SKYNET: Applying Advanced

Size: px
Start display at page:

Download "SKYNET: Applying Advanced"

Transcription

1 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL?M1 h e SKYNET: Applying Advanced,bfl mm p* iii^bm I IV flhsmp DA U 0 ' a.. *: wm : ^MMMIMWai» 11 by S2I, R6, T12, T14, - Presenters: pres, S2I51, R66F T: J.f-fc V..-. TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL..V ivv I" ". Zi v*r ' ' : ff/if^. ' QeWttfftorii: NSA/CSSM » M l. Dated: Wh \Z Declassify Oh: /

2 UNCLASSIFIED//FOUO Outline What is SKYNET? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic Triage UNCLASSIFI : EÖ//F.OÜO

3 Collaborative cloud research effort between 5 different organizations crossing 3 NSA Directorates: - Signals Intelligence: S2I, S22, SSG - Research: R6 - Technology: T12, T14 Partnerships - TMAC/FASTSCOPE - MIT Lincoln Labs & Harvard SKYNET applies complex combinations of geospatial, geotemporal, pattern-of-life, and travel analytics to bulk DNR data to identify patterns of suspect activity

4 CTMMC T0PSEdî N S A/CSS Counterterrorism Mission Management Center Bag hi in ' Mtfiaud-E Etacfl P -van C hank or I.twJ.i Sh ata > O Kabul \ f.v»h nr Lam Tuesday/Friday Asad bad Peshawar Rough outline of courier path as described by the targets Snn ag ar : Gardez Id am it> ad» Rawalpindi Sunday Waziristan s Courier/ Probably Faisalabad F a sal abad Lahore U Sunday/Monday Cimi TOP SECRET//COMINT//REL TO USA/AUS, CAN, GBR, NZL

5 TOP SECRET//COMINT//ORCON/REL- TO USA, AUS, CAN, GBR. NZl. SKYNET Analytic Questions Who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives? Who else is seen in the area when the traveler arrives, and who seen leaving the area shortly afterward? Who travels to/from Peshawar every other Sunday and "somewhere else" on a weekly basis? Who visits Akora Khattak periodically and also travels between Peshawar and Lahore? Who fits the above travel profiles and also possesses unusual behavior: One or two hops from other suspects or known tasked selectors Frequent handset swapping or powering down

6 TOP SECRET//COMINT//REL TO USA. A4JS. CAN. GBR. ISJZll ' «s U DEMONSPIT DEMONSPIT is a new dataflow for bulk Call Data Records (CDRs) from Pakistan - CDRs are being acquired from major PK Telecom providers Data is normalized through TUSKATTIRE, like all other Call Data Records DEMONSPIT data is forwarded by TUSKATTIRE to several Clouds: - GMHalo/DPS Promotes records to FASCIA and feeds the SEDB Tower QFD - GMPIace& Cloud 14 Ingests DEMONSPIT into Sortinglead summaries to support SKYNET Analytics Ingests DEMONSPIT into a Perishable QFD which will be available to analysts via JEMA and CINEPLEX - Bulldozer/MDR2 All of the clouds receiving DEMONSPIT data also receive all FASCIA data TOP SECRET//COMINT//REL TO USA, AUS, ; CAN, GBR,,N.Z,L

7 SECRET//C0M1NT//REL TO USA, AUS, CAN, GBR; NZL Analysts' View of DEMONSPIT TUSKATTIRE Original wcdrs Access to ALL DEMONSPIT Data TOWER QFD ROLLERCOASTER Original fccdrs JEMA MAINWAY/SIGNAV CINEPLEX Access to CDRs, Analyst Queries, & Results of SKYNET Analytics CDR Summaries SMARTTRACKER SO RUN G LEAD Analyst Promoted CDRs Access to DEMONSPIT FASCIA Promoted Data FASCIA ASSOCIATION BANYAN SKYNET & Analyst Promoted CDRs SECRET//COMINT//REL TO USA, AUS, : CÄN, GBR; NZU

