kamini rupani vice president – marketing

17
Kamini Rupani Vice President – Marketing Big Data Security Analytics - Detection and Prevention of Criminal, Terror Acts with Real Time Analysis of Suspicious Events, Patterns and Criminal Linkages

Upload: vivek

Post on 20-Feb-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Big Data Security Analytics - Detection and Prevention of Criminal, Terror Acts with Real Time Analysis of Suspicious Events, Patterns and Criminal Linkages. Kamini Rupani Vice President – Marketing. Boston Marathon Bombings 2013 Dead: 5 Injured: 280. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Kamini Rupani Vice President – Marketing

Kamini RupaniVice President – Marketing

Big Data Security Analytics - Detection and Prevention of Criminal, Terror Acts with Real Time Analysis of Suspicious Events, Patterns and Criminal Linkages

Page 2: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Oklahoma 1995Dead: 168

Injured: 680

World Trade Center 2001Dead: 3000

Injured: 6000+

Bali Bombings 2002

Dead: 202Injured: 209

Madrid Train Bombing 2004

Dead: 191Injured: 2050+

Mumbai Terror Attack 2008

Dead: 173Injured: 600+

Boston Marathon Bombings 2013

Dead: 5Injured: 280

Page 3: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Effect of Terrorism

2008 2009 2010 2011 20120

2000400060008000

100001200014000160001800020000

IncidentsFatalities

Terrorism caused an average of 8200 fatalities per year worldwideTerrorist incidents grew over 1000% in a span of 10 years

Retrieved from www.start.umd.edu/gtd

Page 4: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Criminals are Early Adopters

Advances in mobile technologies give terrorists a tactical advantage that could be difficult to corral, experts

say. (AP Photo/Elaine Thompson)

MUMBAI, India — Terrorists … stunned authorities with their

use of sophisticated weaponry & their comfort with modern technology...

EARLY ADOPTERS

Page 5: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Coordination Challenge is High

Crime and terrorism require sophisticated

techniques

Not sharing between agencies means work

duplication

No connectivity among information systems

and databases

Delayed information delivery within the same organization

Non-uniform data leads to severe

inefficiency in the analysis process

Lag in procuring data causes unnecessary delay in obtaining

Actionable Intelligence

Page 6: Kamini Rupani Vice President – Marketing

Retrieved from http://www.start.umd.edu/gtd

HOW CAN WE COMBAT TERRORISM

PREVENT THE MISHAPSBEFORE THEY HAPPEN

PUT THE CRIMINALS BEHIND THE BARS

AND SAVE PRECIOUS LIVES

Page 7: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

THE ANSWER IS TECHNOLOGY

Page 8: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Big Data

Page 9: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

TYPES OF DATASTRUCTURED

Telecom CDR• (EntityBas

ed) Suspect/Target Data

• (Location specific) Base Tower Station Data

Internet IPDR• (EntityBas

ed) Suspect/Target IP Data

• (Location specific) Subnet Data

Subscriber Detail Records (SDR)Master refernce for Telecom Data like Numbering, BTS IDs etcMaster refernce for Internet Master DataGeoLocation Reference Data for BTS and IPs

SEMI / UNSTR

UCTURED

LI Intercepted content of Communication (CC) that includes -Web Session Data -Email Communication data -P2P Communication Data -Chat Contents (P2P and IRC based)Passive Probed Internet Data for -News Feeds -Blogs -Social Networking Sites -General Web site data -LEA/User specific Investigation / intelligence Reports and Documents

Page 10: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Different Types of Data Handling

Telecom• Subscribe

r • Call

Detail Records (Voice, SMS)

• IRI • Location

Updates

Banking• Bank

Records• ATM

Records• Credit

Card Transactions

Travel• Journey

Transactions

• Hotel Bookings

Un- Structured• Intercept

ed E-mail• Intercept

ed Chat• Intercept

ed Facebook

• Intercepted Twitter

GIS Data Feeds• Passport

& Immigration

• Department of Motor Vehicle

• Income Tax

• Surveillance Feeds

Page 11: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Location Centric Details UIDAI

GIS DATA

PassportDriving License

Pan Card

PropertyVehicle

Insurance Details

SubscriberProfiles

Call Records

Financial Details

Reservation Details

What do I do with this data?How do I make it useful for meCan I identify suspect with this data quickly?I have a case help me solve it with this data?

Why are we here?

Page 12: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Now, This is Useful to Me!!!

Why are we here ???

All Country DataXalted

InteliCENTER Platform

Inputs from LEAs, Case Management,

Analysis & much more..

Automatic Data

Analytics

• Reports usable by anyone for identifying the suspect

• Automatic data query and presentable output with in depth analytics

Page 13: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Data Agnoustic

•Real-time Correlation and Anomaly Detection of Diverse Security Data

360* View

•Explore about any Case related Suspects or create a New Case•Explore a suspect’s call, e-mail, chat, travel, and financial data•Explore a suspect’s location details in Map

Queries•High-Speed Querying of Security Intelligence Data

Patterns•Configure Suspicious Patterns on the entire data universe, Monitor Patterns and detect suspicious activities and entities associated •Provides insights into a Person’s Suspicious Activities through the configured patterns

Analysis•Enhanced Analysis for Deep Visibility•Flexible big data analytics across structured and unstructured data – including security data; email, document and social media content; full packet capture data; business process data; and other information

Visualization

•Graphical front-end tool for visualizing and exploring big data

Security Analytics

Page 14: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Number & Diversity of Sources

Results of Big Data Security Analytics

Page 15: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Large Volumes of Structured and Unstructured Data

Mining of Zettabytes of Data

Profiling Using Patterns

Extracting Actionable Intelligence

Enhanced Insights, Informed Decisions

PRISM by NSA

Page 16: Kamini Rupani Vice President – Marketing

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

Xalted has the TECHNOLOGY…InteliCENTER – Security Intelligence

Solution

Allows prevention of terrorism Capable of forensic analysisSolve crimes and terrorism related casesUses strategic and tactical analytical toolsLeads to informed decision makingGains unparallel Security Intelligence

InteliCENTER

Page 17: Kamini Rupani Vice President – Marketing

Thank You

Copyright © Xalted Information Systems Pvt. Ltd. All Rights Reserved

For more information please contact:

KaminiRupaniVice President - Marketing

XaltedPhone: +91 90042 88822

Email:[email protected]: www.xaltedcorp.com