Today’s cybercrimes aren’t the same as traditional crimes committed between criminals and victims. Now these anti-social behaviors have a direct impact on the entire fabric of social life. Financial cybercrimes cause innocent civilians to lose billions of US dollars every year. Cyber terrorists can easily initiate struggles and battles in distant lands. We all live in a very dangerous world with these cybercriminals devising new and increasingly diabolical tactics every day.
How do these cybercriminals jeopardize our society? Let us look at the results of cybercrime. There are lots of daily news stories highlighting this damage - from millions of US dollars lost in ATM and e-commerce cyber fraud events - to thousands of lives lost in terrorist atrocities. Nobody can escape from the shadow of international cybercrime.
Why do these tragic events seem to be happening with increased frequency recently? From a survey of cybercrime in every country, we find a simple fact: the more convenient network access is in our life, the higher the frequency of cybercrime becomes. This is because perpetrators have a high degree of anonymity in cyber space - and the victims of cybercrime are easily accessible through the network - directly or indirectly. Both network lines and access devices have become a major venue for cybercrime.
In many cybercrime events, it is obvious that interlinked global finance networks offer semi-secure transaction mechanisms within different finance institutions across different countries – and this plays a significant role. These financial networks provide a convenient path for the cybercriminal - one that is difficult to trace by law enforcement staff. Prosecution requires that every country cross borders to take part in the investigation. With convenient money laundering systems, these cybercriminals can easily perpetuate lots of crime, and terrorists can propagate mayhem everywhere. As a result, we see VoIP phishing crime running rampant in Far Eastern Asia, online shopping for drugs and guns in North America, terrorism propaganda used for fund-raising and cadet recruitment in Southern Asia, North Africa and Middle East areas, etc.
In order to strike back at rampant cybercrimes effectively, law enforcement staff world-wide must learn how to cooperate together to fight against these global cybercriminal groups. The first step is to collect intelligence on cybercriminal activities from public telecom network systems. This must be done by all countries in each region, under appropriate authorization, and using legal procedures. The second step is to exchange all this collected intelligence for a comprehensive cybercrime investigation that involves law enforcement agencies (LEA) in different countries. With proper technology and training, LEA should confirm the cash flow through global finance chains behind these cybercrimes. Eventually, LEA can take action to apprehend all the suspects in the criminal group in each respective country - with solid criminal evidence. Effective anti-cybercrime action must always be based on solid and direct criminal evidence. This is a crystal clear rule for all LEA staff involved in the investigation.
“Decision Group’s lawful interception solution has been developed at the request of law enforcement agencies,” says Casper Kan Chang, General Manager of Decision Group, “and this solution has been proven effective by LEA staff in many global cybercrime investigation cases across many countries.” Based on the legal mandate of lawful interception operations, the Decision Group lawful interception solution has 3 major functions in LEA investigation requirements.
- The first function is to handle lawful interception (LI) requests between LEA staff and the internet data center (IDC) of a telecom service provider’s target network. This part is quite critical because all LI operation must be legally authorized so traffic can be audited. Otherwise the process might be abused for illegal purposes. Decision Group’s LI system follows standards set by the European Telecommunications Standards Institute (ETSI) or the Commission on Accreditation for Law Enforcement Agencies (CALEA) mandate based on LEA requirements and country judiciary codes. All the required steps - from target ID input, instruction for target data collection from network system, and LI period control - to confidentiality and protection of collected data - are well defined, operated and recorded one by one in the system for auditing purposes.
- The second function is to collect data from telecom network systems in IDC site of the network service provider. For different telecom service networks, there are several different types of core service networks. Though there are different ways to collect data - by either passive or active methods - the aggregated data collected from the telecom network includes both call data records (CDR) and communication content (CC). Both should be confirmed and correlated by the frontend LI system for backend management, adding LI related data as available.
- The third function is to convert all raw data of CC into recognizable content for data analysis and legal prosecution. This step is very important for the final verdict. Raw CC data should be reconstructed into the original content format, whereas CDR data will be saved into a database with links to the reconstructed CC media files. Police officials can confirm criminal facts from the result of data analysis on the intercepted information. The criminal fact report will be submitted to a court of law as part of evidence against cybercriminals. On the other hand, data life cycle management (based on LI Act) has been taken care of in the DG LI solution as the fulfillment of the entire LI cycle.
Decision Group also provides strong customization services for LI solutions so that clients can fulfill their countries’ legal mandates and procedures. Accordingly, DG’s LI system provides an open interface to the existing backend system in a client organization to ensure proper integration of current IT governance management.
Currently, the DG LI solution has been deployed in more than 50 countries around the world, and plays the significant role in eliminating cybercrimes and protecting innocent people in cyberspace every day. Meanwhile, Decision Group’s talented professionals are still working hard on new technology development for a better tomorrow in the cyber world. If you are interested in learning more about the DG LI solution, please contact with decision@decision.com.tw or check out our website: http://www.edecision4u.com.
About Decision Group, Inc.
Decision Group is a company focused on worldwide renowned DPI application of E-Detective. Decision Group, established in Taipei, Taiwan since 1986, is one of the leaders in manufacturing of PC-Based Multi-Port RS232/422/425 Serial Cards, Data Acquisition & Measurement Products and Industrial Automation and Control Systems.
Decision Group, in the year 2000, started a new line involved in designing and developing equipment and software for Internet Content Monitoring and Network Forensics Analysis Solutions. Now, Decision Group has positioned itself as a total-solution provider with a full-spectrum of products in its portfolio for network forensic and lawful interception.
More Information and Contact by Email: decision@decision.com.tw
URL: www.edecision4u.com (Global), www.internet-recordor.com.tw (Taiwan), www.god-eyes.cn (China), www.decisionjapan.com (Japan) ,
www.e-detective.de (Germany), www.edecision4u.fr (France), www.edecision4u.es (Spain and Latin America) |