8 UNCLASSIFIED//FOUO Outline What is SKYNET? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic Triage UNCLASSIFI : EÖ//F.OÜO

9 TOP SECRET//SI//REL TO USA, FVEY Cloud Analytic Building Blocks Travel Patterns - Travel phrases (Locations visited in given timeframe) - Regular/repeated visits to locations of interest Behavior-Based Analytics - Low use, incoming calls only - Excessive SIM or Handset swapping - Frequent Detach/Power-down - Courier machine learning models Other Enrichments Travel on particular days of the week Co-travelers Similar travel patterns Common contacts Visits to airports Other countries Overnight trips Permanent move TOP SECRET//SI//REL TO USA; FVEY

10 TOP SECRET//SI//REL TO USA, FVEY Sample Travel Report: Haqqani Network tasked- selector^ contact- swapping associated^ other_ seed-contacts count _num selectors visits_regularly countries phrase 3 lashkargah_city nowbahar IR helmand kandaharaf PK fa rah AF bala_bulk farah masow farah masow nowbahar masow 3 BA AE ghazni AF sharan urgon AF khost_airport kajir_kalay - m JF TOP SECRET//SI//REL TO USA; FVEY

11 TOP SECRET//SI//REL TO USA, FYEY. * *. * ' What Suspicious Selectors Were Seen Traveling Between Peshawar and Lahore? J VJ SoecifmBehavioral Cloud Analytics Peshawar-Lahore Travel 1-4 NOV 2011 ì J TASKED NUM_SELECTOR ASSOCIATED, ACTIVITY, TRAVEL PHRASE DOW MSISDN IMSI CONTACTS.SWAPPING SELECTORS CATEGORIES torkham AF PK peshawar lahore FRI 2 PK peshawar lahore THU behsud AF jalalabad jalal_abad jalalabad behsud rodat bati_kot mohmand_darah peshawar PK WED 4 7 gtrd PK nowshera gulbahar peshawar sanda kalan lahore THU jamrud PK peshawar lahore TUE 10 PK peshawar lahore THU TOP SECRET//SI//REL JO USA; FVEY. \ ; 5-or-f ewercontacts, smsand-zeroduration-callsonly, low-use

12 UNCLASSIFIED//FOUO Outline What isskynet? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic triage -SMARTTRACKER - RT-RG -JEMA UNCLASSIFIED//F.OÜO

13 TOP SECRET//SI//REL TO USA, FVEY Selectors of Interest from Cloud Travel Analytic (tasked) IMSIs: Handsets. I V. M'HAäS TOP SECRET//SI//REL TO USA: FVEY

14 TOP SECRET//SI//REL TO USA, FVEY. SMARTTRACKER Travel View 31 October - 23 November * Location: UCell JDl (11/14/ :27:47) * Location: UCefl ID 1/70/ :59:04) «fta KHATTAk SUSPECT TERRORIST FACILITY 001 (11/20/201112:59:04) * Location: UCell ID] (11/14/201102:19:16) Location: UCellJD (11/23/201114:23:55) (11/21/201114:55:37) Location: UCell '11/ :34:15) (11/20/ :34:15) 31 ' " N. 75*13' * E

15 TOP SECRET//SI//REL TO USA, FVEY. Examine travel patterns for common routes and meeting locations - Run cell soaks on all common meeting locations during meeting timeframe Analyze selectors for common contacts Analyze selectors for handset sharing behavior Repeat procedure with resulting selectors Correlate with other known and suspected selectors r TOP SECRET//SI//REL TO USA; FVEY:

16 TOP SECRET//SI//REL TO USA, FVEY. SMARTTRACKER Coincidence Report W+ Si Sets with 2 targets ' ' ' '* i Select Select 31 at 12 locations 24 at 11 locations Af.ft.r. t Select 1 at 1 location Select 1 at 1 location Select 1 at 1 location u

17

18 ^ 77 TOP SECRET//SI//REL TO USA, FVEY RT-RG Analytics mm m ^awiwffà am Meetings - who is at the same ucellid at the same time as the potential courier at the destination city?...multiple times. Sidekicks - is there a pair traveling together to the destination city? TOP SECRET//SI//REL TO USA; FVEY

19 TOP SECRET//SI//REL TO USA, F VE Y '' : / JEM A: Pulling It All Together sfcçug/tp Start/end points Dates Destination Cities Movement Irregularity Travel Reports Human in the loop to analyze travel reports. Evaluate, add value, prioritize Meetings Are selectors seen meeting at destination consistently? 10 Sidekicks Does Sidekick selector have call events?

