See Criminal Internet Communication as it Happens.



Similar documents
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NETWORKS AND THE INTERNET

Networks and the Internet A Primer for Prosecutors and Investigators

EAGLE EYE IP TAP. 1. Introduction

Cover. White Paper. (nchronos 4.1)

Using the Web service

IBM SECURITY QRADAR INCIDENT FORENSICS

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

HP Intelligent Management Center User Access Management Software

Lync for Mac 2011 Deployment Guide

EAGLE EYE Wi-Fi. 1. Introduction

Rebasoft Auditor Quick Start Guide

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

How To Test A Web Server

Win the race against time to stay ahead of cybercriminals

Portal Administration. Administrator Guide

Using over FleetBroadband

Web Filter. SurfControl Web Filter 5.0 Installation Guide. The World s #1 Web & Filtering Company

Server & Application Monitor

Data Protection. Administrator Guide

Network Security Platform 7.5

IBM Tivoli Monitoring for Network Performance

CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

IBM Advanced Threat Protection Solution

Netwrix Auditor for Exchange

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

The webinar will begin shortly

Clusterpoint Network Traffic Security System. User manual

Elo Touch Solutions Privacy Policy

HP A-IMC Firewall Manager

AKCess Pro Server Management Software

WEB HELP DESK GETTING STARTED GUIDE

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

LifeSize Control Installation Guide

Advanced Configuration Steps

Network Forensics Network Traffic Analysis

Becoming an Agile Digital Detective

Cisco Wireless Control System (WCS)

PATROL Internet Server Manager Technical Brief

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

PATROL From a Database Administrator s Perspective

How To Fix A Fault Notification On A Network Security Platform (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent

Cisco UCS Central Software

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size.

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version /12/13. Product Information. Version & Platform SGOS 6.

TITANXR Multi-Switch Management Software

Server Installation ZENworks Mobile Management 2.7.x August 2013

Copyright 2012 Trend Micro Incorporated. All rights reserved.

alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

CISCO WIRELESS CONTROL SYSTEM (WCS)

MassTransit vs. FTP Comparison

Server Installation Guide ZENworks Patch Management 6.4 SP2

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Cisco Application Networking Manager Version 2.0

IIS, FTP Server and Windows

WatchGuard Training. Introduction to WatchGuard Dimension

Vistara Lifecycle Management

GoDaddy Accounts & IMAP

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future

Oracle Enterprise Operations Monitor

Safe internet for business use: Getting Started Guide

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

CREATING YOUR ONLINE PRESENCE

NVivo Server 10 R2 INSTALLATION AND SET UP GUIDE

Junos Pulse for Google Android

IBM Tivoli Compliance Insight Manager

Network Security Forensics

Parallels Plesk Automation. Customer s Guide. Parallels Plesk Automation 11.5

Spontania User Setup Guide

HP IMC Firewall Manager

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

INSTALLATION AND SET UP GUIDE

McAfee Security. Management Client

Netwrix Auditor for SQL Server

Web Hosting Getting Started Guide

Delphi 2015 SP1-AP1 System Requirements

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

Administration Guide NetIQ Privileged Account Manager 3.0.1

Getting Started With Halo for Windows

IBM Rational Asset Manager

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.

NETWRIX EVENT LOG MANAGER

Novell ZENworks Asset Management 7.5

Mitel Unified Communicator Advanced

Transcription:

A PRODUCT OF See Criminal Internet Communication as it Happens. In Real Time or Recreated. From the Field or From Your Desk. That s Intelligence. That s Intellego.

2 / Visual Reconstruction & Analysis Speeds Investigations Digital communication has changed criminal behavior by removing time zone and geographic barriers and increasing the opportunity for anonymity. The ability to lawfully intercept, visually reconstruct and analyze digital communication is now a critical capability for law enforcement personnel. To meet this growing need, SS8 developed Intellego. Powerful features enable users to quickly identify communication patterns and behavior, greatly improving the speed at which law enforcement can work. MADE FOR LAW ENFORCEMENT» Keep up with ever-changing Internet applications» Quickly identify targets and their suspected associates» Simple, secure deployment model requires minimal training» Secure presentation and preservation of evidentiary data SEE A TARGET S INTERNET COMMUNICATIONS With Intellego, users can see a target s communication exactly as it was viewed or created during a web session. This advancement significantly speeds up the investigation process when compared to other applications, which often require specialized IT expertise to dissect IP packet captures and other files. IDENTIFY COMMUNICATION PATTERNS Intellego s communication forensics features include a powerful search engine, social network analysis (SNA) graphing and SS8 s idossier Internet identity profile application. These features work together to find and display communication relationships and patterns. Forensic algorithms assist users in identifying criminal organizations, leaders, gatekeepers, associates and other targets. See What They See, In Real Time Intellego reconstructs a target s online sessions and accurately reproduces every detail. By visually displaying the actual Internet activities of a target sites visited, chat conversations, email content, files, photos, videos users can immediately determine their meaning and relevance to an investigation. VIEW COMMUNICATION CONTENT» Monitor email and webmail communications, including a target s draft-only emails, attached files, pictures and videos» Follow a target s chat sessions, in real time, and then act immediately when required» View visited web pages, including uploads and downloads» Monitor websites; see who uploaded or downloaded content» Observe social media content including profile, friend lists, photos, and videos Intellego In Action: Intellego visually and accurately reconstructs web pages to follow the browsing patterns of a target.

