At the dawn of 21st century, there was a hope around the world for humans to live more closely and peacefully without boundaries of race, language, religion, gender, culture and prejudice – that’s the cyber world linked by the internet. By the nature of avarice, selfishness and biases in human beings, there is still a dark side in this cyber world, just as in our real circumstance.
More and more innocent and naïve netizens everywhere suffer the dark side of the cyber world by different types of threats: cyber terrorism, bluffing of extreme racial or religious hatred, cyber child porn, cyber fraud, VoIP phishing, privacy hacking and intruding…etc. These threats don’t only cause target victims uneasy and harmful feelings, but these also arouse conflicts among different groups of people.
Both LEA and National Security Agencies of every state also pay close attention to these cyber threats. They even build up basic principles and effective strategies to fight against these cyber threats: The first is setting up an intelligence-led mindset and procedure; the second is deploying an information collection facility; the third is analyzing collected information into intelligence; the forth is acting based on intelligence.
Decision Group Inc. has worked extensively with law enforcement and gained understanding and experience of intelligence best practices along with the common pitfalls for the past 15 years. “We know better than anyone else in fields of lawful intercepts and cyber intelligence,” said Casper Kan Chang, CEO of Decision Group, “because we had the privilege to work with LEA on digital network monitoring from the emerging of this technology 15 years ago.”
Decision Group fully understands the different requirements and procedures of LEA for different situations. That’s why Decision Group provides 2 different types of data collection facilities to fulfill LEA demands:
- Target based lawful interception procedure –
In order to meet such demand, Decision Group provides a total lawful interception solution suite to meet LI framework of ETSI or CALEA and state LI mandates. These solutions consist of:
- iMediator (iMD) – for lawful interception operation as a mediation platform with telecom networks,
- iMonitor (iMnt, EDDM) – for lawful interception operation as content reconstruction and monitoring system in LEA Monitoring Center,
- iWarrant (iWrt)– for warrant administration process in TSP network center or LEA Monitoring Center,
- Data Retention Management (DRMS) – for long-term lawful interception data retention management with SAN or NAS system,
- Tactic Lawful Interception Pack –trolley system with integrated function of data access, collection, reconstruction and management for short term lawful interception operation of LEA,
- HTTPS-Detective (ED2S) – 2 types of HTTPS Interception Solution, and each for LAN (forward proxy) and Telecom networks – ED2S (transparency proxy).
- Information collection and data analysis based cyber intelligence –
For cyber intelligence, Decision Group provides a different way to collect large scale of traffic data from all tier-1 telecom service providers in the state, quick data decoding and reconstructing based on associated protocol or service format, and data scooping and analysis into useful intelligence for decision and policy making. These solutions consist of:
- E-Detective (ED) – works as strategic lawful interception device,
- Wireless-Detective (WD) - WLAN Internet Interception and Content Analysis Solution,
- Data Retention Management (DRMS) – for long-term lawful interception data retention management with SAN or NAS system,
- HTTPS-Detective (ED2S) – 2 types of HTTPS Interception Solution, and each for LAN (forward proxy) and Telecom networks – ED2S (transparency proxy)
- Centralized Management System (CMS) – for centralized management of distributed frontend E-Detective, ED2S, EDDC, Data Retention Management systems,
- Knowledge base Platform (KbP) – parallel indexing system for big data management with defined business rules built-in in the field of behavior pattern (modus operandi) analysis, text mining…etc.
- Professional Training Program for LEA and National Security staff –
Decision Group doesn’t only provide the above facilities for LEA to effectively execute the network monitoring process, but it also provides extensive training programs to help LEA build up the mind-set and skills of the entire anti-cyber threat operation. These training programs consist of:
- Network Packet Forensic Analysis Training (NPFAT) - Network Packet Forensics Analysis Training,
- Lawful Interception Training (LIT) – on lawful interception planning, deployment and delivery,
- Cyber Intelligence Training (CIT) – cyber intelligence deployment and delivery for national security,
- Cybercrime Investigation Training (CCIT) – co-work with National Taiwan Central Police University and Taiwan CIB on training of cybercrime investigation skills and theory for LEA staff.
Decision Group provides consulting service for planning of lawful interception and cyber intelligence to our partners and customer. With numerous deployment experiences in different countries, DG consultants will provide streamlined lawful interception processes from warrant authorization to data collection on telecom networks, and fully meet global and state mandates and regulations.
Decision Group also clearly understands that localization of the above solutions is critical for LEA of each state to carry out anti-cyber threat operations. That’s the reason Decision Group provides skill transference/shift program for the demands of LEA. We provide a partner training program to reliable local partners involved in LI or Cyber Intelligence projects of LEA for the above purpose. Please contact Decision Group at decision@decision.com.tw for more detailed information.
About Decision Group
Decision Group, established in 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition, Measurement Products, Industrial Automation and Control Systems. Decision Group, from the year 2000, started new line of industry involved in designing and development of equipment and software for Internet Surveillance and Forensics Analysis Solutions.
Decision Group also provides OEM/ODM services of its network forensic solution with deep packet inspection (DPI) technology to other partners worldwide. Decision Group has also developed a comprehensive training course, known as Network Packet Forensics Analysis Training (NPFAT), and has set up training centers worldwide for hands-on training, with certification option as well.
More Information and Contact by Email: decision@decision.com.tw
URL: www.edecision4u.com (Global), www.internet-recordor.com.tw (Taiwan), www.god-eyes.cn (China), www.decisionjapan.com (Japan) , www.e-detective.de (Germany), www.edecision4u.fr (France), www.edecision4u.es (Spain and Latin America) |