20

Summary of DNR and DNI Co-Travel Analytics

Summary of DNR and DNI Co-Travel Analytics Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information: Table of Contents Table of Contents 2 Introduction 3 Issues and Questions 3 Analytics 5 CHALKFUN 5 DSD Co-Travel Analytic

More information

Content Extraction Enhancements For Target Analytics:

Content Extraction Enhancements For Target Analytics: TOP SECRET//COMINT//REL TO USA, FVEY//20320108 Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Work funded by T1221 Center for

More information

Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My

Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My The Proverbial Needle In A Haystack Problem The Nuclear Option Problem Statement and Proposed

More information

The Big Data Paradigm Shift. Insight Through Automation

The Big Data Paradigm Shift. Insight Through Automation The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.

More information

AFGHANISTAN REHABILITATION ORGANIZATION (ARO)

AFGHANISTAN REHABILITATION ORGANIZATION (ARO) AFGHANISTAN REHABILITATION ORGANIZATION (ARO) 12 OCT1993 To: Hv.Rrrtt Dvecis Project officer IRC/RAP for reporting.13 October..WW It 6.U Dear Mr. Britt Dveris! Thank you {'or culling. KncJnsferi pjenze

More information

Summary of DNR and DNI Co-Travel Analytics

Summary of DNR and DNI Co-Travel Analytics Summary of DNR and DNI Co-Travel Analytics S215 1 October 2012 Contact information Table of Contents Table oficontents 2 Introduction---------------------------- 3 Issues and Questions-------------------------

More information

GeoMatrix. Positioning of Mobile Phones System

GeoMatrix. Positioning of Mobile Phones System GeoMatrix Positioning of Mobile Phones System Geographic intelligence is one of the oldest forms of military intelligence, and one of the most important. From earliest times, an accurate knowledge and

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

How Using Big Data in Security Helps (and Hurts) Us

How Using Big Data in Security Helps (and Hurts) Us How Using Big Data in Security Helps (and Hurts) Us Kerry Matre, CIPP/US What is your role? 2 $300 Billion 3 What do insiders look like? 4 Basic insider threat monitoring Block IPs Signature based monitors

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV) LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY 1st TERM (14 SEPT - 27 NOV) Week 1 9.30-10.30 10.30-11.30 11.30-12.30 12.30-13.30 13.30-14.30 14.30-15.30 15.30-16.30

More information

Critical Security Controls

Critical Security Controls Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security

More information

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR

More information

THE EVOLUTION OF SIEM

THE EVOLUTION OF SIEM THE EVOLUTION OF SIEM WHY IT IS CRITICAL TO MOVE BEYOND LOGS Despite increasing investments in security, breaches are still occurring at an alarming rate. 43% Traditional SIEMs have not evolved to meet

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources

More information

What s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted

What s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted What s New in Security Analytics 10.4 Be the Hunter.. Not the Hunted Attackers Are Outpacing Detection Attacker Capabilities Time To Discovery Source: VERIZON 2014 DATA BREACH INVESTIGATIONS REPORT 2 TRANSFORM

More information

How To Make Data Streaming A Real Time Intelligence

How To Make Data Streaming A Real Time Intelligence REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log

More information

Cyber Situational Awareness - Big Data Solution

Cyber Situational Awareness - Big Data Solution Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and

More information

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013

ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013 ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Fuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen

Fuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen Side 1 af 43 Side 2 af 43 Side 3 af 43 Side 4 af 43 Side 5 af 43 Side 6 af 43 Side 7 af 43 Side 8 af 43 Side 9 af 43 Side 10 af 43 Side 11 af 43 Side 12 af 43 Side 13 af 43 Side 14 af 43 Side 15 af 43

