SKYNET: Applying Advanced
|
|
|
- Lisa Brittany Arnold
- 9 years ago
- Views:
Transcription
1 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL?M1 h e SKYNET: Applying Advanced,bfl mm p* iii^bm I IV flhsmp DA U 0 ' a.. *: wm : ^MMMIMWai» 11 by S2I, R6, T12, T14, - Presenters: pres, S2I51, R66F T: J.f-fc V..-. TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL..V ivv I" ". Zi v*r ' ' : ff/if^. ' QeWttfftorii: NSA/CSSM » M l. Dated: Wh \Z Declassify Oh: /
2 UNCLASSIFIED//FOUO Outline What is SKYNET? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic Triage UNCLASSIFI : EÖ//F.OÜO
3 Collaborative cloud research effort between 5 different organizations crossing 3 NSA Directorates: - Signals Intelligence: S2I, S22, SSG - Research: R6 - Technology: T12, T14 Partnerships - TMAC/FASTSCOPE - MIT Lincoln Labs & Harvard SKYNET applies complex combinations of geospatial, geotemporal, pattern-of-life, and travel analytics to bulk DNR data to identify patterns of suspect activity
4 CTMMC T0PSEdî N S A/CSS Counterterrorism Mission Management Center Bag hi in ' Mtfiaud-E Etacfl P -van C hank or I.twJ.i Sh ata > O Kabul \ f.v»h nr Lam Tuesday/Friday Asad bad Peshawar Rough outline of courier path as described by the targets Snn ag ar : Gardez Id am it> ad» Rawalpindi Sunday Waziristan s Courier/ Probably Faisalabad F a sal abad Lahore U Sunday/Monday Cimi TOP SECRET//COMINT//REL TO USA/AUS, CAN, GBR, NZL
5 TOP SECRET//COMINT//ORCON/REL- TO USA, AUS, CAN, GBR. NZl. SKYNET Analytic Questions Who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives? Who else is seen in the area when the traveler arrives, and who seen leaving the area shortly afterward? Who travels to/from Peshawar every other Sunday and "somewhere else" on a weekly basis? Who visits Akora Khattak periodically and also travels between Peshawar and Lahore? Who fits the above travel profiles and also possesses unusual behavior: One or two hops from other suspects or known tasked selectors Frequent handset swapping or powering down
6 TOP SECRET//COMINT//REL TO USA. A4JS. CAN. GBR. ISJZll ' «s U DEMONSPIT DEMONSPIT is a new dataflow for bulk Call Data Records (CDRs) from Pakistan - CDRs are being acquired from major PK Telecom providers Data is normalized through TUSKATTIRE, like all other Call Data Records DEMONSPIT data is forwarded by TUSKATTIRE to several Clouds: - GMHalo/DPS Promotes records to FASCIA and feeds the SEDB Tower QFD - GMPIace& Cloud 14 Ingests DEMONSPIT into Sortinglead summaries to support SKYNET Analytics Ingests DEMONSPIT into a Perishable QFD which will be available to analysts via JEMA and CINEPLEX - Bulldozer/MDR2 All of the clouds receiving DEMONSPIT data also receive all FASCIA data TOP SECRET//COMINT//REL TO USA, AUS, ; CAN, GBR,,N.Z,L
7 SECRET//C0M1NT//REL TO USA, AUS, CAN, GBR; NZL Analysts' View of DEMONSPIT TUSKATTIRE Original wcdrs Access to ALL DEMONSPIT Data TOWER QFD ROLLERCOASTER Original fccdrs JEMA MAINWAY/SIGNAV CINEPLEX Access to CDRs, Analyst Queries, & Results of SKYNET Analytics CDR Summaries SMARTTRACKER SO RUN G LEAD Analyst Promoted CDRs Access to DEMONSPIT FASCIA Promoted Data FASCIA ASSOCIATION BANYAN SKYNET & Analyst Promoted CDRs SECRET//COMINT//REL TO USA, AUS, : CÄN, GBR; NZU
8 UNCLASSIFIED//FOUO Outline What is SKYNET? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic Triage UNCLASSIFI : EÖ//F.OÜO
