SlideShare a Scribd company logo
1 of 23
Download to read offline
Intelligent Eavesdropping
Detection System Proposal
Intelligent Eavesdropping
Detection System Proposal
24 / 7
www.gitsn.com
TSCM : Technical Surveillance Counter-Measures
Table of Contents
The current status of bugging devices technology
The Status Quo
01
The necessity of 24/7
The Importance of intelligent Eavesdropping Detection System
02
System introduction and characteristics
intelligent Eavesdropping Detection System : Introduction
03
Implementation and references
intelligent Eavesdropping Detection System : Implementation
04
FAQ / Company ProfileAppendix
The Status Quo
Bugging devices
<Source : Central Radio Management Service(Korea)>
Reasons for Eavesdropping
44% takes place in a corporate environment
HOW SECURE IS YOUR OFFICE?
Divorce
Adultery
Employee
Surveillence
Trade Secrets
Labor-Management
Relations
Bidding Strategy
Voyeurism
Etc.
The increasing threat of eavesdropping in everyday life
Able to turn the devices ON/OFF
from a remote location
Difficult to detect bugs and
spy-cams with portable detectors
ON
OFF
Behind a painting
Inside a calculator
Inside a fire detector
Internet Line
Under the table
Inside a vase
Inside a power strip
Inside a mouse
Anything in an office environment can be used
Spying is possible by turning on the necessary devices via remote
ON
ON
ON
The Status Quo
Mouse type Fire detector type Power strip type USB HUB type
RF
Transmitter
UWB(Ultra WideBand)
Unable to detect with normal scanners
High Performance scanners are needed
Ultra Low Power Signal
Unable to detect with analog scanners
The Status Quo
The increasing threat of eavesdropping in everyday life
Various wireless communication technologies that can be used
Varioustechnologiesare appliedto wirelessdata hackingdevicesmakingthem smallerand more powerful
Some productscaneven sendand receivedata over tens of kilometers(km).
Range
20~100m
10~100m
100~200m
13km
 Frequency : 2.4GHz, 5GHz
 Transfer Speed : 2~54Mbps
Wi-Fi
 Frequency : 868MHz, 900~928MHz, 2.4GHz
 Transfer Speed : 250Kbps
Zigbee
 Frequency : 2.4GHz
 Transfer Speed : 125Kbps~2Mbps
Bluetooth (5.0)
 Frequency : 868MHz, 915MHz
 Transfer Speed : 100bps
SigFox
11km Frequency : 867~928MHz
 Transfer Speed : 0.2~50Kbps
LoRa
Communication Range in an Open Field Environment
The Status Quo
Eavesdropping and spying methods are becoming smarter by the day
New York Post
2015.06.23
NSA eavesdropped on the last 3 French
presidents: WikiLeaks
PARIS — WikiLeaks published documents late Tuesday it says
shows the US National Security Agency eavesdropped on the
last three French presidents.
Ever since documents leaked by former NSA contractor Edward
Snowden showed in 2013 that the NSA had been
eavesdropping on the cellphone of Angela Merkel, it had been
understood that the U.S. had been using the digital spying
agency to intercept the conversations of allied politicians. Still,
the new revelations are bound to cause diplomatic
embarrassment for the Americans, even though friends have
been spying on friends for thousands of years.
Barack Obama's top-secret tent
Released by the White House, shows Barack Obama fielding calls
from a tent in Brazil, to keep up with events in Libya. The tent is a
mobile secure area known as a Sensitive Compartmented
Information Facility, designed to allow officials to have top secret
discussions on the move.
They are one of the safest places in the world to have a
conversation. Designed to withstand eavesdropping, phone
tapping and computer hacking, Sensitive Compartmented
Information Facilities - also known as SCIFs - are protected areas
where classified conversations can be held.
New York Post
2015.06.23
The Status Quo
Recent spike in detection requests
Increase in the
number of
detection
requests by the
public sector
40%
Sudden Increase of
Detection Requests
scandal of State
Affairs in 2016
50%
Increase in the
number of
detection
requests by top
50 companies
Increase in the
number of
detection
companies
40%
Public Sector : Detection requests used to be limited to Ministers’ and Vice Ministers’ Offices
Now it has expanded to Directors and Conference Rooms
Enterprise Sector : Detection requests used to be limited to VIP rooms
Now it has expanded to Executives’ Offices, Conference Rooms and Villas
The Importance of IntelligentEavesdroppingDetectionSystem
