DECISION Group Inc.
Decision Group Mediation Device for Internet Access Provider
A legally sanctioned official access to private communications of specific targets through – telephone calls – messages – … A security process: through which a communication service provider collects and provides law enforcement with intercepted communications of private individuals or organizations. What is Lawful Interception
What Challenges to Current LI Based on old telecom network of voice analog technology without support of new IP technology All batch job task without quick response to immediate events LI result report acquired one or two days later because of batch processing tasks Only on voice and without on the scope of many other popular online services Cyber crime rings rely on 60% on voice and and 40% on other social media, instant message, and interactive tools… Current Out-of-Date LI Technology cannot Mitigate the Risk of Attacks from Crime Rings
For both Telecom and Network Environment Compliant with ETSI or CALEA Standards Getting IP packet data stream from Telecom and Internet Service Providers Decoding as many protocols as possible Data retention capability for long term tracking and reporting Easy to deploy and manage with high security control New Criteria for Lawful Interception Standard Integrated Lawful Interception Solutions from Decision Group
Scenario and Actors for LI target Correspondent Handover interface Interception interface Regulators Service Providers Mediation Vendors Collection Vendors Interception Vendors Monitor
ETSI Lawful Interception Model LEMF Network Internal Functions Intercept related information (IRI) Content of Communication (CC) Administration function IRI Mediation function Content Mediation function IIF INI HI1 HI2 HI3 IIF: Internal interception Function INI: Internal Network Interface HI1: Administraive Information HI2: Intercept Related Information HI3: Content of Communication NWO/AP/SvP Domain Interception Vendors Mediation Vendors Collection Vendors
LI LEA LI ISP Court Investigator Crime Investigation Cycle with LI Interception & Filtering Delivery Target Provision Warrant Management Decoding & Reconstruction Deep Content Inspection Presentation GSN Core Router BRAS AAA IP Data -Control Plane -User Plane
Wired IAS Passive Interception
Wired IAS Active Interception
Wireless 3G Passive Interception
iMediatior System Spec - Target Type ISP account/RADIUS CPE MAC address/RADIUS IP address MSISDN/GTP-C - Packet Pre-processing GTP-C, GTP-U, RADIUS…. - Interception Adaptor Passive Sniffing: DG certified IP Probe Active Filtering : BRAS,GGSN,HA,MME,SGW,PGW - Data Delivery Proprietary Handover Interface: DG HI ETSI Handover interface: ETSI TS /3 - Capacity per Server (HP DL380 G8) Max 300 active interception session Target Provision Interception & Filtering Delivery