

    29/41

    WEBPAGE CONTENT COLLECTION

    Whois function provides

    you the actual URL Link IP

    Address

    HTTP Web Page content can be reconstructed

  • 8/2/2019 National Security on Internet - ME Version

    30/41

    TRANSACTION RECORD BY EMAIL

  • 8/2/2019 National Security on Internet - ME Version

    31/41

    INSTANT MESSAGE MONITOR

    Instant Messaging Monitor

    Yahoo! Messager, QQ, ICQ, MSN, Gtalk, IRC

    Friend List data reconstruction

    File attachment capture Open Interface for Text Mining System

    Standard report format provided

    Open ODBC Interface with 3rd party Text Mining system

  • 8/2/2019 National Security on Internet - ME Version

    32/41

    IM -YAHOO, MSN, ICQ, IRC, QQ, GTALK ETC

    Friend List

    Conversation

  • 8/2/2019 National Security on Internet - ME Version

    33/41

    SOCIAL NETWORK MONITOR

    Social Network Monitor

    Facebook, twitter, Plurk, Orkutetc

    Friend list data reconstruction

    File attachment capture Open Interface for Text Mining System

    Standard report format provided

    Open ODBC Interface with 3rd party Text Mining system

  • 8/2/2019 National Security on Internet - ME Version

    34/41

    Content of Facebook,friend list and attachedfiles

    Facebook, Plurk, Orkutetc

  • 8/2/2019 National Security on Internet - ME Version

    35/41

    Twitter

    Content of twitter, time, and eachparticipantetc

  • 8/2/2019 National Security on Internet - ME Version

    36/41

    SEARCH FULL TEXT, CONDITION, ASSOCIATIONComplete Search Full Text Search, Conditional Search, Similar Search and

    Association Search

    Conditional SearchFull Text Search

    Association Search

  • 8/2/2019 National Security on Internet - ME Version

    37/41

    ALERT AND NOTIFICATION ALERT WITH CONTENT

    Alert configured from

    different servicecategories and different

    parameters such as key

    word, account, IP etc.

    Alert can be sent to

    Administrator by Email

    or SMS if SMS Gateway

    is available.

    Throughput alert function also available!

  • 8/2/2019 National Security on Internet - ME Version

    38/41

    CENTRALIZED MANAGEMENT SYSTEM

    Deployment with: Central Access

    Management for all Userson Intercepted Data withDifferent Authenticationin DistributedEnvironment

    Remote SystemManagement on MultipleED, ED2S, ED/LEMF andWDEX through SecuredConnection

    Remote System and DataManagement on DataRetention Management

    System through SecuredConnection Separate Processes of Data

    Collection, Decoding, UserAccess, and DataManagement in Order toFulfill State Mandates

    Complete Solution for Distributed Network Surveillance

    Suitable for Deployment in Network Service Providers, Global Enterprises,and Law Enforcement Authority

  • 8/2/2019 National Security on Internet - ME Version

    39/41

    OTHER FEATURES

    Support 1.2 Gbps bandwidth throughput supported bysingle system

    Distributed deployment with central managementsystem in data centers of head quarter and regionalhub through Intranet

    Support +150 protocols or services Backup function allows user to backup the captured

    raw data files or reconstructed contents.

    Functions available are bookmark, captured file list

    (comparing the content of two files), online IP list,authority assignment, syslogserver etc

  • 8/2/2019 National Security on Internet - ME Version

    40/41

    ADVANTAGES

    Take DG E-Detective for effective Internet activitysurveillance

    Imperatives to manage abnormal communication onInternet

    Maintain national security on Internet Can be integrated with 3rd party text mining system

    against international terrorism groups

    Easy deployment and maintenance

    Reference upon request

  • 8/2/2019 National Security on Internet - ME Version

    41/41

    Thank you for your attentionQ & A

    http://www.edecision4u.com