Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010134634 | KF4850 H64 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010134841 | KF4850 H64 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010088843 | KF4850 H64 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors.
This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.
Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems.
Author Notes
Hoffmann Paul , Kornel Terplan
Table of Contents
1 Setting the Stage | p. 1 |
1.1 Positioning Lawful Intercepts (LIs) and Surveillance | p. 2 |
1.2 ISS Basics and Application Areas | p. 3 |
1.3 The Position of ISS among Other Support and Security Systems | p. 7 |
1.4 Basic Requirements for LIs | p. 9 |
1.5 Electronic Surveillance Laws | p. 11 |
1.5.1 Legal Background of Surveillance | p. 11 |
1.5.2 Duties of TSPs and Operators of Telecommunications Equipment | p. 11 |
1.5.3 Prerequisites of Surveillance | p. 12 |
1.5.4 Executing Surveillance Actions | p. 12 |
1.5.5 Control and Sanctions in the Area of Surveillance | p. 12 |
1.5.6 Reimbursement for Providers | p. 13 |
1.6 Framework of LIs | p. 13 |
1.7 Challenges | p. 15 |
2 Service Portfolios Overview | p. 19 |
2.1 Basic Principles for Networking Technologies | p. 20 |
2.1.1 Connection-Oriented and Connectionless Communications | p. 21 |
2.1.2 Use of Physical and Virtual Circuits | p. 21 |
2.1.3 Switching Technologies | p. 23 |
2.1.4 Routing Technologies | p. 25 |
2.1.5 Multiplexing Technologies | p. 26 |
2.1.6 Addressing and Identification Schemes | p. 27 |
2.1.7 Control and Congestion Management | p. 28 |
2.2 Service Portfolios | p. 29 |
2.2.1 Wireline Voice Services | p. 29 |
2.2.2 Wireline Data Services | p. 30 |
2.2.3 Wireless and Mobile Services | p. 31 |
2.2.4 Integrated Services | p. 33 |
2.2.5 Cable-Based Services | p. 34 |
2.2.6 IP-Based Services | p. 34 |
2.3 Circuit-Switched Voice and VoIP | p. 35 |
2.4 Internet-Related Technologies | p. 45 |
2.5 Wireless Networks | p. 50 |
2.6 Cable Networks | p. 54 |
2.7 Lawful Interception Requirements for Communications Satellite Operators | p. 58 |
2.8 Summary | p. 59 |
3 Legal and Technical Standards for Lawful Intercepts | p. 61 |
3.1 Principal Functions of Interception | p. 63 |
3.1.1 Accessing Data | p. 64 |
3.1.2 Delivering Data | p. 64 |
3.1.3 Collecting Data | p. 64 |
3.2 Surveillance Rules and Procedures in the United States | p. 65 |
3.2.1 Legal Background of Surveillance | p. 65 |
3.2.2 Duties of TSPs and Operators of Telecommunications Equipment | p. 70 |
3.2.3 Control and Sanctions in the Area of Surveillance | p. 72 |
3.3 Surveillance Rules and Procedures in the European Community | p. 74 |
3.3.1 France | p. 74 |
3.3.2 United Kingdom | p. 77 |
3.4 Surveillance Rules and Procedures in Japan | p. 81 |
3.4.1 Legal Background of Surveillance | p. 82 |
3.4.2 Duties of TSPs and Operators of Telecommunications Equipment | p. 83 |
3.4.3 Control and Sanctions in the Area of Surveillance | p. 84 |
3.5 CALEA Reference Model with the J-STD-025 Standard | p. 84 |
3.5.1 CALEA Interfaces | p. 85 |
3.5.2 CALEA Principal Functions | p. 86 |
3.6 European Telecommunications Standard Institute (ETSI) Reference Model for the European Community | p. 87 |
3.6.1 Basics of This Standard | p. 88 |
3.6.2 HIs | p. 89 |
3.6.3 ETSI Security Recommendations | p. 93 |
3.7 Summary | p. 94 |
4 Intercept Access Points in Infrastructure Components | p. 95 |
4.1 Blueprints and Guidelines for TSPs | p. 96 |
