Cover image for Intelligence support systems :  technologies for lawful intercepts
Title:
Intelligence support systems : technologies for lawful intercepts
Personal Author:
Publication Information:
Boca Raton : Auerbach Publications, 2006
ISBN:
9780849328558
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010134634 KF4850 H64 2006 Open Access Book Book
Searching...
Searching...
30000010134841 KF4850 H64 2006 Open Access Book Book
Searching...
Searching...
30000010088843 KF4850 H64 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors.

This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.

Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems.


Author Notes

Hoffmann Paul , Kornel Terplan


Table of Contents

1 Setting the Stagep. 1
1.1 Positioning Lawful Intercepts (LIs) and Surveillancep. 2
1.2 ISS Basics and Application Areasp. 3
1.3 The Position of ISS among Other Support and Security Systemsp. 7
1.4 Basic Requirements for LIsp. 9
1.5 Electronic Surveillance Lawsp. 11
1.5.1 Legal Background of Surveillancep. 11
1.5.2 Duties of TSPs and Operators of Telecommunications Equipmentp. 11
1.5.3 Prerequisites of Surveillancep. 12
1.5.4 Executing Surveillance Actionsp. 12
1.5.5 Control and Sanctions in the Area of Surveillancep. 12
1.5.6 Reimbursement for Providersp. 13
1.6 Framework of LIsp. 13
1.7 Challengesp. 15
2 Service Portfolios Overviewp. 19
2.1 Basic Principles for Networking Technologiesp. 20
2.1.1 Connection-Oriented and Connectionless Communicationsp. 21
2.1.2 Use of Physical and Virtual Circuitsp. 21
2.1.3 Switching Technologiesp. 23
2.1.4 Routing Technologiesp. 25
2.1.5 Multiplexing Technologiesp. 26
2.1.6 Addressing and Identification Schemesp. 27
2.1.7 Control and Congestion Managementp. 28
2.2 Service Portfoliosp. 29
2.2.1 Wireline Voice Servicesp. 29
2.2.2 Wireline Data Servicesp. 30
2.2.3 Wireless and Mobile Servicesp. 31
2.2.4 Integrated Servicesp. 33
2.2.5 Cable-Based Servicesp. 34
2.2.6 IP-Based Servicesp. 34
2.3 Circuit-Switched Voice and VoIPp. 35
2.4 Internet-Related Technologiesp. 45
2.5 Wireless Networksp. 50
2.6 Cable Networksp. 54
2.7 Lawful Interception Requirements for Communications Satellite Operatorsp. 58
2.8 Summaryp. 59
3 Legal and Technical Standards for Lawful Interceptsp. 61
3.1 Principal Functions of Interceptionp. 63
3.1.1 Accessing Datap. 64
3.1.2 Delivering Datap. 64
3.1.3 Collecting Datap. 64
3.2 Surveillance Rules and Procedures in the United Statesp. 65
3.2.1 Legal Background of Surveillancep. 65
3.2.2 Duties of TSPs and Operators of Telecommunications Equipmentp. 70
3.2.3 Control and Sanctions in the Area of Surveillancep. 72
3.3 Surveillance Rules and Procedures in the European Communityp. 74
3.3.1 Francep. 74
3.3.2 United Kingdomp. 77
3.4 Surveillance Rules and Procedures in Japanp. 81
3.4.1 Legal Background of Surveillancep. 82
3.4.2 Duties of TSPs and Operators of Telecommunications Equipmentp. 83
3.4.3 Control and Sanctions in the Area of Surveillancep. 84
3.5 CALEA Reference Model with the J-STD-025 Standardp. 84
3.5.1 CALEA Interfacesp. 85
3.5.2 CALEA Principal Functionsp. 86
3.6 European Telecommunications Standard Institute (ETSI) Reference Model for the European Communityp. 87