The Korea Economic Daily
2017.01.03
Economic loss due to information leak
Military / Security
Diplomacy
Corporate
(M&A, Plans, Budget)
Development &
Authorization
(Redevelopment,
Resources)
Investigation
Politics &
Policies
Core Industrial Tech
Latest R&D
Tech
November 2018
Samsung’s "Edge Display”
Technology leaked to China
Expected loss of
USD 5 billion
over 3 years
2017 MOTIE
528 cases of leaked
Trade Secrets (SME)
Average loss of
USD 1.7 million
Other
National Information
Other Industrial Security
The Importance of IntelligentEavesdroppingDetectionSystem
Newest bugs cannot be detected with a portable detector
As eavesdropping technology evolves, portable detectors are no longer effective
24/7 Intelligent Eavesdropping Detection System is necessary to be protected from the newest threats
High Performance Micro Bug
Frequencies expanded to
6GHz
Digital Type
Changing from analog
to digital
On-Off Remote Control
Burst Type : Transmit after Recording
Remote control from outside
Extended
Frequency
Range
Analog Spread Spectrum
Digital Type
Digital
Transmission
Detection
Avoidance
10MHz~2GHz 1MHz~6GHz
Generic
Bug
Micro
Bug
OFF
during scans
ON
during meetings
OFF ON
The Importance of IntelligentEavesdroppingDetectionSystem
Real-time Detection of all radio frequencies
• Real-time detection : 24/7
• Analysis via signal detection algorithm :
Instant detection of abnormal RF signals
• Relay abnormal RF signals to the Central
Controller
Remote Terminal
• Access management of the
Monitoring S/W
• Management of data collected by the
remote terminal
• Management of frequency
information and provide statistics
Receives Data from the detector
Controller S/W
• Management of multiple remote terminals
(Up to 100 different locations per S/W)
• Real-time status monitoring and alert
management
• Check statistics & file detection reports
Real-time Monitoring by the Admin
Monitoring S/W
IntelligentEavesdroppingDetectionSystem:Introduction
24/7 Intelligent Eavesdropping Detection System
GITSN’s Intelligent Eavesdropping Detection System is able to
detect and defend against all RF attacks in real-time Scans
Features of our Wireless Eavesdropping Detection System
25kHz ~ 6GHz
 Against all frequencies where illegal transmissions may take place (1MHz ~ 6GHz)
 Meets the Korean Military’s ROC (Required Operational Capability) standards
1 second  High performance : Ultra-fast signal detection
UWB
(Ultra Wide Band)
 Detects UWB wireless signals that cannot be found with normal detection methods
Integrated Control
up to 100 units
 Integrated under one software (VIP & Executive’s Office / Conference Rooms)
Full Automation
 Runs efficiently even without having a dedicated operator
 Convenient features such as Self Auto Setup and Remote Health Check
Government
Certified
 PPS Excellent Product Designation by the Public Procurement Service
 Performance Certification from the Ministry of SMEs and Startups
 Encryption (SSL based on SEED)
1
2
3
4
5
6
Wideband
Detection
Ultra-fast
Detection
High tech
Detection
Central
Control
Unmanned
Surveillance
Reliability
IntelligentEavesdroppingDetectionSystem:Introduction
Triggers an alarm when
an abnormal RF signal
is detected
Monitoring S/W Interface & Functions
Scanner Management
Single S/W manages
all the scanners
Abnomal List
Statistics Report
Provides statistics
and reports
Abnormal RF
Checks for abnormal RF
against standard
frequencies
Demodulation
Available for audio
and video
IntelligentEavesdroppingDetectionSystem:Introduction
Controller S/W
Receive data from the Scanner
Relay data to Monitoring S/W
Accumulate info on new frequencies
Remote Terminal
• Relay abnormal RF signals to
Central Controller
Monitoring S/W
Issue security alert
Intensive monitoring (Frequency)
Manager
Identify the cause
Security Process of our Wireless Eavesdropping Detection System
Conference Room
• Remove the
Transmitter
Search / Remove /
Frequency managing
IntelligentEavesdroppingDetectionSystem:Introduction
Product line-up
IntelligentEavesdroppingDetectionSystem:Implementation
Smart-D
24/7
Intelligent Eavesdropping
Detection System
RT (Remote Terminal) / MS (Control S/W)
Direct Sales : Korean Public Sector
Indirect Sales : Int’l. Private Sector
Excellent Product Designation
by the Public Procurement Service
Each device covers 150m2
Hacking detection via S/W Update