4.1.1 eTOM | p. 97 |
4.1.2 TMN | p. 100 |
4.1.3 Control Objectives for Information and Related Technology (CobiT) | p. 106 |
4.1.4 The Infrastructure Library (ITIL) Processes | p. 108 |
4.2 Reference Model of the Infrastructure | p. 108 |
4.2.1 Applications and Services | p. 109 |
4.2.2 Computers | p. 112 |
4.2.3 Networks and Network Equipment | p. 112 |
4.2.4 Reference Management Architecture | p. 113 |
4.2.5 Overlaying Infrastructure Components | p. 118 |
4.3 Principles of Monitoring and Intercepts (Hardware and Software Probes) | p. 120 |
4.3.1 Internal and External Lawful Interception | p. 120 |
4.3.2 Access Function (AF) Implementation Approaches | p. 122 |
4.3.3 Use of Probes | p. 123 |
4.3.4 Intelligence Transmission | p. 127 |
4.4 Use of Signaling Systems for LIs | p. 128 |
4.5 Resource Planning for LIs | p. 130 |
4.6 Summary | p. 132 |
5 Extended Functions for Lawful Intercepts | p. 133 |
5.1 Principal Functions of LIs | p. 134 |
5.2 Role of Mediation | p. 135 |
5.3 Handover Interfaces (HIs) | p. 144 |
5.3.1 Formatting Handover Data | p. 145 |
5.3.2 Handover Protocols | p. 151 |
5.3.3 Physical Handover Interfaces (HIs) | p. 155 |
5.4 Data Retention and Data Preservation Solutions | p. 156 |
5.5 Document Management and Document-Related Technology (DRT) | p. 160 |
5.6 Information Life-Cycle Management | p. 165 |
5.7 Receiver Applications | p. 167 |
5.7.1 Support for Recognizing Criminal Activities | p. 167 |
5.7.2 Analysis Procedures and Tools | p. 168 |
5.7.3 Use of Geographical Information Systems (GISs) | p. 170 |
5.8 Summary | p. 174 |
6 Lawful Intercept Solution Architectures | p. 175 |
6.1 Frameworks for LIs | p. 177 |
6.1.1 Xcipio from SS8 Networks | p. 177 |
6.1.2 Aqsacom ALIS | p. 183 |
6.1.3 GTEN AG Framework | p. 190 |
6.2 Key Products and Players | p. 196 |
6.2.1 SS8 Networks | p. 196 |
6.2.2 Products from Aqsacom | p. 206 |
6.2.3 GTEN | p. 209 |
6.2.4 Utimaco Safeware AG Interception Management System (IMS) | p. 219 |
6.2.5 ETI Connect LI Network Connector (LINC) | p. 223 |
6.2.6 Forensic Explorers NetWitness | p. 226 |
6.2.7 Session Border Control | p. 228 |
6.3 Siemens AG Monitoring Center | p. 231 |
6.3.1 Architecture of the MC | p. 232 |
6.3.2 Components and Applications | p. 233 |
6.3.3 Features of the MC | p. 235 |
6.4 Selection Criteria | p. 236 |
6.5 Summary | p. 238 |
7 Case Studies for ISS Solutions | p. 241 |
7.1 Case Study 1: Wireline Voice Intercept and Surveillance Solutions from Lucent Technologies | p. 243 |
7.1.1 Network Reference Model | p. 243 |
7.1.2 CALEA Functions | p. 244 |
7.1.3 Levels of Surveillance (Level I and Level II) | p. 244 |
7.1.4 CALEA Interfaces (SAS, CDC, and CCC) | p. 245 |
7.1.5 Conclusions | p. 245 |
7.2 Case Study 2: Lawful Interception in CDMA Wireless IP Networks from SS8 Networks | p. 246 |
7.2.1 Scenario 1: Intercept Provisioning, Target Not Involved in Data Session | p. 250 |
7.2.2 Scenario 2: Intercept Provisioning, Target Involved in Data Session | p. 251 |
7.2.3 Scenario 3: Data Session Termination | p. 251 |
7.2.4 Scenario 4: Intercept Expiration, Target Inactive | p. 252 |
7.2.5 Scenario 5: Intercept Expiration, Target Active | p. 252 |
7.2.6 Push to Talk over Cellular (PoC) | p. 255 |
7.3 Case Study 3: LIs for 3G Networks Using ALIS | p. 256 |
7.3.1 Uses of 3G Technology and Implications for Lawful Interception | p. 257 |
7.3.2 Overview of 3G Architectures | p. 259 |
7.3.3 Lawful Interception in 3G Networks | p. 259 |
