DSIRF About Us - established in June, 2016 - spanning a network of over 30 employees and contractors - operating in 5 countries in and around Europe - dedicated to deeptech and security References - Deutscher Ost-Ausschuss, Michael Harms (politics and trade) - Signa Retail, Stephan Fanderl (retail) - Dentons International, Florian Schneider (legal) - under NDA (banking) - Russian Machines, Christian Kremer (manufacturing) Our Storyline 1. Deep Dive Research and Analytics - analysis of elections and campaigning methods - analysis of rogue hacking operations - unmasking foreign information warfare tactics 2. Advanced Biometrics: face, object, pattern recognition - commercial and public security - smart cities - intelligence offices - law enforcement - border control (immigration) Cyber Warfare: subzero, red team - tools development for automated exfiltration of sensitive/private data - tailored access operations: identification, tracking and infiltration of threats 3. Evidence Lab - machine-learning powered categorisation of many data sources (including documents, image and video files) - consolidate, archive & access evidence - fast forensics and crime detection The Rationale - Evidence is becoming primarily digital. - Technical obstacles make it increasingly difficult for governments and law enforcement agencies to de-anonymise and access data from suspects. - Encrypted channels allow criminals to exchange information and hide from law enforcement surveillance. Advanced Biometrics Perfected Investigations - Rapid Forensic Analysis: 100 hours of accessible CCTV footage can be analysed for faces of criminals in just 10 hours by our algorithms - Offline to Online: images of terrorists or of any person of interest can be checked against social networks, blogs and other digital sources and databases - Predictive Policing: learning from criminal activities in the past, our algorithms derive risky areas and predict strategies of outlaws to make police work more effective real-world demonstration video: https://bit.ly/2MzpV2T (https://drive.google.com/file/d/19YQM8Ftevs1ix3ceyjEB_MLFtjw5otoG/view?usp=sharing) Subzero Next Generation Cyber Warfare At A Glance A state-of-the-art computer surveillance tool designed for the cyber era which enables - full control: of the target PC - complete access: to all data and passwords - location tracking: no matter where in the world - stealth monitoring: by utilising unique anti-virus evasion techniques - multiple attack vectors: allowing remote and local infiltration methods - team of experts: ready to provide assistance and trainings on advanced attack techniques The Product Control Center The easy to use, web based control center allows easy data exfiltration and full control of the target computer. [Screenshot] Passwords Extract credentials from the target PC with a single click. [Screenshot] Screenshots Easily take screenshots from the target PC for intelligence and evidence collection. [Screenshot] Files Allows you to access, download, modify and upload files from the target computer. [Screenshot] Location Tracking View the current and past geo-location of your target. Worldwide. [Screenshot] Evidence Lab Next Big Feature A dedicated place to securely store, organise and search collected evidence using state-of-the-art AI technology. - Secure: Evidence is stored encrypted. Permissions can be easily applied to restrict who can see what. - Smart: Using cutting edge technologies like machine learning, large amounts of data can be quickly searched and automatically categorised. - Advanced: An advanced biometric recognition feature which allows to quickly search and categorise image and video files looking for objects, faces or patterns. Architecture - [4] [Windows] PCs, Laptops and Servers- infected with Subzero Agent and controlled by the Control Center - [1] [???] Subzero Anonymization Server - [3] Subzero: Control Center - [1] Subzero: Evidence Lab * Simplified Architecture Use Cases - anti terrorism - cyber crime - human trafficking & child pornography rings - financial fraud - darknet crimes The Team Leadership - Julian Erdoedy, Managing Director - Drazen Mokic, product manager & team lead - Sasa BXXXX, cyber security expert & security researcher - Kuba GXXXXXX, lead engineer & security researcher - Cem Baykam, machine learning & ai lead engineer Our leadership works with contracted specialists around the globe. Our intellectual property remains exclusively in our hands. Next Steps Next Steps - Ready-to-Ship: Market introduction supporting Windows OS & Windows Server. - macOS: Add support for the macOS operating system. - Mobile Devices: Add support for Android and iOS mobile devices. Contact - DSIRF: www.dsirf.eu - Julian Erdoedy, Tel. +43 676 73384XX, Email XX@dsirf.eu - Drazen Mokic, Tel. +43 676 73384XX, Email XX@dsirf.eu