Technologies for Lawful Intercepts
E-Book, Englisch, 488 Seiten
ISBN: 978-1-4200-3128-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.
Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems.
Zielgruppe
Service providers, network engineers, administrators of IT staff, privacy officers, hr professionals
Autoren/Hrsg.
Weitere Infos & Material
Setting the Stage
Positioning Lawful Intercepts (LIs) and Surveillance
ISS Basics and Application Areas
The Position of ISS among Other Support and Security Systems
Basic Requirements for LIs
Electronic Surveillance Laws
Framework of LIs
Challenges
Service Portfolios Overview
Basic Principles for Networking Technologies
Service Portfolios
Circuit-Switched Voice and VoIP
Internet-Related Technologies
Wireless Networks
Cable Networks
Summary
Legal and Technical Standards for Lawful Intercepts
Principal Functions of Interception
Surveillance Rules and Procedures in the United States
Surveillance Rules and Procedures in the European Community
Surveillance Rules and Procedures in Japan
CALEA Reference Model with the J-STD-025 Standard
European Telecommunications Standard Institute (ETSI)
Reference Model for the European Community.85
Summary
Intercept Access Points in Infrastructure Components
Blueprints and Guidelines for TSPs
Reference Model of the Infrastructure
Principles of Monitoring and Intercepts (Hardware and Software Probes)
Use of Signaling Systems for LIs
Resource Planning for LIs
Summary
Extended Functions for Lawful Intercepts
Principal Functions of LIs
Role of Mediation
Handover Interfaces (HIs)
Data Retention and Data Preservation Solutions
Document Management and Document-Related Technology (DRT)
Information Life-Cycle Management
Receiver Applications
Summary
Lawful Intercept Solution Architectures
Frameworks for LIs
Key Products and Players
Siemens AG Monitoring Center
Selection Criteria
Summary
Case Studies for ISS Solutions
Case Study 1: Wireline Voice Intercept and Surveillance
Solutions from Lucent Technologies
Case Study 2: Lawful Interception in CDMA Wireless IP
Networks from SS8 Networks
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 4: Lawful Interception for IP Networks Using ALIS
Case Study 5: Lawful Intercepts for Cable VoIP Networks from
SS8 Networks
Case Study 6: Monitoring and Logging Web Activities
Case Study 7: Lawful Interception of VoIP by NetCentrex and
GTEN AG
Case Study 8: Lawful Interception for E-mail Server Providers
by GTEN AG
Case Study 9: MC Case Examples from Siemens AG
Summary
Operating Lawful Intercepts
Operational Requirements
Prerequisites of Lawful Interception in the
United States, Europe, and Japan
Executing LI Missions in the United States, Europe, and Japan
Functional Role Model
Administration and Management
Security Considerations
Human Resources
Summary
Costs and Reimbursement of Expenses for
Telecommunications Service Providers
Cost Components
Quantification of Costs and Reimbursement Strategies
Return on Investment (ROI)
Summary
Outsourcing Lawful Interception Functions
Forces Driving Outsourcing
The LEA Model
The ASP Model
The Service Bureau Model
Sourcing Governance
Who Are the Principal Players?
Summary
Summary and Trends
Appendices
A Glossary
B Acronyms
C References