9 TOP SECRET//SI//REL TO USA, FVEY Cloud Analytic Building Blocks Travel Patterns - Travel phrases (Locations visited in given timeframe) - Regular/repeated visits to locations of interest Behavior-Based Analytics - Low use, incoming calls only - Excessive SIM or Handset swapping - Frequent Detach/Power-down - Courier machine learning models Other Enrichments Travel on particular days of the week Co-travelers Similar travel patterns Common contacts Visits to airports Other countries Overnight trips Permanent move TOP SECRET//SI//REL TO USA; FVEY
10 TOP SECRET//SI//REL TO USA, FVEY Sample Travel Report: Haqqani Network tasked- selector^ contact- swapping associated^ other_ seed-contacts count _num selectors visits_regularly countries phrase 3 lashkargah_city nowbahar IR helmand kandaharaf PK fa rah AF bala_bulk farah masow farah masow nowbahar masow 3 BA AE ghazni AF sharan urgon AF khost_airport kajir_kalay - m JF TOP SECRET//SI//REL TO USA; FVEY
11 TOP SECRET//SI//REL TO USA, FYEY. * *. * ' What Suspicious Selectors Were Seen Traveling Between Peshawar and Lahore? J VJ SoecifmBehavioral Cloud Analytics Peshawar-Lahore Travel 1-4 NOV 2011 ì J TASKED NUM_SELECTOR ASSOCIATED, ACTIVITY, TRAVEL PHRASE DOW MSISDN IMSI CONTACTS.SWAPPING SELECTORS CATEGORIES torkham AF PK peshawar lahore FRI 2 PK peshawar lahore THU behsud AF jalalabad jalal_abad jalalabad behsud rodat bati_kot mohmand_darah peshawar PK WED 4 7 gtrd PK nowshera gulbahar peshawar sanda kalan lahore THU jamrud PK peshawar lahore TUE 10 PK peshawar lahore THU TOP SECRET//SI//REL JO USA; FVEY. \ ; 5-or-f ewercontacts, smsand-zeroduration-callsonly, low-use
12 UNCLASSIFIED//FOUO Outline What isskynet? DEMONSPIT Data Flow Automated Bulk Cloud Analytics Analytic triage -SMARTTRACKER - RT-RG -JEMA UNCLASSIFIED//F.OÜO
13 TOP SECRET//SI//REL TO USA, FVEY Selectors of Interest from Cloud Travel Analytic (tasked) IMSIs: Handsets. I V. M'HAäS TOP SECRET//SI//REL TO USA: FVEY
14 TOP SECRET//SI//REL TO USA, FVEY. SMARTTRACKER Travel View 31 October - 23 November * Location: UCell JDl (11/14/ :27:47) * Location: UCefl ID 1/70/ :59:04) «fta KHATTAk SUSPECT TERRORIST FACILITY 001 (11/20/201112:59:04) * Location: UCell ID] (11/14/201102:19:16) Location: UCellJD (11/23/201114:23:55) (11/21/201114:55:37) Location: UCell '11/ :34:15) (11/20/ :34:15) 31 ' " N. 75*13' * E
15 TOP SECRET//SI//REL TO USA, FVEY. Examine travel patterns for common routes and meeting locations - Run cell soaks on all common meeting locations during meeting timeframe Analyze selectors for common contacts Analyze selectors for handset sharing behavior Repeat procedure with resulting selectors Correlate with other known and suspected selectors r TOP SECRET//SI//REL TO USA; FVEY:
16 TOP SECRET//SI//REL TO USA, FVEY. SMARTTRACKER Coincidence Report W+ Si Sets with 2 targets ' ' ' '* i Select Select 31 at 12 locations 24 at 11 locations Af.ft.r. t Select 1 at 1 location Select 1 at 1 location Select 1 at 1 location u
17
18 ^ 77 TOP SECRET//SI//REL TO USA, FVEY RT-RG Analytics mm m ^awiwffà am Meetings - who is at the same ucellid at the same time as the potential courier at the destination city?...multiple times. Sidekicks - is there a pair traveling together to the destination city? TOP SECRET//SI//REL TO USA; FVEY
19 TOP SECRET//SI//REL TO USA, F VE Y '' : / JEM A: Pulling It All Together sfcçug/tp Start/end points Dates Destination Cities Movement Irregularity Travel Reports Human in the loop to analyze travel reports. Evaluate, add value, prioritize Meetings Are selectors seen meeting at destination consistently? 10 Sidekicks Does Sidekick selector have call events?