3 / Visual Reconstruction: Visual reconstruction of specific web pages that a target has visited is a key Intellego difference. Investigators can now follow the exact browsing patterns of a target and quickly identify unusual or suspect behavior. And since the full textual and graphical content of the web page is reconstructed, they can save meaningful portions of the web session for later analysis. EMAIL Intellego displays e-mail text exactly as it was seen in the original web application. This includes the e-mail envelop header fields To, From, Cc, Subject and a list of attachments. With a simple click of a mouse, Intellego also displays email attachments such as Word documents, Excel spreadsheets, photos and videos. CHAT Intellego monitors and displays chat sessions in real time. Chat dialogues are shown in the correct chronological order so that it is easy to follow conversations as they happen. SOCIAL MEDIA Today s social media applications include private messaging, wall posting, news feeds, real-time chat, and even embedded email applications. Intellego makes it easy for law enforcement to view social media page content. WEB BROWSING Visual reconstruction of specific web pages that a target has visited is a key Intellego difference. Investigators can now follow the exact browsing patterns of the target and quickly identify unusual or suspect behavior. And since the full textual and graphical content of the web page is reconstructed, they can save meaningful portions of the web session for later analysis, evidence or for use in identifying additional suspects. As a website itself may be the target of an investigation, Intellego allows users to log the IP addresses of visitors to a suspicious website and identify those who have uploaded content to or downloaded content from the site. SUBPOENAED BATCH FILES Intellego s flexible, automated file import feature allows users to view, analyze and reproduce subpoenaed emails, packet capture files and call records. Intellego In Action: Intellego displays chat sessions in real time.

4 / Turning Data Into Actionable Intelligence Intellego s communication forensic features dissect metadata (message sender identity, recipients, date and time, duration, website URL, attachments) revealing patterns and allowing users to quickly identify suspicious behavior and relationships. ADVANCED SEARCH AND COMPLEX QUERY Intellego fully indexes all captured communication content including file types such as Word documents and metadata records for searches and queries, returning relevant results in seconds. Search criteria may be as simple as a name or keyword or as complex as a long query with multiple operators such as, find all occurrences of people downloading pictures from a website, between 9pm and 11pm where the file size is greater than 400KB. AUTOMATED SEARCH Users can automate searches to run in the background, freeing their time for other investigative tasks. These queries may be scheduled to run periodically or upon receipt of a communication event relevant to a particular case. When compared with manual analysis, automated results are far more accurate due to the tremendous volume of data being analyzed. Email or SMS message alerts may be defined to notify users when results are received. SOCIAL NETWORK ANALYSIS (SNA) Intellego s Social Network Analysis module graphically displays relationships in a link chart, allowing users to quickly see communication patterns. Users can select different chart formats to deduce a target s role, such as a leader, a communication gatekeeper or simply a participant. Flexible filtering enables users to further hone in by looking at events by time of day or application type, such as email or chat or social media. Intellego s advanced SNA algorithms identify islands of communication automatically based on a specified number of associates and degrees of separation. Additional algorithms assist in identifying the most connected individuals, indicating potential sub-group leaders. VIEW COMMUNICATION PATTERNS» Create link charts illustrating relationships between targets and discover hierarchies within groups» Identify key group members and hidden relationships» Associate suspicious behavioral patterns to identities IDOSSIER INTERNET PROFILE idossier enables the creation of a target s Internet profile, correlating suspected Internet identities with real-life identities. Starting with seed information about a target, such as an IP address, webmail login id, or chat handle, Intellego associates IP addresses with login IDs to suggest aliases. Then users have the ability to add identities to the suspect s idossier. Intellego In Action: Integrated social network analysis module reveals communication patterns and uncovers hidden relationships.

5 / idossier: Intellego s idossier enables users to compile an Internet profile for a target. idossier correlates suspected Internet identities to a target s real-life identity. Intellego In Action: Intellego s idossier builds an Internet profile of a suspect.