3.6.1 Basics of This Standardp. 88
3.6.2 HIsp. 89
3.6.3 ETSI Security Recommendationsp. 93
3.7 Summaryp. 94
4 Intercept Access Points in Infrastructure Componentsp. 95
4.1 Blueprints and Guidelines for TSPsp. 96
4.1.1 eTOMp. 97
4.1.2 TMNp. 100
4.1.3 Control Objectives for Information and Related Technology (CobiT)p. 106
4.1.4 The Infrastructure Library (ITIL) Processesp. 108
4.2 Reference Model of the Infrastructurep. 108
4.2.1 Applications and Servicesp. 109
4.2.2 Computersp. 112
4.2.3 Networks and Network Equipmentp. 112
4.2.4 Reference Management Architecturep. 113
4.2.5 Overlaying Infrastructure Componentsp. 118
4.3 Principles of Monitoring and Intercepts (Hardware and Software Probes)p. 120
4.3.1 Internal and External Lawful Interceptionp. 120
4.3.2 Access Function (AF) Implementation Approachesp. 122
4.3.3 Use of Probesp. 123
4.3.4 Intelligence Transmissionp. 127
4.4 Use of Signaling Systems for LIsp. 128
4.5 Resource Planning for LIsp. 130
4.6 Summaryp. 132
5 Extended Functions for Lawful Interceptsp. 133
5.1 Principal Functions of LIsp. 134
5.2 Role of Mediationp. 135
5.3 Handover Interfaces (HIs)p. 144
5.3.1 Formatting Handover Datap. 145
5.3.2 Handover Protocolsp. 151
5.3.3 Physical Handover Interfaces (HIs)p. 155
5.4 Data Retention and Data Preservation Solutionsp. 156
5.5 Document Management and Document-Related Technology (DRT)p. 160
5.6 Information Life-Cycle Managementp. 165
5.7 Receiver Applicationsp. 167
5.7.1 Support for Recognizing Criminal Activitiesp. 167
5.7.2 Analysis Procedures and Toolsp. 168
5.7.3 Use of Geographical Information Systems (GISs)p. 170
5.8 Summaryp. 174
6 Lawful Intercept Solution Architecturesp. 175
6.1 Frameworks for LIsp. 177
6.1.1 Xcipio from SS8 Networksp. 177
6.1.2 Aqsacom ALISp. 183
6.1.3 GTEN AG Frameworkp. 190
6.2 Key Products and Playersp. 196
6.2.1 SS8 Networksp. 196
6.2.2 Products from Aqsacomp. 206
6.2.3 GTENp. 209
6.2.4 Utimaco Safeware AG Interception Management System (IMS)p. 219
6.2.5 ETI Connect LI Network Connector (LINC)p. 223
6.2.6 Forensic Explorers NetWitnessp. 226
6.2.7 Session Border Controlp. 228
6.3 Siemens AG Monitoring Centerp. 231
6.3.1 Architecture of the MCp. 232
6.3.2 Components and Applicationsp. 233
6.3.3 Features of the MCp. 235
6.4 Selection Criteriap. 236
6.5 Summaryp. 238
7 Case Studies for ISS Solutionsp. 241
7.1 Case Study 1: Wireline Voice Intercept and Surveillance Solutions from Lucent Technologiesp. 243
7.1.1 Network Reference Modelp. 243
7.1.2 CALEA Functionsp. 244
7.1.3 Levels of Surveillance (Level I and Level II)p. 244
7.1.4 CALEA Interfaces (SAS, CDC, and CCC)p. 245
7.1.5 Conclusionsp. 245
7.2 Case Study 2: Lawful Interception in CDMA Wireless IP Networks from SS8 Networksp. 246
7.2.1 Scenario 1: Intercept Provisioning, Target Not Involved in Data Sessionp. 250
7.2.2 Scenario 2: Intercept Provisioning, Target Involved in Data Sessionp. 251
7.2.3 Scenario 3: Data Session Terminationp. 251
7.2.4 Scenario 4: Intercept Expiration, Target Inactivep. 252
7.2.5 Scenario 5: Intercept Expiration, Target Activep. 252
7.2.6 Push to Talk over Cellular (PoC)p. 255
7.3 Case Study 3: LIs for 3G Networks Using ALISp. 256