20
Summary of DNR and DNI Co-Travel Analytics
Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information: Table of Contents Table of Contents 2 Introduction 3 Issues and Questions 3 Analytics 5 CHALKFUN 5 DSD Co-Travel Analytic
Content Extraction Enhancements For Target Analytics:
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Work funded by T1221 Center for
Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My
Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My The Proverbial Needle In A Haystack Problem The Nuclear Option Problem Statement and Proposed
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
AFGHANISTAN REHABILITATION ORGANIZATION (ARO)
AFGHANISTAN REHABILITATION ORGANIZATION (ARO) 12 OCT1993 To: Hv.Rrrtt Dvecis Project officer IRC/RAP for reporting.13 October..WW It 6.U Dear Mr. Britt Dveris! Thank you {'or culling. KncJnsferi pjenze
Summary of DNR and DNI Co-Travel Analytics
Summary of DNR and DNI Co-Travel Analytics S215 1 October 2012 Contact information Table of Contents Table oficontents 2 Introduction---------------------------- 3 Issues and Questions-------------------------
GeoMatrix. Positioning of Mobile Phones System
GeoMatrix Positioning of Mobile Phones System Geographic intelligence is one of the oldest forms of military intelligence, and one of the most important. From earliest times, an accurate knowledge and
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
How Using Big Data in Security Helps (and Hurts) Us
How Using Big Data in Security Helps (and Hurts) Us Kerry Matre, CIPP/US What is your role? 2 $300 Billion 3 What do insiders look like? 4 Basic insider threat monitoring Block IPs Signature based monitors
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)
LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY 1st TERM (14 SEPT - 27 NOV) Week 1 9.30-10.30 10.30-11.30 11.30-12.30 12.30-13.30 13.30-14.30 14.30-15.30 15.30-16.30
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND
All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR
THE EVOLUTION OF SIEM
THE EVOLUTION OF SIEM WHY IT IS CRITICAL TO MOVE BEYOND LOGS Despite increasing investments in security, breaches are still occurring at an alarming rate. 43% Traditional SIEMs have not evolved to meet
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
What s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted
What s New in Security Analytics 10.4 Be the Hunter.. Not the Hunted Attackers Are Outpacing Detection Attacker Capabilities Time To Discovery Source: VERIZON 2014 DATA BREACH INVESTIGATIONS REPORT 2 TRANSFORM
How To Make Data Streaming A Real Time Intelligence
REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION Francine Forney, Senior Management Consultant, Fuel Consulting, LLC May 2013
ENHANCING INTELLIGENCE SUCCESS: DATA CHARACTERIZATION, Fuel Consulting, LLC May 2013 DATA AND ANALYSIS INTERACTION Understanding the content, accuracy, source, and completeness of data is critical to the
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Fuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen
Side 1 af 43 Side 2 af 43 Side 3 af 43 Side 4 af 43 Side 5 af 43 Side 6 af 43 Side 7 af 43 Side 8 af 43 Side 9 af 43 Side 10 af 43 Side 11 af 43 Side 12 af 43 Side 13 af 43 Side 14 af 43 Side 15 af 43
Fuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen
Side 1 af 41 Side 2 af 41 Side 3 af 41 Side 4 af 41 Side 5 af 41 Side 6 af 41 Side 7 af 41 Side 8 af 41 Side 9 af 41 Side 10 af 41 Side 11 af 41 Side 12 af 41 Side 13 af 41 Side 14 af 41 Side 15 af 41
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
Locating Mobile Phones using Signalling System #7. Tobias Engel <[email protected]> twitter: @2b_as
Locating Mobile Phones using Signalling System #7 Tobias Engel twitter: @2b_as What is Signalling System #7? protocol suite used by most telecommunications operators throughout the world
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Big Data Governance Certification Self-Study Kit Bundle
Big Data Governance Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Governance Certification.