More information

Fuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen

Fuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen Side 1 af 41 Side 2 af 41 Side 3 af 41 Side 4 af 41 Side 5 af 41 Side 6 af 41 Side 7 af 41 Side 8 af 41 Side 9 af 41 Side 10 af 41 Side 11 af 41 Side 12 af 41 Side 13 af 41 Side 14 af 41 Side 15 af 41

More information

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,

More information

Locating Mobile Phones using Signalling System #7. Tobias Engel <[email protected]> twitter: @2b_as

Locating Mobile Phones using Signalling System #7. Tobias Engel <tobias@ccc.de> twitter: @2b_as Locating Mobile Phones using Signalling System #7 Tobias Engel twitter: @2b_as What is Signalling System #7? protocol suite used by most telecommunications operators throughout the world

More information

An Example of Mobile Forensics

An Example of Mobile Forensics An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network

More information

Big Data Governance Certification Self-Study Kit Bundle

Big Data Governance Certification Self-Study Kit Bundle Big Data Governance Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Governance Certification.

More information

DATA MANAGEMENT FOR THE INTERNET OF THINGS

DATA MANAGEMENT FOR THE INTERNET OF THINGS DATA MANAGEMENT FOR THE INTERNET OF THINGS February, 2015 Peter Krensky, Research Analyst, Analytics & Business Intelligence Report Highlights p2 p4 p6 p7 Data challenges Managing data at the edge Time

More information

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT

More information

NTI Law Enforcement Systems and Services

NTI Law Enforcement Systems and Services NTI Law Enforcement Systems and Services PO Box 99, Jefferson, NH 03583 (603) 586-7156 [fax (603) 586-7164] Enhancing Counter-Terrorism and Criminal Investigations with Telephonic Information The need:

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 UNCLASSIFIED Semantic Enrichment of the Data

More information

CallMiner Speech Analytics Everything else is just talk. Cliff LaCoursiere SVP Business Development - CallMiner, Inc.

CallMiner Speech Analytics Everything else is just talk. Cliff LaCoursiere SVP Business Development - CallMiner, Inc. CallMiner Speech Analytics Everything else is just talk. Cliff LaCoursiere SVP Business Development - CallMiner, Inc. Agenda Why speech analytics? How CallMiner speech analytics works Speech analytics

More information

The Future of Business Analytics is Now! 2013 IBM Corporation

The Future of Business Analytics is Now! 2013 IBM Corporation The Future of Business Analytics is Now! 1 The pressures on organizations are at a point where analytics has evolved from a business initiative to a BUSINESS IMPERATIVE More organization are using analytics

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Big Data Governance Certification Self-Study Kit Bundle

Big Data Governance Certification Self-Study Kit Bundle Big Data Governance Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Governance Certification.

More information

How To Apply For A College Online

How To Apply For A College Online APPLICANT S HELP GUIDE Online College Applications System (OCAS), a project of Government of Punjab to facilitate students in securing admission with convenience JULY 2015 1 1 OVERVIEW Online College Applications

More information

Agilent Network Monitoring Content Intercept Manager

Agilent Network Monitoring Content Intercept Manager Agilent Network Monitoring Content Intercept Manager Enabling Lawful Intercept agencies to keep pace with evolving cellular networks CIM is a flexible tool allowing precise and secure lawful interception

More information

The Role of Automation Systems in Management of Change

The Role of Automation Systems in Management of Change The Role of Automation Systems in Management of Change Similar to changing lanes in an automobile in a winter storm, with change enters risk. Everyone has most likely experienced that feeling of changing

More information

Complex Event Processing (CEP) Why and How. Richard Hallgren BUGS 2013-05-30

Complex Event Processing (CEP) Why and How. Richard Hallgren BUGS 2013-05-30 Complex Event Processing (CEP) Why and How Richard Hallgren BUGS 2013-05-30 Objectives Understand why and how CEP is important for modern business processes Concepts within a CEP solution Overview of StreamInsight

More information

The Analytics Value Chain Key to Delivering Value in IoT

The Analytics Value Chain Key to Delivering Value in IoT Vitria Operational Intelligence The Value Chain Key to Delivering Value in IoT Dr. Dale Skeen CTO and Co-Founder Internet of Things Value Potential $20 Trillion by 2025 40% 2015 Vitria Technology, Inc.

