Cyber intelligence made easy.

Slides:



Advertisements
Similar presentations
26-Jun-15 Getting Ready for CIT Labs Lab is scheduled for 3;00-4:30 Fridays in Moore 207 Lab is not in Towne 309 (Registrar has it wrong) Everyone.
Advertisements

30-Jun-15 Getting Ready for CIT Labs Lab is scheduled for 1:30-3:00 Fridays in Moore 207 Lab is not in Towne 313 (Registrar has it wrong) Everyone.
SM3121 Software Technology Mark Green School of Creative Media.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Introduction Our Topic: Mobile Security Why is mobile security important?
INTERNET SAFTEY AND CYBER BULLYING By your internet protection go to guys… Lukas Richters and Raymond Weaver.
Specialist communication channel. Sarah-Jane king.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer security By Isabelle Cooper.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Version Control and SVN ECE 297. Why Do We Need Version Control?
Remote Control System 7 Cyber intelligence made easy.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception.
The Hacking Suite For Governmental Interception. Today’s topic: RCS installation vectors.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
May 21 st 2011 R.V. Raman Global Embedded Conference India 2011.
The Hacking Suite For Governmental Interception.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Remote Control System 7 Cyber intelligence made easy Belgrade - 08/02/2012 Massimiliano Luppi Key Account Manager Alessandro Scarafile Field Application.
Internet Safety.
Keeping Safe On Line.
Creating your online identity
Keeping Children Safe Online
What they are and how to protect against them
Cyber intelligence made easy.
How to use the internet safely and How to protect my personal data?
Is it for you and how can you use it?
RCS v7 Infection Vectors
Online Safety! By: Michelle Deng.
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
Mozilla Firefox Who is Mozilla? What is Firefox?
Symantec Code Signing Certificate
Types of Internet Access
What YOU Need to Know About Risk Management
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
ETS Inside Product Launch
The Hacking Suite for Governmental Interception
All About Business Phone Systems
Cyber intelligence made easy.
SOCIAL MEDIA MARKETING
STOP. THINK. CONNECT. Online Safety Quiz.
McAfee Support Number is Now Open to all, Make a Call Today!
Call AVG Antivirus Support | Fix Your PC
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Risk of the Internet At Home
Resco Mobile CRM Enables Sales Reps and Field Technicians to Access CRM Data Effortlessly While On the Go Across All Types of Mobile Devices WINDOWS APP.
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Remote Control System Competitor Analysis.
Look who it is! Ask the children if they recognise these characters…have they been in their assemblies before? Introduce cat, mouse, dog. In last year’s.
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
UNITY TEAM PROJECT TOPICS: [1]. Unity Collaborate
The Hacking Suite for Governmental Interception
Fry Word Test First 300 words in 25 word groups
Go to =>
Office 365.
What YOU Need to Know About Risk Management
Quarter 1.
Hi, lovely to meet you all…….. Etc……..
What are you Afraid of? Click to edit Master title style
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Data Recovery: Why Secure Deletion is so Important.
Botnets and Remote Administration Tools
Cybercrime By: Kimberly Foreiter
The Hacking Suite For Governmental Interception
What YOU Need to Know About Risk Management
Presentation transcript:

Cyber intelligence made easy. Remote Control System 7 Cyber intelligence made easy.

Can you intercept Skype calls? Can you open PGP encrypted files? So what are we talking about today?

Skype adoption is growing fast Skype adoption is growing fast. People trust it for confidential communications. Criminals too.

There’s more.

Everyone uses the Web. It’s cheap, easy and global.

The new Web is the social web. Highly dynamic. Vastly networked The new Web is the social web. Highly dynamic. Vastly networked. Big data.

Actually, too much data. Mostly noise. Difficult to correlate. It's your safety, but if used against you, it's a big, big problem.

Tap a cable and try to figure out what’s happening Tap a cable and try to figure out what’s happening. 99% of that is of no interest.

Interesting data often never gets to the Web. It stays on the device.

And that device may be out of reach. Linked to the Internet And that device may be out of reach. Linked to the Internet. But anywhere on Earth.

So what do we want. Get access to secret data. Anywhere they are So what do we want? Get access to secret data. Anywhere they are. Figure out the interesting parts. ----- Meeting Notes (05/07/11 10:09) ----- Reach "them" ... subject not clear. Connections among targets should emerge.

What do you already have. Traditional passive interception What do you already have? Traditional passive interception. Not effective against encryption. You lose half the picture. Must pass through your network.

Traditional is good. Innovative is better.

Thinking about offensive interception? You should.

“Governments must have offensive IT capabilities.” The Financial Times ----- Meeting Notes (17/11/10 12:40) ----- An authoritative source tells you MUST have it.

“Spy on suspected terrorists by inserting a remote forensic agent on their computers.” The Economist

A remote forensic agent. Clever idea. A sort of 007 for the digital age.

We have it. Remote Control System. Version 7.

Total control over your targets. Log everything. Always. Skype Total control over your targets. Log everything. Always. Skype? No more a problem. PGP? You get the keys. What it does? It gives you control, total control, over your target. No more encrypted data to throw away because you don’t have the keys.

Hear your suspects voices. Watch their social life. Look at their faces. Locate them. You’ll be able to listen to your target voice communications.

Even when not connected to the Internet. Anywhere they are.

Let’s see how it works.

Desktop installation Mobile Installation Working offline… Then send data. ----- Meeting Notes (05/07/11 12:07) ----- Add to keynote.