DATA MANAGEMENT FOR THE INTERNET OF THINGS
DATA MANAGEMENT FOR THE INTERNET OF THINGS February, 2015 Peter Krensky, Research Analyst, Analytics & Business Intelligence Report Highlights p2 p4 p6 p7 Data challenges Managing data at the edge Time
UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE
JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT
NTI Law Enforcement Systems and Services
NTI Law Enforcement Systems and Services PO Box 99, Jefferson, NH 03583 (603) 586-7156 [fax (603) 586-7164] Enhancing Counter-Terrorism and Criminal Investigations with Telephonic Information The need:
Click to edit Master title style
Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 UNCLASSIFIED Semantic Enrichment of the Data
CallMiner Speech Analytics Everything else is just talk. Cliff LaCoursiere SVP Business Development - CallMiner, Inc.
CallMiner Speech Analytics Everything else is just talk. Cliff LaCoursiere SVP Business Development - CallMiner, Inc. Agenda Why speech analytics? How CallMiner speech analytics works Speech analytics
The Future of Business Analytics is Now! 2013 IBM Corporation
The Future of Business Analytics is Now! 1 The pressures on organizations are at a point where analytics has evolved from a business initiative to a BUSINESS IMPERATIVE More organization are using analytics
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Big Data Governance Certification Self-Study Kit Bundle
Big Data Governance Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Governance Certification.
How To Apply For A College Online
APPLICANT S HELP GUIDE Online College Applications System (OCAS), a project of Government of Punjab to facilitate students in securing admission with convenience JULY 2015 1 1 OVERVIEW Online College Applications
Agilent Network Monitoring Content Intercept Manager
Agilent Network Monitoring Content Intercept Manager Enabling Lawful Intercept agencies to keep pace with evolving cellular networks CIM is a flexible tool allowing precise and secure lawful interception
The Role of Automation Systems in Management of Change
The Role of Automation Systems in Management of Change Similar to changing lanes in an automobile in a winter storm, with change enters risk. Everyone has most likely experienced that feeling of changing
Complex Event Processing (CEP) Why and How. Richard Hallgren BUGS 2013-05-30
Complex Event Processing (CEP) Why and How Richard Hallgren BUGS 2013-05-30 Objectives Understand why and how CEP is important for modern business processes Concepts within a CEP solution Overview of StreamInsight
The Analytics Value Chain Key to Delivering Value in IoT
Vitria Operational Intelligence The Value Chain Key to Delivering Value in IoT Dr. Dale Skeen CTO and Co-Founder Internet of Things Value Potential $20 Trillion by 2025 40% 2015 Vitria Technology, Inc.
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014
Real Time Wireless based Train Tracking, Track Identification and Collision avoidance System for Railway Sectors 1 R. Immanuel Rajkumar, 2 Dr.P. E. Sankaranarayanan, and 3 Dr.G.Sundari 1 Research Scholar,
Using Social Ties to Predict Missing Customer Information Stamatis Stefanakos
D1 Solutions AG a Netcetera Company Using Social Ties to Predict Missing Customer Information Stamatis Stefanakos DMIN 2009 2 Outline Who we are The data landscape in telecoms The call graph Predicting
Cisco Dynamic Workload Scaling Solution
Cisco Dynamic Workload Scaling Solution What You Will Learn Cisco Application Control Engine (ACE), along with Cisco Nexus 7000 Series Switches and VMware vcenter, provides a complete solution for dynamic
IVR (Interactive Voice Response) Operation Manual. Copyright 2012 Agile Networks, Inc. All Rights Reserved.