(Limited to the Public Sector)
Sold in Korea as : Alpha-S
Meeting Rooms /
Maintenance
1
Smart-H
24/7
Wireless Data
Security System
RT (Remote Terminal) / MS (Control S/W)
Indirect Sales : Int’l. Private Sector
Not Available : Korean Public Sector
Each device covers 100m2
Only capable of hacking detection
Sold in Korea as : Alpha-H
Server Rooms /
Maintenance
2
Alpha-P
Portable
Scanner
System
All-in-one Detector
Direct Sales : Korean Public Sector
Indirect Sales : Int’l. Private Sector
To be registered under
Venture Market Place
Able to pin-point the location with the
portable detector
All Enviroment /
Operation Training
3
Contact
Demo
Support
POC / BMT
Installation
Support
Training Maintenance
Client Interest Contract Signing Post-Contract Signing
Operation and
Maintenance
Sales Rep.
& 1 Demo Technician
1 Set of Demo Equipment
Scanner/SW/Hacking Tools
Process
Sales Rep.
& 2 POC
5 Sets of POC Equipment
5 Scanners / Triangulation
SW / Hacking Tools
Sales Rep.
& 2 Installation
Technician
00 Sets of Equipment
00 Scanners /SW
portable detector
Sales Rep.
& 1 Engineer
System Manual
Training Manual
1 Engineer
Quarterly Inspection
Operation Check
Implementation process of our Wireless Eavesdropping Detection System
IntelligentEavesdroppingDetectionSystem:Implementation
World Class Technology in Wireless Frequency Detection
Construction of Intelligent Eavesdropping
Detection System for the Navy
Bidding Result
11th, November 2014
• Frequency detection range
• Detection sensitivity
• Detection time
Company Technical Other
Total
Score
Result
GITSN 83.95 … 92.23 Winning Bid
Company A 2.00 … 12.00 Disqualified
Technical Criteria (score out of 90)
• Security
• Integrated Control
• Data Management
Public Sector:
98%
Sole provider
in the domestic
market
Overseas
Competing with 7
different countries
World Class Tech
Construction of Intelligent Eavesdropping Detection
System for Singaporean Intelligence
‘GITSN’ vs ‘NetSense (Israel)’
Winning Bidder : GITSN
Construction of Intelligent Eavesdropping
Detection System for Singapore
12th, November 2017
Bidding Result
Technical Criteria
Was able to detect the UWB device that was secretly
planted by the client.
IntelligentEavesdroppingDetectionSystem:Implementation
Seoul Metropolitan City; Busan Metropolitan City; Daejeon Metropolitan City; Gwangju Metropolitan City; Icheon Metropolitan City; Gyeonggi-Do;
Chungcheongbuk-Do; Gongju City; Namyangju City; Seongnam City; Gwangmyeong City; Suwon City; Pocheon City; Hwaseong City; Yongin City;
Siheung City; Asan City; Antyang City; Yangju City; Uiwang City; Uijeongbu City; Icheon City; Jecheon City; Cheonan City; Cheongju City; Chungju City;
Hanam City; Jung-Gu; Seongbuk-Gu; Songpa-Gu; Yeongdeungpo-Gu; Eunpyeong-Gu; etc.
Local
Government
Agencies
(73)
Cheong Wa Dae(President office); Ministry of Trade, Industry and Energy; Korea Defence Intelligence Command; Ministry of the Interior and Safety;
Ministry of Foreign Affairs; The National Assembly; Ministry of National Defense; Supreme Prosecutors’ office; Ministry of oceans and Fisheries;
Ministry of Education; R.O.K Joint Chief of Staff; National Police Agency; Korea Coast Guard; Financial Supervisory Service; Republic of Korea Army;
Republic of Korea Navy; Republic of Korea Air Force; Constitutional Court of Korea; Government Office Management Office; Ministry of Science and ICT;
Ministry of Food and Drug Safety; Ministry of Justice; Ministry of Agriculture, Food and Rural Affairs; Republic of Korea Marine Corps; Ministry of Health
and Welfare; Rural Development Administration; etc.
Central
Government
Agencies
(26)
Health Insurance Review & Assessment Service, Korea Electric Power Corporation (KEPCO); Korea Coal Corporation; Korea Hydro & Nuclear Power Co;
Mine Reclamation Corporation; Korea Exim bank; Korea Deposit Insurance Corporation; Korea Institute of Energy Technology Evaluation and Planning;
Korea Southern Power Co., Ltd; Korea Midland Power Co., Ltd.; Korea East-West Power Co., Ltd; Korea Western Power Co., Ltd; Korea Gas Corporation;
Korea Gas Safety Corporation; Korea Marine Environment Management Corporation; Korea National Oil Corporation; Korea Construction Management
Corporation; Korea Industrial Complex Corporation; Korea Asset Management Corporation; Korea Housing-Finance Corporation; Government Employees