7.3.1 Uses of 3G Technology and Implications for Lawful Interceptionp. 257
7.3.2 Overview of 3G Architecturesp. 259
7.3.3 Lawful Interception in 3G Networksp. 259
7.3.4 ALIS in 3G Networksp. 266
7.3.5 Conclusionsp. 266
7.4 Case Study 4: Lawful Interception for IP Networks Using ALISp. 267
7.4.1 Issues in IP Interceptionp. 268
7.4.2 IP Interception Examplesp. 269
7.4.3 ALIS for IPp. 286
7.4.4 Conclusionsp. 288
7.5 Case Study 5: Lawful Intercepts for Cable VoIP Networks from SS8 Networksp. 288
7.6 Case Study 6: Monitoring and Logging Web Activitiesp. 296
7.6.1 Features and Attributes of Monitoring and Logging Toolsp. 297
7.6.2 IP Monitoring System from GTEN AGp. 303
7.7 Case Study 7: Lawful Interception of VoIP by NetCentrex and GTEN AGp. 307
7.7.1 Architecture of the Solutionp. 307
7.7.2 Description of the Interfacesp. 311
7.7.3 Deployment of the Solutionp. 316
7.8 Case Study 8: Lawful Interception for E-Mail Server Providers by GTEN AGp. 319
7.8.1 Passive Filtering in SMTP and POP3 Protocolsp. 319
7.8.2 Passive Filtering with a Web Interfacep. 320
7.8.3 Active Filtering Using an Application Proxyp. 321
7.8.4 Modification of Mail Server Softwarep. 322
7.9 Case Study 9: MC Case Examples from Siemens AGp. 323
7.9.1 Fixed Network - PSTNp. 323
7.9.2 Mobile Network - GSMp. 327
7.9.3 Mobile Networks - GPRS/UMTSp. 328
7.9.4 Internet Monitoringp. 329
7.9.5 Conclusionsp. 332
7.10 Summaryp. 332
8 Operating Lawful Interceptsp. 335
8.1 Operational Requirementsp. 337
8.2 Prerequisites of Lawful Interception in the United States, Europe, and Japanp. 338
8.2.1 United Statesp. 338
8.2.2 Europep. 340
8.2.3 Japanp. 343
8.3 Executing LI Missions in the United States, Europe, and Japanp. 344
8.3.1 United Statesp. 344
8.3.2 Europep. 346
8.3.3 Japanp. 348
8.4 Functional Role Modelp. 349
8.5 Administration and Managementp. 353
8.5.1 Inventory Management Processesp. 354
8.5.2 Problem Management and Repair Processesp. 356
8.5.3 Provisioning Processesp. 359
8.5.4 Service-Level Management (SLM) Processesp. 361
8.5.5 Systems Management and Administrationp. 363
8.6 Security Considerationsp. 363
8.7 Human Resourcesp. 365
8.7.1 Building a Teamp. 365
8.7.2 Retaining the Teamp. 367
8.7.3 Job Profilesp. 368
8.7.4 Head Countsp. 377
8.8 Summaryp. 379
9 Costs and Reimbursement of Expenses for Telecommunications Service Providersp. 381
9.1 Cost Componentsp. 382
9.1.1 One-Time Costsp. 382
9.1.2 Operating Costsp. 384
9.1.3 Cost Analysisp. 385
9.2 Quantification of Costs and Reimbursement Strategiesp. 389
9.2.1 United Statesp. 389
9.2.2 Europep. 392
9.2.3 Japanp. 394
9.2.4 Reimbursement Strategies at Largep. 395
9.3 Return on Investment (ROI)p. 395
9.3.1 Considerations Other Than ROIp. 395
9.3.2 ISS Cost Justificationp. 396
9.3.3 ISS Profitability Trendsp. 396
9.4 Summaryp. 397
10 Outsourcing Lawful Interception Functionsp. 399
10.1 Forces Driving Outsourcingp. 400
10.2 The LEA Modelp. 402
10.3 The ASP Modelp. 403
10.4 The Service Bureau Modelp. 403
10.5 Sourcing Governancep. 407
10.5.1 Contract Managementp. 410
10.5.2 Delivery Managementp. 416
10.6 Who Are the Principal Players?p. 417
10.7 Summaryp. 418
11 Summary and Trendsp. 419
Appendices
A Glossaryp. 425
B Acronymsp. 433
C Referencesp. 443
Indexp. 447