----- ##### About Us ###### ‣ [established in June, 2016] ‣ [spanning a network of over 30 employees and contractors] ‣ [operating in 5 countries in and around Europe] ‣ [dedicated to deeptech and security] ----- ##### References ###### Deutscher Ost-Ausschuss Michael Harms politics and trade Dentons International Signa Retail retail legal Florian Schneider Stephan Fanderl banking manufacturing under NDA Russian Machines Christian Kremer ----- ##### Our Storyline ‣ analysis of elections and ###### campaigning methods ‣ analysis of rogue hacking operations ‣ unmasking foreign information 1 Deep Dive Research and Analytics warfare tactics Advanced Biometrics Cyber Warfare subzero, red team face, object, pattern recognition 2 ‣ commercial and public security ‣ tools development for automated ‣ smart cities exfiltration of sensitive/private data ‣ intelligence offices ‣ tailored access operations: ‣ law enforcement identification, tracking and ‣ border control (immigration) infiltration of threats ‣ machine-learning powered ‣ consolidate, archive & access categorisation of many data evidence 3 Evidence Lab sources (including documents, ‣ fast forensics and crime ----- ##### The Rationale Evidence is becoming primarily digital. Technical obstacles make it increasingly difficult for governments and law enforcement agencies to de-anonymise and access data from suspects. Encrypted channels allow criminals to exchange information and hide from law enforcement surveillance. ----- ## Advanced Biometrics ----- ### Perfected Investigations ###### Rapid Forensic Analysis Offline to Online Predictive Policing 100 hours of accessible CCTV images of terrorists or of any person learning from criminal activities in the footage can be analysed for faces of of interest can be checked against past, our algorithms derive risky areas criminals in just 10 hours by our social networks, blogs and other and predict strategies of outlaws to algorithms digital sources and databases make police work more effective ----- # S U B Z E R O ###### N E X T G E N E R AT I O N C Y B E R WA R FA R E ----- ##### At A Glance ###### A state-of-the-art computer surveillance tool designed for the cyber era which enables FULL CONTROL COMPLETE ACCESS LOCATION TRACKING of the target PC to all data and passwords no matter where in the world MULTIPLE ATTACK VECTORS TEAM OF EXPERTS STEALTH MONITORING by utilising unique anti-virus allowing remote and local infiltration ready to provide assistance and evasion techniques methods trainings on advanced attack techniques ----- #### T H E P R O D U C T ----- ##### Control Center ###### The easy to use, web based control center allows easy data exfiltration and full control of the target computer. ----- ##### Passwords ###### Extract credentials from the target PC with a single click. ----- ##### Screenshots ###### Easily take screenshots from the target PC for intelligence and evidence collection. ----- ##### Files ###### Allows you to access, download, modify and upload files from the target computer. ----- ##### Location Tracking ###### View the current and past geo-location of your target. Worldwide. ----- ##### Evidence Lab ###### NEXT BIG FEATURE A dedicated place to securely store, organise and search collected evidence using state-of-the-art AI technology. Secure Smart Advanced Evidence is stored encrypted. Permissions can Using cutting edge technologies like machine An advanced biometric recognition feature be easily applied to restrict who can see what. learning, large amounts of data can be quickly which allows to quickly search and categorise searched and automatically categorised. image and video files looking for objects, faces or patterns. ----- ###### PCs, Laptops and Servers infected with Subzero Agent and controlled by the Control Center ##### Architecture ###### ??? Subzero Anonymization Server Subzero Subzero * Simplified Architecture Control Center Evidence Lab ----- ##### Use Cases ###### A N TI FIN AN CIA L TERR OR ISM FR AU D H U M AN TR AFFIC KIN G & C H IL D POR N OGR A PH Y R IN G S C YB ER D A RK N ET C R IM E C R IM ES ----- #### T H E T E A M ----- ##### Leadership ###### DR AZE N MOKI C S AS A B Product Manager & Cyber Security Expert & Team Lead Security Researcher Our leadership works with contracted specialists around the globe. Our intellectual property remains exclusively in our hands. JU LI AN E R DOE DY Managing Director KU BA G CE M BAY KAM Lead Engineer & Machine Learning & AI Security Researcher Lead Engineer ----- #### N E X T S T E P S ----- ##### Next Steps ###### Ready-to-Ship Market introduction supporting Windows OS & Windows Server. ###### macOS Add support for the macOS operating system. ###### Mobile Devices Add support for Android and iOS mobile devices. ----- #### C O N T A C T ###### www.dsirf.eu Julian Erdoedy Drazen Mokic Tel. +43 676 73384 Tel. +43 676 73384 Email. @dsirf.eu Email. @dsirf.eu -----