Pension Service; Korea Transportation Safety Authority; Korea Rail Network Authority; Korea Land and Housing Corporation; National IT Industry
Promotion Agency; KOTRA; Korea Development Bank; etc.
Public
Institutions
(75)
S Group; S Group; L Group; L Group; H Group; H Group; H Group; D Group; K Group; K Group; J Group; A Group; S Group;
S corp.; A corp.; K corp.; H corp.; H corp.; H corp.; Y corp.; etc.
Enterprise
(28)
Singapore(National Intelligence Service / Military); US; UK; Indonesia(Marine Police, Private) ; UAE(Military); Cambodia(Police); Saudi Arabia(Private);
Malaysia(Private)
Overseas
(8)
Over 200 customers
IntelligentEavesdroppingDetectionSystem:Implementation
Appendix
1
3
Eavesdropping methods are improving by the day. Hackers are now able to remotely turn on / off the transmission. All the hacker needs to do is
to turn off his transmission whenever the portable detector is near. This is why a 24/7 detection system is necessary as it will be scanning the
entire area at all times.
2
How does GITSN’s Intelligent Eavesdropping Detection System detect Wireless Eavesdropping Devices?
GITSN's Intelligent Eavesdropping Detection System scans radio frequencies from 25 kHz to 6 GHz every second and comes up with a standard frequency
model for that specific area. It analyzes the radio frequency and triggers an alarm when an abnormal frequency is detected.
Inthecaseofeavesdropping,volumecanbeusedtodeducethelocationofthebug.Itismostlikelythatthebugisplantedneartheplacewherethe
transmittedvoiceistheloudest.Moreover,spy-camscanbefoundbyanalyzingtheangleofthefootage.
4
FrequentlyAsked Questions (FAQ)
Can't it be detectedwith a portabledetector? Is a 24/7 detectionsystem necessary?
Is it possibleto knowthe exact locationof the eavesdroppingdevice usingGITSN's IntelligentEavesdroppingDetectionSystem?
If an abnormalfrequencyis detected,can'tit be defendedby blockingthe radio waves?
Frequency jamming is currently illegal. Moreover, unexpected problems may occur since frequency jamming will block all radio
waves passing through a certain area.
There has been some cases in the recent years where frequency jamming has been used for national facilities (jamming drone
frequencies near nuclear power plants), but they can not be used in the private sector.
Appendix
Gitsn Corporation is High-Tech Security company with world-class radio frequency detection technology.Company Info.
World-class Radio Frequency Detection Technology.
- Development of wireless eavesdropping detection system
- Development of wireless hacking detection system
- Possession of original technology for spectrum analysis
Government Certified
Mr. Han, Dong Jin / CEO
- 2019.11 Minister of Defense Award for
Wireless Hacking Detection System
- 2019.12 Korea Internet Security Agency Award by
The Presidents Committee on the 4th Industrial Revolution
- 2019. 10 USD 15 million investment by WooriPE-Shinyoung Securities
Minister of Defense Award
Ph.D. in Electronics Engineering, Korea University
- Found GITSN in 04.01.2000
- Number of Employees : 35
Designated as an Excellent Product by the Korean
Public Procurement Service
- Excellent Products must be purchased(10%) for public procurement
- Allowed to make private contracts regardless of contract amount
Appendix
Brief History
Development of World-Class Technology
2000~2006
Developed the embedded
system and software platform
that became the basis of our
eavesdropping detection solution
Co-development with the
National Security Research Institute
2007~2012
24/7 Wireless Detection
System was authorized for
mass production in 2012
Accumulation of Signal
Analyzing Expertise
2012~2014
Developed “Eavesdropping Analysis
Algorithm” based on our experience
Development of Wireless
Hacking Detection System
2015~2019
Delivered hundreds of units to the public
sector while also expanding rapidly in the
private sector.
Wireless Data Security Market
Distributor System Establishment
2020~
Expanding our business into the
wireless data security market
Appendix
Organization Chart
Chief Executive Officer
Domestic Sales Team
Overseas Sales Team
Planning Team
R&D Team
Technical Support Team
Production Materials Team
Management Support Team
TF
Thank You
08390
Daeryung Post Tower 1 #601
288, Digital-ro, Guro-gu
Seoul, Korea
T : 02-852-3560
F : 02-852-3565
E : sales@gitsn.com
GITSN, Inc. www.gistn.com