IVR (Interactive Voice Response) Operation Manual Copyright 2012 Agile Networks, Inc. All Rights Reserved. Table of Contents ddw Settings (Setting User Information) An Agile Cloud PBX Option feature. This
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Best Practices in Improving Lead Generation Guidelines for improving lead generation
Web Lead Generation Best Practices in Improving Lead Generation Guidelines for improving lead generation white paper 2 Table of contents 1. The challenge... 3 2. The solution... 4 2.1 Define a clear process...
How telcos can benefit from streaming big data analytics
inform innovate accelerate optimize How telcos can benefit from streaming big data analytics #streamingbigdataanalytics Sponored by: 2013 TM Forum 1 V2013.4 Today s Speakers Adrian Pasciuta Director of
Group Life Insurance-FAQs
Group Life Insurance-FAQs What is Group Life Insurance? Group life insurance is term life insurance that extends cover to a group of people usually employees of Companies, Banks, NGOs or members of a union
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
Big Data Architect Certification Self-Study Kit Bundle
Big Data Architect Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Architect Certification.
SMS SS7 Fraud 3.1 16 February 2005
UN SMS SS7 Fraud 3.1 16 February 2005 This is a non-binding permanent reference document of the GSM Association. Security Classification Category (see next page) This is an UN official document Security
THE INSTITUTE OF CHARTERED ACCOUNTANTS OF PAKISTAN Applying for the Financial Assistance under Students Endowment Fund 20
THE INSTITUTE OF CHARTERED ACCOUNTANTS OF PAKISTAN Applying for the Financial Assistance under Students Endowment Fund 20 For the students who are eligible for the financial assistance and are registered
Intelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
Safe Harbor Statement
Defining a Roadmap to Big Data Success Robert Stackowiak, Oracle Vice President, Big Data 17 November 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group May 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
MFA in Writing Program Spalding University TRAVELING WITH EF COLLEGE STUDY TOURS: THE ESSENTIALS FOR PRAGUE AND BERLIN
MFA in Writing Program Spalding University TRAVELING WITH EF COLLEGE STUDY TOURS: THE ESSENTIALS FOR PRAGUE AND BERLIN The MFA Program has a dedicated customer-service representative at EF College Study
Network Security Deployment (NSD)
Network Security Deployment (NSD) National Cybersecurity Protection System (NCPS) 11 July 2012 What is the NCPS? National Cybersecurity Protection System (NCPS) is the program of record within the Department
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
WAP PUSH, UP.NOTIFY, AND SMS Features and Benefits Comparison
WAP PUSH, UP.NOTIFY, AND SMS January 2002. Product Overview This summarizes the key differences between WAP Push, UP.Notify, and SMS. WAP Push is supported by Openwave Mobile Browser Version 5 and higher.
IoT Analytics: Four Key Essentials and Four Target Industries
IoT Analytics: Four Key Essentials and Four Target Industries 1 Introduction Analysts and IT personnel across all industries seek technology to better engage and manage data generated by the Internet of
TORNADO Solution for Telecom Vertical
BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very
Know Your Foe. Threat Infrastructure Analysis Pitfalls
Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking
Opening a Bank Account
Opening a Bank Account If you are new or returning to the UK Introduction These days it is much easier for people to work abroad. When we do we usually need a bank account in the country we move to so
INTELLIGENCE AND HOMELAND DEFENSE INSIGHT
I N D U S T R Y INTELLIGENCE AND HOMELAND DEFENSE INSIGHT INTELLIGENCE AND HOMELAND DEFENSE CHALLENGES The Intelligence Community (IC) needs the right information, in real time, to make critical decisions.
