Académique Documents
Professionnel Documents
Culture Documents
It only focuses on voice and email without including many other popular online services
Cyber crime rings rely 60% on voice and email and 40% on other social media, instant message, and interactive tools
Current Out-of-Date LI Technology cannot Mitigate the Risk of Attacks from Crime Rings and Effectively Detect Criminal Information
DECISION GROUP INC.
For both Telecom and Network Environment Compliant with ETSI or CALEA Standards Getting IP packet data stream from Telecom and Internet Service Providers Decoding as many protocols as possible Data retention capability for long term tracking and reporting Easy to deploy and manage with high security
Flexible Interactive, Real-time Analysis, Adaptive Solution
DECISION GROUP INC.
Requirement of LI Deployment
Centralized Network Deployment and Distributed Network Deployment
Picture From issue of Sept, 2008, Scientific American DECISION GROUP INC.
Misconcenption on LI
Lawful Interception is not
Targeting on single type of communication Targeting on single type of head-end equipment Targeting on single type of network Targeting on single fixed place Targeting on specific period
Where there is a criminal act, you should effectively detect it whenever and wherever it is!
Training Programs
Cyber Crime Investigation Training NPFAT
Major Functions:
Fast real-time streamline process with capability of enhanced data management Decoding data packets of 180+ protocols by pcap file or stream Primary data analysis report available for online tracking Output reconstructed data into database, content files, and predefined XML description files Integrated with 3rd party warrant system through web services Compliance with ETSI TS 101 671, ETSI ES 201 671
High Performance, Passive LI Platform, Compliance with ETSI and CALEA Standards
DECISION GROUP INC.
E-Detective
Internet Surveillance and Forensic Analysis System
Best Tactical Solution for: Network Protocol Decoding and Content Reconstruction Internet Surveillance Forensics Analysis and Cyber Crime Investigation
Most Advanced Device for Network Surveillance, Lawful Interception and Network Forensic
DECISION GROUP INC.
Professional Training
Cyber Crime Investigation Network Packet Forensic Training Analysis Training
In order to fight against rampaging cyber crimes in the world effectively, you need to understand the nature of cyber crime, the legal procedure, and learn the lesson of real cases from experienced investigators and experts. In this course, experienced speakers will introduce common cyber criminal skill, how to conduct investigation, digital data analysis with practical case study. This 3 day course utilizes the knowledge of computer security concepts together with switched network topologies and gives students hands on practical exposure to critical knowledge base essential for network forensic investigation and analysis.
Weapon + Knowledge =
Contact us @
decision@decision.com.tw URL: http://www.edecision4u.com
DECISION GROUP INC.