More Related Content

What's hot

Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networksPositiveTechnologies
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Olga Kochetova
 
Azure Forensics & Incident Response
Azure Forensics & Incident ResponseAzure Forensics & Incident Response
Azure Forensics & Incident ResponseChristopher Doman
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondPositiveTechnologies
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEMSiemplify
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Siddharth Rao
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 

What's hot (20)

Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
SS7: 2G/3G's weakest link
SS7: 2G/3G's weakest linkSS7: 2G/3G's weakest link
SS7: 2G/3G's weakest link
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
 
Azure Forensics & Incident Response
Azure Forensics & Incident ResponseAzure Forensics & Incident Response
Azure Forensics & Incident Response
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEM
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 

Similar to [GITSN] intelligent eavesdropping detection system

[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system운상 조
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-SweepingPaul Andrews
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Jason Shen
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats FasterForce 3
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019Grid Dynamics
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectivesSensePost
 
Mobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeMobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeArfatAhmadKhan1
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 Great Bay Software
 
Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CityNicolas Lesconnec
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06johnhewitt_cpp
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security IntelligenceSplunk
 

Similar to [GITSN] intelligent eavesdropping detection system (20)

[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Mobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeMobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposae
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

[GITSN] intelligent eavesdropping detection system

  • 1. Intelligent Eavesdropping Detection System Proposal Intelligent Eavesdropping Detection System Proposal 24 / 7 www.gitsn.com TSCM : Technical Surveillance Counter-Measures
  • 2. Table of Contents The current status of bugging devices technology The Status Quo 01 The necessity of 24/7 The Importance of intelligent Eavesdropping Detection System 02 System introduction and characteristics intelligent Eavesdropping Detection System : Introduction 03 Implementation and references intelligent Eavesdropping Detection System : Implementation 04 FAQ / Company ProfileAppendix
  • 3. The Status Quo Bugging devices <Source : Central Radio Management Service(Korea)> Reasons for Eavesdropping 44% takes place in a corporate environment HOW SECURE IS YOUR OFFICE? Divorce Adultery Employee Surveillence Trade Secrets Labor-Management Relations Bidding Strategy Voyeurism Etc.
  • 4. The increasing threat of eavesdropping in everyday life Able to turn the devices ON/OFF from a remote location Difficult to detect bugs and spy-cams with portable detectors ON OFF Behind a painting Inside a calculator Inside a fire detector Internet Line Under the table Inside a vase Inside a power strip Inside a mouse Anything in an office environment can be used Spying is possible by turning on the necessary devices via remote ON ON ON The Status Quo
  • 5. Mouse type Fire detector type Power strip type USB HUB type RF Transmitter UWB(Ultra WideBand) Unable to detect with normal scanners High Performance scanners are needed Ultra Low Power Signal Unable to detect with analog scanners The Status Quo The increasing threat of eavesdropping in everyday life
  • 6. Various wireless communication technologies that can be used Varioustechnologiesare appliedto wirelessdata hackingdevicesmakingthem smallerand more powerful Some productscaneven sendand receivedata over tens of kilometers(km). Range 20~100m 10~100m 100~200m 13km  Frequency : 2.4GHz, 5GHz  Transfer Speed : 2~54Mbps Wi-Fi  Frequency : 868MHz, 900~928MHz, 2.4GHz  Transfer Speed : 250Kbps Zigbee  Frequency : 2.4GHz  Transfer Speed : 125Kbps~2Mbps Bluetooth (5.0)  Frequency : 868MHz, 915MHz  Transfer Speed : 100bps SigFox 11km Frequency : 867~928MHz  Transfer Speed : 0.2~50Kbps LoRa Communication Range in an Open Field Environment The Status Quo
