From Lawful to Massive Interception : Aggregation of sources. amesys - Prague ISS World Europe 2008



Similar documents
Surveillance and Security Systems

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Big Data in Telecom value chain. Presented by: Gurjot S Sandhu Director Sales Xalted Information Systems Pvt. Ltd.

EAGLE EYE Wi-Fi. 1. Introduction

ISSWorld Latin America

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Network Monitoring as an essential component of IT security

Argos Thuraya Interception L-Band System

EAGLE EYE IP TAP. 1. Introduction

Introduction to Engineering Using Robotics Experiments Lecture 17 Big Data

LAVASTORM ANALYTICS lavastorm.com. Transforming Fraud Management with Agile Data Analytics

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution

Smart Transport ITS Norway

t/erint en z en CD a: "'- c. ea Q) 0 ~ ~ Q) ea '(3 POWERING ACTIONABLE INTELLIGENCE ~~~> ~ - "'0 s:::: LL. ea (.) (ij.s:::: "'- :t: Q) ea 'E

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

we secure YOUR network we secure network security English network security

The SIEM Evaluator s Guide

Unified Security Management and Open Threat Exchange

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING

User Documentation Web Traffic Security. University of Stavanger

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

CYBER SECURITY STRATEGY AN OVERVIEW

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

Urban Transport Security presented by Patrick Dillenseger RATP

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

The degrees on offer at TELECOM Bretagne are internationally recognized. Higher Education Area (EHEA). Allocation of the 1160 students by degree

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

Setting the Standard for Safe City Projects in the United States

Masters of Safety & Security. EUCISE2020 Industry Day Brussels September 23, 2015 SIGNALIS Presentation

The future of Big Data A United Hitachi View

SMART CITY. The interconnected city: improving the quality of life of citizens

4G Aggregation Network Monitoring (ANM) Switch

How To Understand The History Of Navigation In French Marine Science

RUAG Cyber Security. More security for your data

VoIP Platform: A Solution to Advance Communication Practices in Health Sectors

TORNADO Solution for Telecom Vertical

Agilent OSS access7 Signaling Meter

METEOROLOGICAL WARNINGS STUDY GROUP (METWSG)

Intelligence Solutions Monitoring Center. Keep your eyes open

Legislative Council Panel on Security Creation of a permanent Chief Superintendent of Police post of the Cyber Security and Technology Crime Bureau

Records Authority. Australian Security Intelligence Organisation

PRESENTATION SPACE MISSIONS

Hosted Video in Cloud Computing

New implementions of predictive alternate analog/rf test with augmented model redundancy

Crystal Innovation Solution 16 Moshe Shapira St., Rishon Le-Zion, 75704, Israel Crystal Gears

Unlimited. Click4Assistance - Package Comparison. The Packages...

Smart city: how does sharing data contribute to improving the way we experience our day-to-day lives in the city?

Agilent Network Monitoring Content Intercept Manager

The Performance Management Process How to establish goals, objectives and KPI s

A New Era Of Analytic

Regulation of Investigatory Powers Act 2000

The Future of the Advanced SOC

A REMOTE HOME SECURITY SYSTEM BASED ON WIRELESS SENSOR NETWORK AND GSM TECHNOLOGY

Computer Hacking Forensic Investigator v8

Big Data and Society: The Use of Big Data in the ATHENA project

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 February /05 LIMITE COPEN 35 TELECOM 10

NATIONAL COST OF VoIP BYPASS

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification

BUSINESS JET SECURITY SYSTEM

MORPHO CRIMINAL JUSTICE SUITE

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

EC-Council Ethical Hacking and Countermeasures

T a c k l i ng Big Data w i th High-Performance

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,...

IDCAB SERVICE GENERAL TERMS AND CONDITIONS OF SALE

May For other information please contact:

Big Data overview. Livio Ventura. SICS Software week, Sept Cloud and Big Data Day

EIGSICA INDUSTRIAL SYSTEMS ENGINEERING SCHOOL CASABLANCA. 3. Description

Site Surveillance, Project Management and Communications System for Remote Locations in High-Risk Environments

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism. soren.jagerhok@foi.se

GeoMatrix. Positioning of Mobile Phones System

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance

Secure telephony via classic and IP networks. office security solutions

Big Data Analytics Nokia

Transcription:

From Lawful to Massive Interception : Aggregation of sources

Agenda! Introduction! amesys Company! Lawful vs Massive! A centralized point of view! Range of Products! Conclusion

Objectives! Increasing need of high-level intelligence in the constant struggle against criminals and terrorism.! Reduce crime levels.! Protect from terrorism threats.! Identify new incoming security danger

Organisation Marine Aerospace Defence and Security Telecom and Networks amesys! French group created in 1979! 1000 employees (80% of engineers)! 110 M" (est. 2008) Finance and Information System Energy and Industry Public Transport

Location! Headquarter in Paris! Main office in Aix en Provence! 9 agencies (Toulouse, Sophia Antipolis, Paris, Rennes, Grenoble,Strasbourg, Bordeaux, Montpellier)! 4 agencies abroad (Morocco, Luxembourg, Germany, Canada)! An international network of agents in 35 countries

Lawful vs Massive

Observations! Numerous countries are installing Lawful IP interception systems! Fundamental differences between Lawful system and Massive system

Lawful vs Massive amesys 2008

From Lawful to Massive Interception: Aggregation of sources.! Lawful interception :! Basic filtering on IP address! Extracts some communications from the global flow! Analyze only these communications! Only work on predefined targets! All the rest will be permanently lost amesys 2008

From Lawful to Massive Interception: Aggregation of sources.! Massive interception :! Advanced filtering tools :! email address, phone number, ISP account identifier,...! Analyze all the communications of the link! Archive of all Internet traffic - Smart search engine to recover communications in the past! All the communications are store in the system amesys 2008

From Lawful to Massive Interception: Aggregation of sources.! Massive advantages :! Global search and surveillance of all internet traffic! Define current target based on Internet classical identifiers! Search a huge one-year archive! Keep an eye on all the traffic of the network! Have a global synthesized view

From Lawful to Massive Interception: Aggregation of sources. Features Lawful Interception Massive Intelligence Recor(ing -arge-/s communica-ions OK OK Social Network for targets OK OK Search in the past for newly identified targets - OK Identification of new potential suspects - OK Discovery of new targets on :! Key words! Key topics! Social network Information synthesizer and production of top-level intelligence Creation of Intelligence Notes for the Authority - - - OK OK OK - OK - OK Full country traffic monitoring - OK Behavioural analysis of data flow - OK Localization - OK Multi captor System - OK

A central point of view

amesys provides a centralized point of view! Main objective : Aggregate different sources of information! Every one has access to different supports of communication :! GSM! Analogical phones! IP Network! Microwave links! Satellite

A centralized point of view

A centralized point of view! amesys answers to the need in each of these fields.! Huge range of sensors and analyzing probes.! Centralized intelligence system gathering all information.

A centralized point of view

Range of Products! amesys is able to deliver products for Lawful or Massive interception and to provide solutions for Strategic as well as Tactical needs:

Smart external modules! LANGUAGE RECOGNITION & TRANSLATION! VOICE TO TEXT 3 AUTOMATIC TRANSCRIPTION! SEMANTIC ANALYSIS & TOPIC CLASSIFICATION! SOCIAL NETWORKS! TIME LINE

Conclusion!To be able to dispose of all information, amesys will provide sensors, probes and centralized system agglomerating all type of information.!to be productive with it, amesys will integrate the latest technological modules in the most efficient human flowchart.