Processing and Analyzing Streams. CDRs in Real Time
Processing and Analyzing Streams of CDRs in Real Time Streaming Analytics for CDRs 2 The V of Big Data Velocity means both how fast data is being produced and how fast the data must be processed to meet
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have
SERVICE ASSURANCE SOLUTIONS THAT EMPOWER OPERATORS TO MANAGE THEIR BUSINESSES MORE EFFECTIVELY AND EXTEND THE VALUE OF BSS
SERVICE ASSURANCE SOLUTIONS THAT EMPOWER OPERATORS TO MANAGE THEIR BUSINESSES MORE EFFECTIVELY AND EXTEND THE VALUE OF BSS Operators today are being driven to introduce new processes and management tools
Dealing with Big Data in Cyber Intelligence
Dealing with Big Data in Cyber Intelligence Greg Day Security CTO, EMEA, Symantec Session ID: HT-303 Session Classification: General Interest What will I take away from this session? What is driving big
Master Data Management: More than a single view of the enterprise? Tony Fisher President and CEO
Master Data Management: More than a single view of the enterprise? Tony Fisher President and CEO Agenda Why MDM? Why CDI? Business Drivers for MDM Are You Ready for MDM? What is Master Data Management?
Network Analytics Accelerator
Network Analytics Accelerator Turn your Big Data into Big Opportunity Joël Viale Telecom Solutions Lab Solution Architect Key trends in Communications 1 Proliferation of Smart Devices/New Network Technologies
The State of Real-Time Big Data Analytics & the Internet of Things (IoT) January 2015 Survey Report
The State of Real-Time Big Data Analytics & the Internet of Things (IoT) January 2015 Survey Report Executive Summary Much of the value from the Internet of Things (IoT) will come from data, making Big
Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University
Evaluating, choosing and implementing a SIEM solution Dan Han, Virginia Commonwealth University A little about me Worked in IT for about 15 years Worked in Application Development, Desktop Support, Server
Innovations in London s transport: Big Data for a better customer experience
Innovations in London s transport: Big Data for a better customer experience Lauren Sager Weinstein Head of Analytics, Customer Experience Transport for London November 2015 Today s presentation agenda
Airline Disruption Management
Airline Disruption Management In a world of crowded planes and crowded skies, and where operational problems are quickly magnified by tight systemic constraints, one of the few ways airlines can truly
UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C.
TOP 8ECRET//COMJNTt/NOFOR..~ UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN RE APPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE PRODUCTION IB TH
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
Developing a successful Big Data strategy. Using Big Data to improve business outcomes
Developing a successful Big Data strategy Using Big Data to improve business outcomes Splunk Company Overview Copyright 2013 Splunk Inc. Company (NASDAQ: SPLK) Business Model / Products Customers (6000+)
Bruhati Technologies. About us. ISO 9001:2008 certified. Technology fit for Business
Bruhati Technologies ISO 9001:2008 certified Technology fit for Business About us 1 Strong, agile and adaptive Leadership Geared up technologies for and fast moving long lasting With sound understanding
2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist
2015 Analyst and Advisor Summit Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist Agenda Key Facts Offerings and Capabilities Case Studies When to Engage
New Technology Capabilities
New Technology Capabilities Software/Applications 1. Biometric ID capability 2. Standardized secure, connectivity, and storage of data (bio, roles, etc) 3. Rules- based expert engine a. Automated dispatch
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Attunity Better Data Movement For The Internet Of Things
Attunity Better Data Movement For The Internet Of Things Internet of Things North America Chicago 4-15-2015 Kevin Petrie Senior Director Attunity 4/15/15 Telemetry Has Come A Long Way Weather Sensors on
HTTP Data Logging Protocol
HTTP Data Logging Protocol Version 1.5 (introduced with Meteohub 4.9) 1. Mission Statement The mission of this document is to provide a protocol specification that allows to handover weather data logged
Active Response: Automated Risk Reduction or Manual Action?
SESSION ID: CRWD-01 Active Response: Automated Risk Reduction or Manual Action? sec ops dream Monzy Merza Chief Security Evangelist Splunk @monzymerza Agenda Active Response Drivers Facets of Active Response
LAYMAN S GUIDE TO USING SSIM
LAYMAN S GUIDE TO USING SSIM 1. Introduction This guide has been compiled to give the first-time user a broad outline on how to compose a slot clearance message for any of the airports, for which Airport
Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