  • 7. Eavesdropping and spying methods are becoming smarter by the day New York Post 2015.06.23 NSA eavesdropped on the last 3 French presidents: WikiLeaks PARIS — WikiLeaks published documents late Tuesday it says shows the US National Security Agency eavesdropped on the last three French presidents. Ever since documents leaked by former NSA contractor Edward Snowden showed in 2013 that the NSA had been eavesdropping on the cellphone of Angela Merkel, it had been understood that the U.S. had been using the digital spying agency to intercept the conversations of allied politicians. Still, the new revelations are bound to cause diplomatic embarrassment for the Americans, even though friends have been spying on friends for thousands of years. Barack Obama's top-secret tent Released by the White House, shows Barack Obama fielding calls from a tent in Brazil, to keep up with events in Libya. The tent is a mobile secure area known as a Sensitive Compartmented Information Facility, designed to allow officials to have top secret discussions on the move. They are one of the safest places in the world to have a conversation. Designed to withstand eavesdropping, phone tapping and computer hacking, Sensitive Compartmented Information Facilities - also known as SCIFs - are protected areas where classified conversations can be held. New York Post 2015.06.23 The Status Quo
  • 8. Recent spike in detection requests Increase in the number of detection requests by the public sector 40% Sudden Increase of Detection Requests scandal of State Affairs in 2016 50% Increase in the number of detection requests by top 50 companies Increase in the number of detection companies 40% Public Sector : Detection requests used to be limited to Ministers’ and Vice Ministers’ Offices Now it has expanded to Directors and Conference Rooms Enterprise Sector : Detection requests used to be limited to VIP rooms Now it has expanded to Executives’ Offices, Conference Rooms and Villas The Importance of IntelligentEavesdroppingDetectionSystem The Korea Economic Daily 2017.01.03
  • 9. Economic loss due to information leak Military / Security Diplomacy Corporate (M&A, Plans, Budget) Development & Authorization (Redevelopment, Resources) Investigation Politics & Policies Core Industrial Tech Latest R&D Tech November 2018 Samsung’s "Edge Display” Technology leaked to China Expected loss of USD 5 billion over 3 years 2017 MOTIE 528 cases of leaked Trade Secrets (SME) Average loss of USD 1.7 million Other National Information Other Industrial Security The Importance of IntelligentEavesdroppingDetectionSystem
  • 10. Newest bugs cannot be detected with a portable detector As eavesdropping technology evolves, portable detectors are no longer effective 24/7 Intelligent Eavesdropping Detection System is necessary to be protected from the newest threats High Performance Micro Bug Frequencies expanded to 6GHz Digital Type Changing from analog to digital On-Off Remote Control Burst Type : Transmit after Recording Remote control from outside Extended Frequency Range Analog Spread Spectrum Digital Type Digital Transmission Detection Avoidance 10MHz~2GHz 1MHz~6GHz Generic Bug Micro Bug OFF during scans ON during meetings OFF ON The Importance of IntelligentEavesdroppingDetectionSystem
  • 11. Real-time Detection of all radio frequencies • Real-time detection : 24/7 • Analysis via signal detection algorithm : Instant detection of abnormal RF signals • Relay abnormal RF signals to the Central Controller Remote Terminal • Access management of the Monitoring S/W • Management of data collected by the remote terminal • Management of frequency information and provide statistics Receives Data from the detector Controller S/W • Management of multiple remote terminals (Up to 100 different locations per S/W) • Real-time status monitoring and alert management • Check statistics & file detection reports Real-time Monitoring by the Admin Monitoring S/W IntelligentEavesdroppingDetectionSystem:Introduction 24/7 Intelligent Eavesdropping Detection System GITSN’s Intelligent Eavesdropping Detection System is able to detect and defend against all RF attacks in real-time Scans
  • 12. Features of our Wireless Eavesdropping Detection System 25kHz ~ 6GHz  Against all frequencies where illegal transmissions may take place (1MHz ~ 6GHz)  Meets the Korean Military’s ROC (Required Operational Capability) standards 1 second  High performance : Ultra-fast signal detection UWB (Ultra Wide Band)  Detects UWB wireless signals that cannot be found with normal detection methods Integrated Control up to 100 units  Integrated under one software (VIP & Executive’s Office / Conference Rooms) Full Automation  Runs efficiently even without having a dedicated operator  Convenient features such as Self Auto Setup and Remote Health Check Government Certified  PPS Excellent Product Designation by the Public Procurement Service  Performance Certification from the Ministry of SMEs and Startups  Encryption (SSL based on SEED) 1 2 3 4 5 6 Wideband Detection Ultra-fast Detection High tech Detection Central Control Unmanned Surveillance Reliability IntelligentEavesdroppingDetectionSystem:Introduction
