The Problem: With high speed devices like smartphones and new IP services like voice over IP, Facebook and Twitter, the challenge of communication analysis.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

A global Service layer platform for M2M communications
Presenters:Donald McCalman Sandy Gilchrist 1 st Sept 2008.
The importance of digital voice-based data management in everyday communication. ABSONIC ® voice recording and management system NICOPRO USA INC -
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Aviel Tenenbaum Executive Vice President, GS&M ECI Telecom in Brazil Brazil: Technological Innovation & investment Opportunities December 15, 2008 Tel.
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper CALEA(LI)/Monitoring Solution Architectures Richard Holben.
TAC - Intelligent Infrastructure and Energy Efficiency.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
The Computer Network.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
BITS Pilani Pilani Campus Losses incurred by the TSPs due to shifting from Voice to VoIP AAYUSH GUPTA 2013B3A3652P PRADEEP BANERJEE 2013A3PS274G.
Vice President – Marketing
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
Semicon Division Semicon division is providing various semiconductor business products applied to information technologies, communication infrastructure.
Watch Competitors Watch Suppliers Empower Yourself
Market Analysis Decision Group.
Watch Competitors Watch Suppliers Empower Yourself
Ip VIDEOSURVEILLANCE solution
JDF in the Inter-Enterprise Workflow Achieving JDF workflow automation.
The importance of digital voice-based data management in everyday communication. ABSONIC ® voice recording and management system GALLMED Ltd. -
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Datawatch Visual Data Discovery Department of Defense United States Army Detail Financial Transaction Data Visualization Impact.
Akamai Technologies - Overview RSA ® Conference 2013.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Mosaic Aurora Basic Network Video Recording (NVR) System.
Toward a Culture of Cybersecurity Research Aaron Burstein TRUST & ACCURATE Research Fellow Samuelson Clinic & BCLT, Boalt Hall UC Berkeley.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
IP VIDEOSURVEILLANCE SOLUTION An extremely reliable and robust system FreeBSD is used by Google and Internet Access Providers for their.
STAR-GATE for PACKET DATA Arkady Linshitz Product Manager.
Mobile Technology – The Enabling Force Here Now & Here To Stay.
HTM 304 Management Information Systems IS news presentation Daniel Olsson Instructor : Proff. Fang Fang technologybackgroundconclusionrestrictionscompetitionfuture.
Dan Grady The search for the killer productivity application is over… Copyright 2009, Information Builders. Slide 1.
WEB MINING. In recent years the growth of the World Wide Web exceeded all expectations. Today there are several billions of HTML documents, pictures and.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Teaching and Learning with Technology Chapter 7 Networks and the Internet by La Tisha Jenkins.
IP VIDEOSURVEILLANCE SOLUTION IP VIDEOSURVEILLANCE SOLUTION First network videosurveillance server, CamTrace has an innovative architecture.
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
E-Detective VoIP Detective – VoIP Interception (2010) Decision Group
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Deep Packet Inspection. Definition Uses Privacy Concerns Neutrality Concerns.
The Public Safety LTE & Mobile Broadband Market: Opportunities, Challenges, Strategies & Forecasts Publisher : Signals and Systems Publication.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Surveillance and Security Systems Cyber Security Integration.
COMPANY PROFILE ITEL Solutions founded in 2015, is a company engaged in business-to-business IT and Telecom products & solutions. We help enterprise customers.
Matakuliah : A0214/Audit Sistem Informasi
Juniper and IBM Delivering Value Together
Network Modeling and Business Intelligence Service
FACT OR FICTION ?.
Kbv Research | +1 (646) | Global Lawful Interception Market Knowledge Based Value (KBV) Research Full report:
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Data Fusion Market
PREPARED BY: RUMMY MIRANDA
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Digital Forensics Chris Rozic.
IBM Cloud Computer Services
Intro to Data & Internet
Tokyo OpenStack® Summit
Presentation transcript:

The Problem: With high speed devices like smartphones and new IP services like voice over IP, Facebook and Twitter, the challenge of communication analysis and lawful intercept is daunting for governments, law enforcement and intelligence agencies; similar to finding the proverbial needle in the haystack

SS8: We Find Bad Guys! Actually, we only help to find them!

SS8 Vision Be the world’s premier supplier of security software solutions that allow Law Enforcement and Intelligence Agencies to lawfully monitor, intercept, reconstruct and analyze cyber communications for combating crime and terrorism. Intercept Specific Criminal/Terrorist Cyber Communications Reconstruct Intercepted Voice /Data Communications Analyze Communications to Identify Criminals/Terrorists Monitor Suspicious Cyber Communications & Activity Service Provider Networks Law Enforcement and Intelligence Agencies Intelligent Provisioning

Global leaders in Intercepting and Analyzing Voice and Data communications ACCESSMEDIATION COLLECTION Law Enforcement Agency Intellego Workstation Intellego Server Intellego Workstation Service Provider Meta data

Intellego: A New Standard for Reconstruction & Analysis of IP Data Processes both structured (Voice Call Detail Records) and unstructured data (streaming internet traffic) Extracts Layer 7 Metadata in real-time Provides Social Network Analysis – maps communications to the right players Makes all content searchable (including attachments) via indexing of data Reconstructs unstructured IP communications and provides playback capabilities.

SS8 Company Background U.S. based company, headquartered in Milpitas, California U.S. based company, headquartered in Milpitas, California Provide high end multi-million dollar lawful interception (LI) solutions Provide high end multi-million dollar lawful interception (LI) solutions Wide variety of U.S. government projects LI infrastructure for many of the world’s largest wireless/wireline carriers Country wide (government and carrier) interception system Monitor over 500 million subscribers from 200 installations in 30 countries Growing > 40% annually; Profitable and cash flow positive Growing > 40% annually; Profitable and cash flow positive Financing –W Capital/Goldman Sachs, Kleiner Perkins, Novak Biddle Financing –W Capital/Goldman Sachs, Kleiner Perkins, Novak Biddle