E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) - 2010 Decision Group www.edecision4u.com.

Slides:



Advertisements
Similar presentations
Web Center Certification Administration Web Center Certification Training Intuit Financial Services University.
Advertisements

Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
E-Detective Series of Products Presentation (2009) Decision Group
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
Wireless-Detective WLAN a/b/g/n Interception System Decision Group
DECISION-COMPUTER INTERNATIONAL CO., LTD E-Detective Series of Products Decision Computer Group of Company Website:
4-CH Network Video Recorder NVR-400 Copyright © PLANET Technology Corporation. All rights reserved.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
Network Forensics and Lawful Interception Total Solutions Provider
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
Jessica Mannino. Blog A blog (a contraction of the term " Web log ") is a website, usually maintained by an individual, with regular entries of commentary,
Internet…issues Managing the Internet
SE Document Document Control Software. SE Document SE Document is a Document Management Software System to help you meet all document control requirements.
Net Optics Confidential and Proprietary Net Optics Launches Spyke Intelligent Access and Monitoring Architecture Solutions.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Internet.
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
Cyber Crime & Investigation IT Security Consultant
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Google Apps.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
April 2014 LCCU Meeting We’ll answers members’ questions: –Choices for Backing Up to the Cloud – Idrive, OneDrive, Google Drive, Dropbox, Spideroak … –How.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
Lawful Interception & Packet Forensics Analysis System for Telecom and ISP Special promotion:- EDDC : Off-line Packet Reconstruction & Network Forensics.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Introduction to Computers Section 8A. home How the Internet Works Anyone with access to the Internet can exchange text, data files, and programs with.
1 Chapter 8 The Internet: A Resource for All of Us.
70+ enterprise customers Customers in 15+ industry segments 6 million+ work hours analyzed alerts generated daily.
Network Services Networking for Home & Small Business.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CS101 Introduction to Computing Lecture 7 Internet Services.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Instrument for Business, Police, Military, Forensics and Information Investigation Wiretap Technology Revolution!!!
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
E-Detective VoIP Detective – VoIP Interception (2010) Decision Group
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Compliance for IBM Connections Cinthia Shields Director, Business Development-IBM Partner Manager
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
Xplico: concept, features and demo.
Networking for Home and Small Businesses – Chapter 6
Electronic Resources and the WWW
CompTIA Server+ Certification (Exam SK0-004)
Networking for Home and Small Businesses – Chapter 6
E-Detective System Backup Server July 2010
E-Invoicing for Network Access Customers
Networking for Home and Small Businesses – Chapter 6
Protocol Application TCP/IP Layer Model
The Internet and Electronic mail
Presentation transcript:

E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group

Introduction to E-Detective LAN Internet Monitoring, Data and Record Keeping & Network Content Forensics Analysis Solution Solution for:  Organization Internet Monitoring/Network Behavior Recording  Auditing and Record Keeping for Banking and Finance Industry  Forensics Analysis and Investigation,  Legal and Lawful Interception (LI) Compliance Solution for: Sarbanes Oxley Act (SOX), HIPAA, GLBA, SEC, NASD, E-Discovery etc. FX-30N FX-06 FX-100FX-120 E-Detective Standard System Models and Series (Appliance based) User can also opt to purchase software license only from us and use their own hardware/server.

Webmail IM/Chat HTTP File Transfer Telnet Using port-mirroring or SPAN port E-Detective System Architecture Display Reports Capture Packets Reassemble & Decode Reconstruct Back to Actual Content Store Save Archive E-Detective Architecture

E-Detective – Mirror Mode Implementation Organization or Corporate Network Deployment

E-Detective – Bridge Mode Implementation

E-Detective Lawful Interception Solutions Telco/ISP Lawful Interception

E-Detective Sample Screenshots - Reports Homepage – Top-Down Drill to Details Reporting

IM/Chat (Yahoo, MSN, ICQ, QQ, IRC, Google Talk Etc.) Webmail HTTP (Link, Content, Reconstruct, Upload Download) File Transfer FTP, P2P Others Online Games Telnet etc. E-Detective Internet Protocols Supported

Sample: (POP3, SMTP and IMAP)

Sample: Webmail – Yahoo Mail, Gmail, Hotmail etc… Webmail Type: Yahoo Mail, Gmail, Windows Live Hotmail, Giga Mail and others

Sample: IM -Yahoo, MSN, ICQ, IRC, QQ, GTalk etc…

Sample: File Transfer – FTP Upload/Download

Sample: File Transfer – P2P File Sharing Supports P2P such as Bittorent, eMule/eDonkey, Fasttrack, Gnutella

Sample: HTTP (Web Link, Content and Reconstruction) Whois function provides you the actual URL Link IP Address HTTP Web Page content can be reconstructed

Sample: HTTP Upload/Download

Sample: HTTP Video Streaming (FLV Format) Video Stream (FLV format): Youtube, Google Video, Metacafe. Playback of Video File

Sample: Telnet Session (with Play Back)

Sample: VoIP Calls (with Play Back) Play back of reconstructed VoIP audio file using Media Player Support RTP Codec such as G.711a-law, G,711µ-law, G.726, G.729, iLBC

Sample: Unknown or Non-Reconstructable

Admin: System Access Authority Assignment Authority – Visibility and Operation in Group (with User defined) Authority - Visibility Authority - Operation Authority Groups with Users

Export & Backup – Auto (by FTP) and Manual Auto (with FTP) Backup Manual Backup Download ISO or Burn in to CD/DVD Reserved Raw Data Files and Backup Reconstructed Data Comes with Hashed Export Function

Alert and Notification – Alert with Content Alert configured from different service categories and different parameters such as key word, account, IP etc. Alert can be sent to Administrator by or SMS if SMS Gateway is available. Throughput alert function also available!

Search – Free Text, Condition, Association Complete Search – Free Text Search, Conditional Search, Similar Search and Association Search Conditional Search Free Text Search Association Search

File Checksum (Hash) – Check File Content Integrity Shows the file lists and user can import files to check and compare with the files that has been captured by the system. Compare file content integrity. Abuser might have changed file name and send out the file to competitor.

Bookmark (for Review Next Time) Bookmark items and allow the review of the items. Bookmark items can also be exported.

Reporting – Network Service Usage - Daily Drill Down Reporting Capabilities

Reporting – Network Service Usage - Weekly Drill Down Reporting Capabilities

Reporting – Top Websites Viewed (Users)

Reporting – Online IP – Account Lists

Reporting – Daily Excel Log Report Manually or Automatically Generate Daily Log Report In Excel File Format.

References – Implementation Sites and Customers  Criminal Investigation Bureau  The Bureau of Investigation Ministry of Justice  National Security Agency (Bureau) in various countries  Intelligence Agency in various countries  Ministry of Defense in various countries  Counter/Anti Terrorism Department  National Police, Royal Police in various countries  Government Ministries in various countries  Federal Investigation Bureau in various countries  Telco/Internet Service Provider in various countries  Banking and Finance organizations in various countries  Others Notes: Due to confidentiality of this information, the exact name and countries of the various organizations cannot be revealed.

E-Detective Online Demo (root/000000) Decision Group