More information

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014 Real Time Wireless based Train Tracking, Track Identification and Collision avoidance System for Railway Sectors 1 R. Immanuel Rajkumar, 2 Dr.P. E. Sankaranarayanan, and 3 Dr.G.Sundari 1 Research Scholar,

More information

Using Social Ties to Predict Missing Customer Information Stamatis Stefanakos

Using Social Ties to Predict Missing Customer Information Stamatis Stefanakos D1 Solutions AG a Netcetera Company Using Social Ties to Predict Missing Customer Information Stamatis Stefanakos DMIN 2009 2 Outline Who we are The data landscape in telecoms The call graph Predicting

More information

Cisco Dynamic Workload Scaling Solution

Cisco Dynamic Workload Scaling Solution Cisco Dynamic Workload Scaling Solution What You Will Learn Cisco Application Control Engine (ACE), along with Cisco Nexus 7000 Series Switches and VMware vcenter, provides a complete solution for dynamic

More information

IVR (Interactive Voice Response) Operation Manual. Copyright 2012 Agile Networks, Inc. All Rights Reserved.

IVR (Interactive Voice Response) Operation Manual. Copyright 2012 Agile Networks, Inc. All Rights Reserved. IVR (Interactive Voice Response) Operation Manual Copyright 2012 Agile Networks, Inc. All Rights Reserved. Table of Contents ddw Settings (Setting User Information) An Agile Cloud PBX Option feature. This

More information

Global System for Mobile Communication Technology

Global System for Mobile Communication Technology Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special

More information

Best Practices in Improving Lead Generation Guidelines for improving lead generation

Best Practices in Improving Lead Generation Guidelines for improving lead generation Web Lead Generation Best Practices in Improving Lead Generation Guidelines for improving lead generation white paper 2 Table of contents 1. The challenge... 3 2. The solution... 4 2.1 Define a clear process...

More information

How telcos can benefit from streaming big data analytics

How telcos can benefit from streaming big data analytics inform innovate accelerate optimize How telcos can benefit from streaming big data analytics #streamingbigdataanalytics Sponored by: 2013 TM Forum 1 V2013.4 Today s Speakers Adrian Pasciuta Director of

More information

Group Life Insurance-FAQs

Group Life Insurance-FAQs Group Life Insurance-FAQs What is Group Life Insurance? Group life insurance is term life insurance that extends cover to a group of people usually employees of Companies, Banks, NGOs or members of a union

More information

Mobile Communications

Mobile Communications October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path

More information

Big Data Architect Certification Self-Study Kit Bundle

Big Data Architect Certification Self-Study Kit Bundle Big Data Architect Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Architect Certification.

More information

SMS SS7 Fraud 3.1 16 February 2005

SMS SS7 Fraud 3.1 16 February 2005 UN SMS SS7 Fraud 3.1 16 February 2005 This is a non-binding permanent reference document of the GSM Association. Security Classification Category (see next page) This is an UN official document Security

More information

THE INSTITUTE OF CHARTERED ACCOUNTANTS OF PAKISTAN Applying for the Financial Assistance under Students Endowment Fund 20

THE INSTITUTE OF CHARTERED ACCOUNTANTS OF PAKISTAN Applying for the Financial Assistance under Students Endowment Fund 20 THE INSTITUTE OF CHARTERED ACCOUNTANTS OF PAKISTAN Applying for the Financial Assistance under Students Endowment Fund 20 For the students who are eligible for the financial assistance and are registered

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

Safe Harbor Statement

Safe Harbor Statement Defining a Roadmap to Big Data Success Robert Stackowiak, Oracle Vice President, Big Data 17 November 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is

More information

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR 場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance

