Introduction of Network Investigation Toolkit / 2nd Generation (NIT2)
Cybercrime (Illegal and unauthorized Internet usage) has increased in recent years due to open communications policy in many countries all over the world. The initial effort to prevent, curb and detect these illegal usage activities by using content filtering and application or service blocking solutions have failed as there are too many back door paths. Terrorists started to love the Internet and exploit all possible ways of communicating among themselves through the Internet. Politicians started to make use of the Internet to spread their propaganda and message to their supporters. Illegal gambling organizations make use of the Internet for illegal transactions. Drugs and weapons dealers exploit the Internet to close drug and weapons smuggling deals. Schools and university students download unauthorized MP3s, movies, and software from the Internet. More and more people have started to make use of the Internet for their own benefits in many different ways. The Online Population has increased tremendously in recent years.
Network Investigation Toolkit 2nd Generation (NIT2)
Network Investigation Toolkit (NIT) is specially designed by Decision Group for Law Enforcement Agencies such as Police, Military, Criminal Investigation Agencies, National Security Agencies, Cyber Security Agencies, Counter Terrorism Department, Forensics Investigators, etc. to conduct network based forensics investigation whether it is on a Wired or Wireless LAN networks. NIT is a portable unit (laptop based) with comprehensive network forensics features which can be carried to any location for network based investigation tasks. The NIT can be used to intercept targeted networks or users to collect the necessary evidence and trace the source of communication. The unique capability of this system is its combination of various features and functions to conduct LAN real-time interception, WLAN real-time interception, HTTPS/SSL MITM interception on both LAN and WLAN networks, as well as, offline analysis and reconstruction of pre-captured raw data files. The 3.5G/HSDPA USB Adapter is included in the package for users to use remote access to manage the system.