Hoffmann / Terplan | Intelligence Support Systems | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 488 Seiten

Hoffmann / Terplan Intelligence Support Systems

Technologies for Lawful Intercepts
Erscheinungsjahr 2005
ISBN: 978-1-4200-3128-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Technologies for Lawful Intercepts

E-Book, Englisch, 488 Seiten

ISBN: 978-1-4200-3128-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors.

This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.

Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems.

Hoffmann / Terplan Intelligence Support Systems jetzt bestellen!

Zielgruppe


Service providers, network engineers, administrators of IT staff, privacy officers, hr professionals

Weitere Infos & Material


Setting the Stage

Positioning Lawful Intercepts (LIs) and Surveillance
ISS Basics and Application Areas
The Position of ISS among Other Support and Security Systems
Basic Requirements for LIs

Electronic Surveillance Laws

Framework of LIs

Challenges

Service Portfolios Overview

Basic Principles for Networking Technologies

Service Portfolios

Circuit-Switched Voice and VoIP
Internet-Related Technologies
Wireless Networks

Cable Networks
Summary

Legal and Technical Standards for Lawful Intercepts

Principal Functions of Interception

Surveillance Rules and Procedures in the United States
Surveillance Rules and Procedures in the European Community

Surveillance Rules and Procedures in Japan

CALEA Reference Model with the J-STD-025 Standard
European Telecommunications Standard Institute (ETSI)
Reference Model for the European Community.85
Summary

Intercept Access Points in Infrastructure Components
Blueprints and Guidelines for TSPs

Reference Model of the Infrastructure
Principles of Monitoring and Intercepts (Hardware and Software Probes)
Use of Signaling Systems for LIs

Resource Planning for LIs

Summary

Extended Functions for Lawful Intercepts

Principal Functions of LIs
Role of Mediation
Handover Interfaces (HIs)
Data Retention and Data Preservation Solutions

Document Management and Document-Related Technology (DRT)
Information Life-Cycle Management
Receiver Applications
Summary

Lawful Intercept Solution Architectures

Frameworks for LIs

Key Products and Players

Siemens AG Monitoring Center

Selection Criteria
Summary

Case Studies for ISS Solutions
Case Study 1: Wireline Voice Intercept and Surveillance
Solutions from Lucent Technologies
Case Study 2: Lawful Interception in CDMA Wireless IP
Networks from SS8 Networks

Case Study 3: LIs for 3G Networks Using ALIS
Case Study 4: Lawful Interception for IP Networks Using ALIS
Case Study 5: Lawful Intercepts for Cable VoIP Networks from
SS8 Networks

Case Study 6: Monitoring and Logging Web Activities

Case Study 7: Lawful Interception of VoIP by NetCentrex and
GTEN AG

Case Study 8: Lawful Interception for E-mail Server Providers
by GTEN AG
Case Study 9: MC Case Examples from Siemens AG
Summary

Operating Lawful Intercepts

Operational Requirements

Prerequisites of Lawful Interception in the
United States, Europe, and Japan

Executing LI Missions in the United States, Europe, and Japan
Functional Role Model
Administration and Management
Security Considerations

Human Resources

Summary

Costs and Reimbursement of Expenses for
Telecommunications Service Providers

Cost Components

Quantification of Costs and Reimbursement Strategies
Return on Investment (ROI)
Summary

Outsourcing Lawful Interception Functions
Forces Driving Outsourcing
The LEA Model
The ASP Model

The Service Bureau Model
Sourcing Governance
Who Are the Principal Players?
Summary

Summary and Trends

Appendices
A Glossary
B Acronyms

C References



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.