DECISION Group Inc.. Decision Group www.edecision4u.com Mediation Device for Internet Access Provider.

Slides:



Advertisements
Similar presentations
Lawful Intercept Briefing
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.
EduCause LI Overview February 2007
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Using COTS Routers for Lawful Intercept Annual Member Meeting.
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
Total LI Compliance using Turn-key Applications and Solutions Rami Mittelman V.P. Product Marketing.
The Problem: With high speed devices like smartphones and new IP services like voice over IP, Facebook and Twitter, the challenge of communication analysis.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
Copyright © 2003 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper CALEA(LI)/Monitoring Solution Architectures Richard Holben.
SS8 Lawful Intercept Briefing
Network Forensics and Lawful Interception Total Solutions Provider
Lawful Interception in 3G IP Multimedia Subsystem
Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp.
The Internet & The New IT Infrastructure Chapter 9.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Networking Components
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
CALEA Discussion Network Policy Council February 4, 2007.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Market Analysis Decision Group.
Security and LI; ETSI’s role in standards
Cyber Crime & Investigation IT Security Consultant
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
COEN 252 Computer Forensics
Lawful Interception & Packet Forensics Analysis System for Telecom and ISP Special promotion:- EDDC : Off-line Packet Reconstruction & Network Forensics.
What is FORENSICS? Why do we need Network Forensics?
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
COEN 252 Computer Forensics Collecting Network-based Evidence.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Copyright © 2003, SS8 Networks, Inc. Proprietary. Do Not Copy or Distribute Without Permission. Emergency Services & Regulatory Compliance Internet Telephony.
CALEA Communications Assistance for Law Enforcement Act October 20, 2005.
Lync - phone, voice mailbox, instant messaging … Pawel Grzywaczewski CERN IT/OIS.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
STAR-GATE for PACKET DATA Arkady Linshitz Product Manager.
Evolution towards the Next Generation Network
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
HP Overview. HP Overview is a family of integrated network and system management solution for managing the complete IT enterprises, including networks,
CALEA IMPLEMENTATION IN VoIP NETWORKS By Cemal Dikmen, Ph.D. General Manager Lawful Intercept Products SS8 Networks, Inc. Thursday - 02/24/05, 8:15-9:00am.
William Stallings Data and Computer Communications
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Consumer Protection Definition. 1 Current General Frameworks For CP. 2 Gaps/Risk areas in current Frameworks. 3 Consumer Protection Pillars. 4 NGN/Convergence.
Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Telecom Forum – February 2016: Law Regulation and Enforcement Flexible or over-compliant: The role of telecommunications operators in electronic law enforcement.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
NETWORK DEVICES Department of CE/IT.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
The FoxReplay Analyst Dirk Peeters, Fox-IT What is FoxReplay Analyst? FoxReplay Analyst is a platform to fully benefit from intercepted Internet Analyst.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
CALEA TAMU ITEC Walt Magnussen, Ph.D. Director TAMU ITEC Joint Techs, February 2007.
1 RANS Conference#10, 24 March 2011; session ETSI Lawful Interception standardization Peter van der Arend Питер ван дер Аренд Chairman ETSI/TC LI.
Lawful Interception & Next Generation Networks
Update on Lawful Interception (LI) Directive for ISPs
Lawful Interception Solutions
Lawful Interception Basics
Presentation transcript:

DECISION Group Inc.

Decision Group Mediation Device for Internet Access Provider

A legally sanctioned official access to private communications of specific targets through – telephone calls – messages – … A security process: through which a communication service provider collects and provides law enforcement with intercepted communications of private individuals or organizations. What is Lawful Interception

What Challenges to Current LI  Based on old telecom network of voice analog technology without support of new IP technology  All batch job task without quick response to immediate events  LI result report acquired one or two days later because of batch processing tasks  Only on voice and without on the scope of many other popular online services  Cyber crime rings rely on 60% on voice and and 40% on other social media, instant message, and interactive tools… Current Out-of-Date LI Technology cannot Mitigate the Risk of Attacks from Crime Rings

For both Telecom and Network Environment Compliant with ETSI or CALEA Standards Getting IP packet data stream from Telecom and Internet Service Providers Decoding as many protocols as possible Data retention capability for long term tracking and reporting Easy to deploy and manage with high security control New Criteria for Lawful Interception Standard Integrated Lawful Interception Solutions from Decision Group

Scenario and Actors for LI target Correspondent Handover interface Interception interface Regulators Service Providers Mediation Vendors Collection Vendors Interception Vendors Monitor

ETSI Lawful Interception Model LEMF Network Internal Functions Intercept related information (IRI) Content of Communication (CC) Administration function IRI Mediation function Content Mediation function IIF INI HI1 HI2 HI3 IIF: Internal interception Function INI: Internal Network Interface HI1: Administraive Information HI2: Intercept Related Information HI3: Content of Communication NWO/AP/SvP Domain Interception Vendors Mediation Vendors Collection Vendors

LI LEA LI ISP Court Investigator Crime Investigation Cycle with LI Interception & Filtering Delivery Target Provision Warrant Management Decoding & Reconstruction Deep Content Inspection Presentation GSN Core Router BRAS AAA IP Data -Control Plane -User Plane

Wired IAS Passive Interception

Wired IAS Active Interception

Wireless 3G Passive Interception

iMediatior System Spec - Target Type ISP account/RADIUS CPE MAC address/RADIUS IP address MSISDN/GTP-C - Packet Pre-processing GTP-C, GTP-U, RADIUS…. - Interception Adaptor Passive Sniffing: DG certified IP Probe Active Filtering : BRAS,GGSN,HA,MME,SGW,PGW - Data Delivery Proprietary Handover Interface: DG HI ETSI Handover interface: ETSI TS /3 - Capacity per Server (HP DL380 G8) Max 300 active interception session Target Provision Interception & Filtering Delivery