You want more.

Invisible to antiviruses. Autonomous on selective events Invisible to antiviruses. Autonomous on selective events. Easily adaptable. Management is straightforward. Antiviruses are a must-have these days. There is lots of malware on the Net. And if you fear your target will use an antivirus to prevent any unwanted application on his system, you’re right, they probably will. But RCS is invisible to them.

Integrate it with your systems. Scale to your needs Integrate it with your systems. Scale to your needs. Prevent disclosure of your presence. You already have your monitoring and alerting system, and you don’t want a new one. No problem, we will integrate RCS with your existing system.

Our technology works. On all the platforms.

Install it on Windows. Enough of features. Let’s see on what devices you can operate the RCS. On Windows for sure, so 90% of the desktop market is covered.

Mac. The remaining 10%. But growing.

Android. Android is the new entry in the mobile market, growing fast. Soon you can have it.

BlackBerry. Those who don’t use Nokias, use BlackBerry. You want this one.

iPhone. Apple iPhone. A big success. We have it.

iPad.

Symbian. Enterprises use Nokia’s. We have this one too.

Windows Mobile. Windows Mobile. We have that too.

Soon on Linux. Slowly coming to the market, but a big player nonetheless. It runs on everything. This is coming too.

“Cool, but I have to install the agent first, and that’s the difficult part: you have to be a hacker to do that stuff.” Your target may be out of reach. In another nation. Or on the run. Maybe he takes every possibile precaution to prevent any leakage of his data or tampering with his devices. You think you’ll need a team of hackers to get to him, lots of training and resources.

Wrong. Remote Control System is easy. Everything is just one click away.

Still you have many options. You may want the sneaky way. Maybe you want to be sneaky. Like a sniper: clean, precise, low profile.

Install an agent with an SMS. You send him an SMS and your RCS agent is ready to operate. Sounds like science fiction? It’s not.

While downloading an application. On the fly. He downloads the lastest version of his favourite application and together with it, an RCS agent comes down the wire and silently install itself on the system. Not kidding.

Hand the bad guy a pendrive. Or make him find it. No clicks required. You may have a person infiltrated and near your target. Hand him a pendrive with some documents on it. That’s all it’s needed by your RCS agent to start its work. Lose one on purpose near him. Sneak one in its bag … curiosity killed the cat.

In an Internet Café. Even with DeepFreeze. Your target makes heavy use of Internet Cafés to make your life harder. He feels safe because Internet Cafés are using DeepFreeze to restore the system each time to a clean state. An RCS agent cannot be cleaned up by DeepFreeze. Once installed, it’s permanent. And invisible.

Offensive hacking IS hacking. You use the same hacker stuff, but easy.

Zero day exploits. Zero technical knowledge required, it’s easy. And you want the best ones! Those known by no one, not even the makers of the bugged application. But there’s a problem: take an exploit as it comes out of the hackers hands, and it requires another hacker to use it. And you don’t have that many hackers, don’t you? We take care of that difficult part. You just have to make a couple of clicks with your mouse, and they’re ready to be used. No tech required.

You want the big firepower? Enough of the sneaky way. You want it fast and without much compliments. With little effort and maximum results.

Deploy at the ISP. At Gigabit speed. No need to cut the cables. You go directly at the target ISP, with little information you identify your target … and then? You cannot cut the cables and put something in between! You don’t need to. Our solution works without being physically in the middle. As soon as the target downloads an application, your RCS agent is up and running. Too late for him. It’s easy to deploy, and light on the ISP side. You manage it, the ISP doesn’t need to do anything. And if you’ve access to a router, it works everywhere, not only at the ISP.

Get the suspect while having a coffee at Starbucks. Over WiFi network. Today philosophy is “no more cables”. Everything goes over the air. WiFi anyone? We have that too.

A unique technology. Patent. It just works. Our solution for ISP and WiFi operation is so unique that we patented it.

There’s more. We are not only technology leaders.

Cannot figure out how to approach a difficult scenario Cannot figure out how to approach a difficult scenario? Our experience may be of help. Internet Café’ / DeepFreeze example.

Still not convinced?

Growing fast. Really fast. Customers in 5 continents. I’m sure that for some of you it’s not the first time attending our presentations. You’ve seen the growth.

A strong development team. Fast release cycles A strong development team. Fast release cycles. You get new features every few months. A strong team of developers are at work on the next release of RCS. We selected them among the best available in and out of the underground. To have the best, leading edge features, and a strong, industrial and proven development process.

Committed to the best quality. Every software have bugs. If someone tell you different, he’s a liar. But not everyone fix them in time: we do. On average, you’ve your bug fixed in few days. Often less.

A strong research team. When a new device operating system or application is released, infection is possible within a few weeks.

On site delivery and training. Advanced training On site delivery and training. Advanced training. Dedicated access to our support.

Your data is yours. And yours only Your data is yours. And yours only. No way for us to have access to your RCS. We care about the secrecy of your operations. When we leave your site, there will be no cable between HackingTeam and you. We just don’t want to know how you’re using RCS. Your data is yours. If you need support, get in touch with us, and tell us just what’s needed.

You supervise the use of your RCS, to prevent abuse.

Backdoor concerns? We can show you the code. You don’t trust closed solutions. Maybe there’s a backdoor hidden within them. So why not have a look at the code? Yes you can have a look. Let our developers show you the inner workings of the product.