6 / Made For Law Enforcement Simple. Powerful. Useful. Intellego is built upon a secure, robust case management framework, made specifically for law enforcement. An administrator assigns each user a role granting privileges defined for various job functions and departments. The administrator also assigns cases to a specific user or to multiple users with access to a particular case strictly controlled using authentication credentials and enforced by Intellego s security policies. As management of evidence is imperative for use in a court of law, Intellego allows users to prepare professional reports, charts, graphs and documents for case review by prosecutors and for courtroom presentation. EVIDENCE MARKING Intellego allows users to mark each communication intercept or event as pertinent or non-pertinent as well as privileged or non-privileged to meet compliance regulations. TAMPER-EVIDENT SEAL Intellego creates an electronic signature for every intercept record in its database to validate that evidence has not been altered. Using Intellego Client Application, investigators and analysts can access all lawfully intercepted communication records from a desktop, laptop or tablet computer while in the office or the field. Real-time monitoring allows investigators to view chats, text messages or social media postings and react as they happen. Intellego s intuitive, easy-to-use graphical user interface requires minimal training and no specialized computer skills, even for the most complex tasks. Online help minimizes support requirements for an agency s IT staff. REAL-TIME MONITORING FROM THE FIELD A single Intellego Analytics Platform server, installed in the back office, can scale to support more than a hundred users. Connections to the server are accomplished using a secure, encrypted connection from a standard web browser. The Analytics Platform provides the processing that decodes and identifies various Internet applications and protocols. It also includes a database that stores and indexes communication content and metadata. A high performance search engine can deliver results from complex queries of billions of records in seconds. USER ACTIVITY LOGS Intellego delivers activity logs which provide an unalterable record of each user s activity on an intercept or case. REPORTING Intellego includes flexible reporting to support legal compliance requirements as well as for workload management. STANDARDS COMPLIANCE Intellego complies with all relevant CALEA and ETSI lawful interception standards. Intellego s flexible architecture may be adapted easily to integrate with other law enforcement analytical applications. CONTINUOUS PROTOCOL MONITORING SS8 continuously monitors Internet communication applications and protocols for changes that may affect the ability to reconstruct or analyze them. Intellego s modular architecture allows system updates to occur without restarting. 24/7 SERVICE AND SUPPORT SS8 s worldwide phone support centers provide 24/7 service and support. Our online technical support provides the fast, easy means needed to get answers or to report a problem. SS8 INTELLEGO TRAINING SS8 offers brief general overview webinars for users as well as fully-customized, multi-day, hands-on seminars. This affords law enforcement agencies the opportunities to realize the highest value from their investment.

7 / Product Specifications* CAPACITY» Up to 50 concurrent users» Up to 2000 active intercepts» Up to 200 Mbps peak incoming data rate» Up to 100 TB retained intercept storage CALEA INTERFACES» J-STD-25B» T1-IAS» ETSI TS 102.232» ETSI TS 133.108» Packet Capture Files (PCAP) PROTOCOL SUPPORT Intellego supports the following protocols (un-encrypted):» Web HTTP Sessions, including embedded audio/video files Youtube» Chat / IM, including file transfers, audio and video calls MSN Live Yahoo AOL/AIM ICQ Google Talk Paltalk» Webmail, including attachments Hotmail (MSN Live) Google Mail Yahoo Mail» E-mail, including attachments SMTP, POP3, IMAP4» Mobile Messaging, including attachments SMS MMS» Network Protocols FTP» Social Media Facebook Wall Posts News Feed» File imports of e-mails / IM s in several formats including.eml,.mbox and.csv ANALYSIS APPLICATIONS» Intellego Query Engine - Perform multi-factor searches and queries based on: Full text indexes of intercepted data, both call content and call data Time based behavior; find event x after event y occurs» Link / Social Network Analysis Package Performs integrated analysis on intercepted or imported communications intercepts» idossier Creates and manages an Internet dossier MANAGEMENT SUPPORT» Case Management: Workflow management with flexible case assignment» Security: Full Role-Based Access Controls (RBAC) Multi-level data sensitivity access restrictions Multi-tenant capability with full data isolation Full user activity logs» High availability» Full system administration through Intellego s iadmin graphical interface» SNMP alarming and error logging MINIMUM HARDWARE REQUIREMENTS» Intel based servers from IBM, HP and Dell with the following minimum specifications: Dual Intel Xeon X5675 6 Core / 3.06GHz Processors 48 GB Main memory 1.8 TB disk space OPERATING SYSTEM» RedHat Enterprise Linux 6.0 * Many features shown are optional, consult your SS8 account representative for details and availability. Some of the features listed may be under development. Please contact SS8 for the feature availability schedule. This document does not create any express warranty by SS8 Networks or about its products or services. SS8 Network s sole warranty is contained in the written product warranty for each product. The end-user documentation shipped with SS8 s products constitutes the sole specifications referred to in the product warranty. The customer is solely responsible for verifying the suitability of SS8 s products for use in its network. Specifications are subject to change without notice. Copyright 2011 SS8 Networks, Inc. SS8, the SS8 logo, Xcipio, Intellego, idossier are trademarks of SS8 Networks, Inc. All other trademarks mentioned in this document are the property of their respective owners.

For more information: Sales @ SS8.com