Different Facets of Human Right Protection on Cyber World
Internet access with mobility was the ultimate dream of all netizens in cyber world 5 years ago; however, at this moment mobile internet access is ubiquitous for most of netizens in the world by advanced telecom technology. Now in some developed countries, mobile network traffic is above 40% of total bandwidth of internet communication. This fact also indicates that mobile communication gradually plays a significant role in our daily life: we check out the time table of train, bus and MRT; we buy tickets of movies, transportation online; we send our message and email online; we share news and photos with our friends online; we order our books, 3C appliances from auction websites; we watch TV, movies online…etc. We can almost live our lives completely by the help of internet. Without internet access, we will be isolated from the real world just like behind the bar or in a remote island. So now, right of internet access is inevitably part of humanity as well as human right.
Cyber world is just like real world. There is also dark side - cyber crimes everywhere, from cyber identity stolen to cyber fraud. These cyber crimes deeply impact the trustful relationship among netizens in cyber world. Eventually what victims lose is not only money and time, but also mutual trust in humanity. So, how to crack down rampaging cyber crimes is critical task for law enforcement officers. In other words, It is also a job to protect human right on freedom of internet access: free away of harms by cyber crimes.
Communication in mobile network is not like the one in fixed network. There is a strictly security mechanism behind provided by network access providers, mobile operators, content service providers…etc. The objective is to provide a more secured way for netizens to access internet through mobile network infrastructure and maintain high quality of communication. Under such circumstance, it is quite difficult for law enforcement officers to penetrate this security mechanism and conduct lawful interception operation on mobile network. In the mean time, cyber criminals also take advantages of this secured mobile network to commit crimes anonymously without hesitation.
So called mobile network here, there are 3G network, WiMAX and LTE/4G networks included. WiFi network is regarded as part of fixed network because its backend is usually through fixed network. Lawful interception deployment is at the core system in operator sites instead of radio access network (RAN).
By newly developing technology, lawful interception on mobile network with careful auditing mechanism is not longer a dream to law enforcement officers. It can be realized by a set of powerful and complicated solution linked with core system of mobile network in operator site. Law enforcement officers can intercept and monitor online activities, encrypted or non-encrypted, of target criminals without any impact on other unrelated innocents in order to protect human right on freedom of internet access.
After more than one year POC deployment in several states, lawful interception on mobile network can be administrated and operated successfully by well planned implementation inside mobile networks. Mobile criminal communication data is also collected and interpreted for the sake of lawful prosecution in the court.
To implement a successful lawful interception on mobile network is not an easy job. State law enforcement authority should take responsibility to establish a standard operating procedure with mobile operators, state communication commission, state NIC center and state root certificate authority…etc. with cooperation from all sides, lawful interception on mobile network can work very well for welfare of all netizens in cyber world.
Since 1999, Decision Group has invested lots of money and labor to develop such network security solution by deep packet inspection technology for both enterprises and law enforcement authorities in the global market. At the present, we also work harder to cover our solution extensively into mobile network protection field for justice and IT security. “We believe technologies result from human nature,” said Casper Chang, CEO of Decision Group, “and that’s why we try our best to develop the cutting-edge technology to fulfill our humanity and improve our daily life.”
Decision Group provides powerful mobile lawful interception solution by compliance with ETSI standard as well as consulting service on building standard operation procedure and complete training package to law enforcement authorities. If you are interested in our total services, please contact with decision@decision.com.tw. We are glad to provide more detail information and help for your requirement.
About Decision Group
Decision Group, established in 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition, Measurement Products, Industrial Automation and Control Systems. Decision Group, from the year 2000, started new line of industry involved in designing and development of network forensic equipment and software for Internet Surveillance and Forensics Analysis Solutions.
Decision Group also provides OEM/ODM services of its network forensic solution with deep packet inspection (DPI) technology to other partners worldwide. Decision Group has also developed a comprehensive training course, known as Network Packet Forensics Analysis Training (NPFAT), and has set up training centers worldwide for hands-on training, with certification option as well.
The network forensic solutions by Decision Group are listed below:
- E-Detective (ED) - LAN Internet Interception, Monitoring and Content Analysis Solution
- Wireless-Detective(WD) - WLAN Internet Interception and Content Analysis Solution
- E-Detective/LEMF Suite – lawful interception on telecom network with iMediator, iWarant, iMonitor, Data Retention Management System and Centralized Management System, which is compliance with ETSI standard
- Enterprise Data Guard System (EDGS) – Data and IT resource monitoring system for enterprise intranet
- EDDC - Offline Internet Packet Reconstruction Solution
- HTTPS/SSL Interceptor - LAN HTTPS/SSL Interception Solution
- VoIP-Detective - Voice over Internet Protocol (VoIP) Interception Solution
- NIT - Network Investigation Toolkit
- FIT - Forensics Investigation Tool (MS Windows based)
- NPFAT - Network Packet Forensics Analysis Training
- Cyber Crime Investigation Training - Field Training on the procedure of cyber crime investigation with legal procedure, methodology of data analysis and so on.
- National Security Training – Training on national surveillance deployment and case study
About Decision Group
Decision Group, established in 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition, Measurement Products, Industrial Automation and Control Systems. Decision Group, from the year 2000, started new line of industry involved in designing and development of equipment and software for Internet Surveillance and Forensics Analysis Solutions.
Decision Group also provides OEM/ODM services of its network forensic solution with deep packet inspection (DPI) technology to other partners worldwide. Decision Group has also developed a comprehensive training course, known as Network Packet Forensics Analysis Training (NPFAT), and has set up training centers worldwide for hands-on training, with certification option as well.
More Information and Contact by Email: decision@decision.com.tw
URL: www.edecision4u.com (Global), www.internet-recordor.com.tw (Taiwan), www.god-eyes.cn (China), www.decisionjapan.com (Japan) , www.decision-groups.com (Singapore), www.e-detective.de (Germany), www.edecision4u.fr (France), www.edecision4u.es (Spain and Latin America) |