Vous êtes sur la page 1sur 12

Lawful Interception for Modern Network Environment

Decision Group 2012

What is Lawful Interception for?


Lawful Interception for
Protecting civil property and saving lives from the attack of transnational cyber crime rings Performing justice and auditing process by law Maintaining social stability and increasing economic development

DECISION GROUP INC.

What Challenges to Current LI?


It is based on old telecom network of voice analog technology without support of new IP technology All tasks from data interception to analysis are batch processes without quick response to immediate events
Result report acquired from the field one or two days later because the delay is from batch processing tasks

It only focuses on voice and email without including many other popular online services
Cyber crime rings rely 60% on voice and email and 40% on other social media, instant message, and interactive tools

Current Out-of-Date LI Technology cannot Mitigate the Risk of Attacks from Crime Rings and Effectively Detect Criminal Information
DECISION GROUP INC.

New Criteria for Lawful Interception


Standard Integrated Lawful Interception Solutions from Decision Group

For both Telecom and Network Environment Compliant with ETSI or CALEA Standards Getting IP packet data stream from Telecom and Internet Service Providers Decoding as many protocols as possible Data retention capability for long term tracking and reporting Easy to deploy and manage with high security
Flexible Interactive, Real-time Analysis, Adaptive Solution
DECISION GROUP INC.

Requirement of LI Deployment
Centralized Network Deployment and Distributed Network Deployment

Picture From issue of Sept, 2008, Scientific American DECISION GROUP INC.

Misconcenption on LI
Lawful Interception is not
Targeting on single type of communication Targeting on single type of head-end equipment Targeting on single type of network Targeting on single fixed place Targeting on specific period
Where there is a criminal act, you should effectively detect it whenever and wherever it is!

DECISION GROUP INC.

Total LI Solution for Modern Networks


The Best Customized Solution for Large Scale of Distributed Telecom and Internet Networks in the World

Decision Group Solution Suite with 3 Tiers of Architecture


1st Tier : Network Switch, Tap, Packet Filter, Mediation Platform 2nd Tier: E-Detective, ED/LEMF, ED2S 3rd Tier: Centralized Management System, Data Retention Management System

Training Programs
Cyber Crime Investigation Training NPFAT

Consulting Service Customization Service


DECISION GROUP INC.

E-Detective / Law Enforcement Management Facility

Major Functions:
Fast real-time streamline process with capability of enhanced data management Decoding data packets of 180+ protocols by pcap file or stream Primary data analysis report available for online tracking Output reconstructed data into database, content files, and predefined XML description files Integrated with 3rd party warrant system through web services Compliance with ETSI TS 101 671, ETSI ES 201 671

High Performance, Passive LI Platform, Compliance with ETSI and CALEA Standards
DECISION GROUP INC.

E-Detective
Internet Surveillance and Forensic Analysis System
Best Tactical Solution for: Network Protocol Decoding and Content Reconstruction Internet Surveillance Forensics Analysis and Cyber Crime Investigation

Most Advanced Device for Network Surveillance, Lawful Interception and Network Forensic
DECISION GROUP INC.

What Else Do You Need?


To Win a Battle, you need
Powerful Weapons

Decision Group Solutions Knowledge and Training

Good Strategy Qualified Soldiers

One Stop Shopping with both Solutions and Training


DECISION GROUP INC.

Professional Training
Cyber Crime Investigation Network Packet Forensic Training Analysis Training
In order to fight against rampaging cyber crimes in the world effectively, you need to understand the nature of cyber crime, the legal procedure, and learn the lesson of real cases from experienced investigators and experts. In this course, experienced speakers will introduce common cyber criminal skill, how to conduct investigation, digital data analysis with practical case study. This 3 day course utilizes the knowledge of computer security concepts together with switched network topologies and gives students hands on practical exposure to critical knowledge base essential for network forensic investigation and analysis.

DECISION GROUP INC.

Weapon + Knowledge =

Contact us @
decision@decision.com.tw URL: http://www.edecision4u.com
DECISION GROUP INC.

Vous aimerez peut-être aussi