7.3.4 ALIS in 3G Networks | p. 266 |
7.3.5 Conclusions | p. 266 |
7.4 Case Study 4: Lawful Interception for IP Networks Using ALIS | p. 267 |
7.4.1 Issues in IP Interception | p. 268 |
7.4.2 IP Interception Examples | p. 269 |
7.4.3 ALIS for IP | p. 286 |
7.4.4 Conclusions | p. 288 |
7.5 Case Study 5: Lawful Intercepts for Cable VoIP Networks from SS8 Networks | p. 288 |
7.6 Case Study 6: Monitoring and Logging Web Activities | p. 296 |
7.6.1 Features and Attributes of Monitoring and Logging Tools | p. 297 |
7.6.2 IP Monitoring System from GTEN AG | p. 303 |
7.7 Case Study 7: Lawful Interception of VoIP by NetCentrex and GTEN AG | p. 307 |
7.7.1 Architecture of the Solution | p. 307 |
7.7.2 Description of the Interfaces | p. 311 |
7.7.3 Deployment of the Solution | p. 316 |
7.8 Case Study 8: Lawful Interception for E-Mail Server Providers by GTEN AG | p. 319 |
7.8.1 Passive Filtering in SMTP and POP3 Protocols | p. 319 |
7.8.2 Passive Filtering with a Web Interface | p. 320 |
7.8.3 Active Filtering Using an Application Proxy | p. 321 |
7.8.4 Modification of Mail Server Software | p. 322 |
7.9 Case Study 9: MC Case Examples from Siemens AG | p. 323 |
7.9.1 Fixed Network - PSTN | p. 323 |
7.9.2 Mobile Network - GSM | p. 327 |
7.9.3 Mobile Networks - GPRS/UMTS | p. 328 |
7.9.4 Internet Monitoring | p. 329 |
7.9.5 Conclusions | p. 332 |
7.10 Summary | p. 332 |
8 Operating Lawful Intercepts | p. 335 |
8.1 Operational Requirements | p. 337 |
8.2 Prerequisites of Lawful Interception in the United States, Europe, and Japan | p. 338 |
8.2.1 United States | p. 338 |
8.2.2 Europe | p. 340 |
8.2.3 Japan | p. 343 |
8.3 Executing LI Missions in the United States, Europe, and Japan | p. 344 |
8.3.1 United States | p. 344 |
8.3.2 Europe | p. 346 |
8.3.3 Japan | p. 348 |
8.4 Functional Role Model | p. 349 |
8.5 Administration and Management | p. 353 |
8.5.1 Inventory Management Processes | p. 354 |
8.5.2 Problem Management and Repair Processes | p. 356 |
8.5.3 Provisioning Processes | p. 359 |
8.5.4 Service-Level Management (SLM) Processes | p. 361 |
8.5.5 Systems Management and Administration | p. 363 |
8.6 Security Considerations | p. 363 |
8.7 Human Resources | p. 365 |
8.7.1 Building a Team | p. 365 |
8.7.2 Retaining the Team | p. 367 |
8.7.3 Job Profiles | p. 368 |
8.7.4 Head Counts | p. 377 |
8.8 Summary | p. 379 |
9 Costs and Reimbursement of Expenses for Telecommunications Service Providers | p. 381 |
9.1 Cost Components | p. 382 |
9.1.1 One-Time Costs | p. 382 |
9.1.2 Operating Costs | p. 384 |
9.1.3 Cost Analysis | p. 385 |
9.2 Quantification of Costs and Reimbursement Strategies | p. 389 |
9.2.1 United States | p. 389 |
9.2.2 Europe | p. 392 |
9.2.3 Japan | p. 394 |
9.2.4 Reimbursement Strategies at Large | p. 395 |
9.3 Return on Investment (ROI) | p. 395 |
9.3.1 Considerations Other Than ROI | p. 395 |
9.3.2 ISS Cost Justification | p. 396 |
9.3.3 ISS Profitability Trends | p. 396 |
9.4 Summary | p. 397 |
10 Outsourcing Lawful Interception Functions | p. 399 |
10.1 Forces Driving Outsourcing | p. 400 |
10.2 The LEA Model | p. 402 |
10.3 The ASP Model | p. 403 |
10.4 The Service Bureau Model | p. 403 |
10.5 Sourcing Governance | p. 407 |
10.5.1 Contract Management | p. 410 |
10.5.2 Delivery Management | p. 416 |
10.6 Who Are the Principal Players? | p. 417 |
10.7 Summary | p. 418 |
11 Summary and Trends | p. 419 |
Appendices | |
A Glossary | p. 425 |
B Acronyms | p. 433 |
C References | p. 443 |
Index | p. 447 |