  • 13. Triggers an alarm when an abnormal RF signal is detected Monitoring S/W Interface & Functions Scanner Management Single S/W manages all the scanners Abnomal List Statistics Report Provides statistics and reports Abnormal RF Checks for abnormal RF against standard frequencies Demodulation Available for audio and video IntelligentEavesdroppingDetectionSystem:Introduction
  • 14. Controller S/W Receive data from the Scanner Relay data to Monitoring S/W Accumulate info on new frequencies Remote Terminal • Relay abnormal RF signals to Central Controller Monitoring S/W Issue security alert Intensive monitoring (Frequency) Manager Identify the cause Security Process of our Wireless Eavesdropping Detection System Conference Room • Remove the Transmitter Search / Remove / Frequency managing IntelligentEavesdroppingDetectionSystem:Introduction
  • 15. Product line-up IntelligentEavesdroppingDetectionSystem:Implementation Smart-D 24/7 Intelligent Eavesdropping Detection System RT (Remote Terminal) / MS (Control S/W) Direct Sales : Korean Public Sector Indirect Sales : Int’l. Private Sector Excellent Product Designation by the Public Procurement Service Each device covers 150m2 Hacking detection via S/W Update (Limited to the Public Sector) Sold in Korea as : Alpha-S Meeting Rooms / Maintenance 1 Smart-H 24/7 Wireless Data Security System RT (Remote Terminal) / MS (Control S/W) Indirect Sales : Int’l. Private Sector Not Available : Korean Public Sector Each device covers 100m2 Only capable of hacking detection Sold in Korea as : Alpha-H Server Rooms / Maintenance 2 Alpha-P Portable Scanner System All-in-one Detector Direct Sales : Korean Public Sector Indirect Sales : Int’l. Private Sector To be registered under Venture Market Place Able to pin-point the location with the portable detector All Enviroment / Operation Training 3
  • 16. Contact Demo Support POC / BMT Installation Support Training Maintenance Client Interest Contract Signing Post-Contract Signing Operation and Maintenance Sales Rep. & 1 Demo Technician 1 Set of Demo Equipment Scanner/SW/Hacking Tools Process Sales Rep. & 2 POC 5 Sets of POC Equipment 5 Scanners / Triangulation SW / Hacking Tools Sales Rep. & 2 Installation Technician 00 Sets of Equipment 00 Scanners /SW portable detector Sales Rep. & 1 Engineer System Manual Training Manual 1 Engineer Quarterly Inspection Operation Check Implementation process of our Wireless Eavesdropping Detection System IntelligentEavesdroppingDetectionSystem:Implementation
  • 17. World Class Technology in Wireless Frequency Detection Construction of Intelligent Eavesdropping Detection System for the Navy Bidding Result 11th, November 2014 • Frequency detection range • Detection sensitivity • Detection time Company Technical Other Total Score Result GITSN 83.95 … 92.23 Winning Bid Company A 2.00 … 12.00 Disqualified Technical Criteria (score out of 90) • Security • Integrated Control • Data Management Public Sector: 98% Sole provider in the domestic market Overseas Competing with 7 different countries World Class Tech Construction of Intelligent Eavesdropping Detection System for Singaporean Intelligence ‘GITSN’ vs ‘NetSense (Israel)’ Winning Bidder : GITSN Construction of Intelligent Eavesdropping Detection System for Singapore 12th, November 2017 Bidding Result Technical Criteria Was able to detect the UWB device that was secretly planted by the client. IntelligentEavesdroppingDetectionSystem:Implementation
  • 18. Seoul Metropolitan City; Busan Metropolitan City; Daejeon Metropolitan City; Gwangju Metropolitan City; Icheon Metropolitan City; Gyeonggi-Do; Chungcheongbuk-Do; Gongju City; Namyangju City; Seongnam City; Gwangmyeong City; Suwon City; Pocheon City; Hwaseong City; Yongin City; Siheung City; Asan City; Antyang City; Yangju City; Uiwang City; Uijeongbu City; Icheon City; Jecheon City; Cheonan City; Cheongju City; Chungju City; Hanam City; Jung-Gu; Seongbuk-Gu; Songpa-Gu; Yeongdeungpo-Gu; Eunpyeong-Gu; etc. Local Government Agencies (73) Cheong Wa Dae(President office); Ministry of Trade, Industry and Energy; Korea Defence Intelligence Command; Ministry of the Interior and Safety; Ministry of Foreign Affairs; The National Assembly; Ministry of National Defense; Supreme Prosecutors’ office; Ministry of oceans and Fisheries; Ministry of Education; R.O.K Joint Chief of Staff; National Police Agency; Korea Coast Guard; Financial Supervisory Service; Republic of Korea Army; Republic of Korea Navy; Republic of Korea Air Force; Constitutional Court of Korea; Government Office Management Office; Ministry of Science and ICT; Ministry of Food and Drug Safety; Ministry of Justice; Ministry of Agriculture, Food and Rural Affairs; Republic of Korea Marine Corps; Ministry of Health and Welfare; Rural Development Administration; etc. Central Government Agencies (26) Health Insurance Review & Assessment Service, Korea Electric Power Corporation (KEPCO); Korea Coal Corporation; Korea Hydro & Nuclear Power Co; Mine Reclamation