Download presentation
Presentation is loading. Please wait.
Published byArron Reynolds Modified over 9 years ago
1
DECISION Group Inc.
2
Decision Group www.edecision4u.com Mediation Device for Internet Access Provider
3
A legally sanctioned official access to private communications of specific targets through – telephone calls – e-mail messages – … A security process: through which a communication service provider collects and provides law enforcement with intercepted communications of private individuals or organizations. What is Lawful Interception
4
What Challenges to Current LI Based on old telecom network of voice analog technology without support of new IP technology All batch job task without quick response to immediate events LI result report acquired one or two days later because of batch processing tasks Only on voice and email without on the scope of many other popular online services Cyber crime rings rely on 60% on voice and email and 40% on other social media, instant message, and interactive tools… Current Out-of-Date LI Technology cannot Mitigate the Risk of Attacks from Crime Rings
5
For both Telecom and Network Environment Compliant with ETSI or CALEA Standards Getting IP packet data stream from Telecom and Internet Service Providers Decoding as many protocols as possible Data retention capability for long term tracking and reporting Easy to deploy and manage with high security control New Criteria for Lawful Interception Standard Integrated Lawful Interception Solutions from Decision Group
6
Scenario and Actors for LI target Correspondent Handover interface Interception interface Regulators Service Providers Mediation Vendors Collection Vendors Interception Vendors Monitor
7
ETSI Lawful Interception Model LEMF Network Internal Functions Intercept related information (IRI) Content of Communication (CC) Administration function IRI Mediation function Content Mediation function IIF INI HI1 HI2 HI3 IIF: Internal interception Function INI: Internal Network Interface HI1: Administraive Information HI2: Intercept Related Information HI3: Content of Communication NWO/AP/SvP Domain Interception Vendors Mediation Vendors Collection Vendors
8
LI Plane @ LEA LI Plane @ ISP Court Investigator Crime Investigation Cycle with LI Interception & Filtering Delivery Target Provision Warrant Management Decoding & Reconstruction Deep Content Inspection Presentation GSN Core Router BRAS AAA IP Data -Control Plane -User Plane
9
Wired IAS Passive Interception
10
Wired IAS Active Interception
11
Wireless 3G Passive Interception
12
iMediatior System Spec - Target Type ISP account/RADIUS CPE MAC address/RADIUS IP address MSISDN/GTP-C - Packet Pre-processing GTP-C, GTP-U, RADIUS…. - Interception Adaptor Passive Sniffing: DG certified IP Probe Active Filtering : BRAS,GGSN,HA,MME,SGW,PGW - Data Delivery Proprietary Handover Interface: DG HI ETSI Handover interface: ETSI TS 102 232-1/3 - Capacity per Server (HP DL380 G8) Max 300 active interception session Target Provision Interception & Filtering Delivery
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.