More information

Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group

Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group May 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

MFA in Writing Program Spalding University TRAVELING WITH EF COLLEGE STUDY TOURS: THE ESSENTIALS FOR PRAGUE AND BERLIN

MFA in Writing Program Spalding University TRAVELING WITH EF COLLEGE STUDY TOURS: THE ESSENTIALS FOR PRAGUE AND BERLIN MFA in Writing Program Spalding University TRAVELING WITH EF COLLEGE STUDY TOURS: THE ESSENTIALS FOR PRAGUE AND BERLIN The MFA Program has a dedicated customer-service representative at EF College Study

More information

Network Security Deployment (NSD)

Network Security Deployment (NSD) Network Security Deployment (NSD) National Cybersecurity Protection System (NCPS) 11 July 2012 What is the NCPS? National Cybersecurity Protection System (NCPS) is the program of record within the Department

More information

Worldwide attacks on SS7 network

Worldwide attacks on SS7 network Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture

More information

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98 Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide

More information

WAP PUSH, UP.NOTIFY, AND SMS Features and Benefits Comparison

WAP PUSH, UP.NOTIFY, AND SMS Features and Benefits Comparison WAP PUSH, UP.NOTIFY, AND SMS January 2002. Product Overview This summarizes the key differences between WAP Push, UP.Notify, and SMS. WAP Push is supported by Openwave Mobile Browser Version 5 and higher.

More information

IoT Analytics: Four Key Essentials and Four Target Industries

IoT Analytics: Four Key Essentials and Four Target Industries IoT Analytics: Four Key Essentials and Four Target Industries 1 Introduction Analysts and IT personnel across all industries seek technology to better engage and manage data generated by the Internet of

More information

TORNADO Solution for Telecom Vertical

TORNADO Solution for Telecom Vertical BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very

More information

Know Your Foe. Threat Infrastructure Analysis Pitfalls

Know Your Foe. Threat Infrastructure Analysis Pitfalls Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking

More information

Opening a Bank Account

Opening a Bank Account Opening a Bank Account If you are new or returning to the UK Introduction These days it is much easier for people to work abroad. When we do we usually need a bank account in the country we move to so

More information

INTELLIGENCE AND HOMELAND DEFENSE INSIGHT

INTELLIGENCE AND HOMELAND DEFENSE INSIGHT I N D U S T R Y INTELLIGENCE AND HOMELAND DEFENSE INSIGHT INTELLIGENCE AND HOMELAND DEFENSE CHALLENGES The Intelligence Community (IC) needs the right information, in real time, to make critical decisions.

More information

Processing and Analyzing Streams. CDRs in Real Time

Processing and Analyzing Streams. CDRs in Real Time Processing and Analyzing Streams of CDRs in Real Time Streaming Analytics for CDRs 2 The V of Big Data Velocity means both how fast data is being produced and how fast the data must be processed to meet

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have

More information

SERVICE ASSURANCE SOLUTIONS THAT EMPOWER OPERATORS TO MANAGE THEIR BUSINESSES MORE EFFECTIVELY AND EXTEND THE VALUE OF BSS

SERVICE ASSURANCE SOLUTIONS THAT EMPOWER OPERATORS TO MANAGE THEIR BUSINESSES MORE EFFECTIVELY AND EXTEND THE VALUE OF BSS SERVICE ASSURANCE SOLUTIONS THAT EMPOWER OPERATORS TO MANAGE THEIR BUSINESSES MORE EFFECTIVELY AND EXTEND THE VALUE OF BSS Operators today are being driven to introduce new processes and management tools

More information

Dealing with Big Data in Cyber Intelligence

Dealing with Big Data in Cyber Intelligence Dealing with Big Data in Cyber Intelligence Greg Day Security CTO, EMEA, Symantec Session ID: HT-303 Session Classification: General Interest What will I take away from this session? What is driving big

More information

Master Data Management: More than a single view of the enterprise? Tony Fisher President and CEO

Master Data Management: More than a single view of the enterprise? Tony Fisher President and CEO Master Data Management: More than a single view of the enterprise? Tony Fisher President and CEO Agenda Why MDM? Why CDI? Business Drivers for MDM Are You Ready for MDM? What is Master Data Management?