Corporation; Korea Exim bank; Korea Deposit Insurance Corporation; Korea Institute of Energy Technology Evaluation and Planning; Korea Southern Power Co., Ltd; Korea Midland Power Co., Ltd.; Korea East-West Power Co., Ltd; Korea Western Power Co., Ltd; Korea Gas Corporation; Korea Gas Safety Corporation; Korea Marine Environment Management Corporation; Korea National Oil Corporation; Korea Construction Management Corporation; Korea Industrial Complex Corporation; Korea Asset Management Corporation; Korea Housing-Finance Corporation; Government Employees Pension Service; Korea Transportation Safety Authority; Korea Rail Network Authority; Korea Land and Housing Corporation; National IT Industry Promotion Agency; KOTRA; Korea Development Bank; etc. Public Institutions (75) S Group; S Group; L Group; L Group; H Group; H Group; H Group; D Group; K Group; K Group; J Group; A Group; S Group; S corp.; A corp.; K corp.; H corp.; H corp.; H corp.; Y corp.; etc. Enterprise (28) Singapore(National Intelligence Service / Military); US; UK; Indonesia(Marine Police, Private) ; UAE(Military); Cambodia(Police); Saudi Arabia(Private); Malaysia(Private) Overseas (8) Over 200 customers IntelligentEavesdroppingDetectionSystem:Implementation
  • 19. Appendix 1 3 Eavesdropping methods are improving by the day. Hackers are now able to remotely turn on / off the transmission. All the hacker needs to do is to turn off his transmission whenever the portable detector is near. This is why a 24/7 detection system is necessary as it will be scanning the entire area at all times. 2 How does GITSN’s Intelligent Eavesdropping Detection System detect Wireless Eavesdropping Devices? GITSN's Intelligent Eavesdropping Detection System scans radio frequencies from 25 kHz to 6 GHz every second and comes up with a standard frequency model for that specific area. It analyzes the radio frequency and triggers an alarm when an abnormal frequency is detected. Inthecaseofeavesdropping,volumecanbeusedtodeducethelocationofthebug.Itismostlikelythatthebugisplantedneartheplacewherethe transmittedvoiceistheloudest.Moreover,spy-camscanbefoundbyanalyzingtheangleofthefootage. 4 FrequentlyAsked Questions (FAQ) Can't it be detectedwith a portabledetector? Is a 24/7 detectionsystem necessary? Is it possibleto knowthe exact locationof the eavesdroppingdevice usingGITSN's IntelligentEavesdroppingDetectionSystem? If an abnormalfrequencyis detected,can'tit be defendedby blockingthe radio waves? Frequency jamming is currently illegal. Moreover, unexpected problems may occur since frequency jamming will block all radio waves passing through a certain area. There has been some cases in the recent years where frequency jamming has been used for national facilities (jamming drone frequencies near nuclear power plants), but they can not be used in the private sector.
  • 20. Appendix Gitsn Corporation is High-Tech Security company with world-class radio frequency detection technology.Company Info. World-class Radio Frequency Detection Technology. - Development of wireless eavesdropping detection system - Development of wireless hacking detection system - Possession of original technology for spectrum analysis Government Certified Mr. Han, Dong Jin / CEO - 2019.11 Minister of Defense Award for Wireless Hacking Detection System - 2019.12 Korea Internet Security Agency Award by The Presidents Committee on the 4th Industrial Revolution - 2019. 10 USD 15 million investment by WooriPE-Shinyoung Securities Minister of Defense Award Ph.D. in Electronics Engineering, Korea University - Found GITSN in 04.01.2000 - Number of Employees : 35 Designated as an Excellent Product by the Korean Public Procurement Service - Excellent Products must be purchased(10%) for public procurement - Allowed to make private contracts regardless of contract amount
  • 21. Appendix Brief History Development of World-Class Technology 2000~2006 Developed the embedded system and software platform that became the basis of our eavesdropping detection solution Co-development with the National Security Research Institute 2007~2012 24/7 Wireless Detection System was authorized for mass production in 2012 Accumulation of Signal Analyzing Expertise 2012~2014 Developed “Eavesdropping Analysis Algorithm” based on our experience Development of Wireless Hacking Detection System 2015~2019 Delivered hundreds of units to the public sector while also expanding rapidly in the private sector. Wireless Data Security Market Distributor System Establishment 2020~ Expanding our business into the wireless data security market
  • 22. Appendix Organization Chart Chief Executive Officer Domestic Sales Team Overseas Sales Team Planning Team R&D Team Technical Support Team Production Materials Team Management Support Team TF
  • 23. Thank You 08390 Daeryung Post Tower 1 #601 288, Digital-ro, Guro-gu Seoul, Korea T : 02-852-3560 F : 02-852-3565 E : sales@gitsn.com GITSN, Inc. www.gistn.com