More information

Network Analytics Accelerator

Network Analytics Accelerator Network Analytics Accelerator Turn your Big Data into Big Opportunity Joël Viale Telecom Solutions Lab Solution Architect Key trends in Communications 1 Proliferation of Smart Devices/New Network Technologies

More information

The State of Real-Time Big Data Analytics & the Internet of Things (IoT) January 2015 Survey Report

The State of Real-Time Big Data Analytics & the Internet of Things (IoT) January 2015 Survey Report The State of Real-Time Big Data Analytics & the Internet of Things (IoT) January 2015 Survey Report Executive Summary Much of the value from the Internet of Things (IoT) will come from data, making Big

More information

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University Evaluating, choosing and implementing a SIEM solution Dan Han, Virginia Commonwealth University A little about me Worked in IT for about 15 years Worked in Application Development, Desktop Support, Server

More information

Innovations in London s transport: Big Data for a better customer experience

Innovations in London s transport: Big Data for a better customer experience Innovations in London s transport: Big Data for a better customer experience Lauren Sager Weinstein Head of Analytics, Customer Experience Transport for London November 2015 Today s presentation agenda

More information

Airline Disruption Management

Airline Disruption Management Airline Disruption Management In a world of crowded planes and crowded skies, and where operational problems are quickly magnified by tight systemic constraints, one of the few ways airlines can truly

More information

UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C.

UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. TOP 8ECRET//COMJNTt/NOFOR..~ UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN RE APPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE PRODUCTION IB TH

More information

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation

More information

Developing a successful Big Data strategy. Using Big Data to improve business outcomes

Developing a successful Big Data strategy. Using Big Data to improve business outcomes Developing a successful Big Data strategy Using Big Data to improve business outcomes Splunk Company Overview Copyright 2013 Splunk Inc. Company (NASDAQ: SPLK) Business Model / Products Customers (6000+)

More information

Bruhati Technologies. About us. ISO 9001:2008 certified. Technology fit for Business

Bruhati Technologies. About us. ISO 9001:2008 certified. Technology fit for Business Bruhati Technologies ISO 9001:2008 certified Technology fit for Business About us 1 Strong, agile and adaptive Leadership Geared up technologies for and fast moving long lasting With sound understanding

More information

2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist

2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist 2015 Analyst and Advisor Summit Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist Agenda Key Facts Offerings and Capabilities Case Studies When to Engage

More information

New Technology Capabilities

New Technology Capabilities New Technology Capabilities Software/Applications 1. Biometric ID capability 2. Standardized secure, connectivity, and storage of data (bio, roles, etc) 3. Rules- based expert engine a. Automated dispatch

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Attunity Better Data Movement For The Internet Of Things

Attunity Better Data Movement For The Internet Of Things Attunity Better Data Movement For The Internet Of Things Internet of Things North America Chicago 4-15-2015 Kevin Petrie Senior Director Attunity 4/15/15 Telemetry Has Come A Long Way Weather Sensors on

More information

HTTP Data Logging Protocol

HTTP Data Logging Protocol HTTP Data Logging Protocol Version 1.5 (introduced with Meteohub 4.9) 1. Mission Statement The mission of this document is to provide a protocol specification that allows to handover weather data logged

More information

Active Response: Automated Risk Reduction or Manual Action?

Active Response: Automated Risk Reduction or Manual Action? SESSION ID: CRWD-01 Active Response: Automated Risk Reduction or Manual Action? sec ops dream Monzy Merza Chief Security Evangelist Splunk @monzymerza Agenda Active Response Drivers Facets of Active Response

More information

LAYMAN S GUIDE TO USING SSIM

LAYMAN S GUIDE TO USING SSIM LAYMAN S GUIDE TO USING SSIM 1. Introduction This guide has been compiled to give the first-time user a broad outline on how to compose a slot clearance message for any of the airports, for which Airport

More information

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC) Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,

More information