What is the need of Lawful Interception ?
Need for Lawful Interception
With the advancement in communication technologies, the way systematized crime syndicates operate throughout the world has changed drastically. While numerous technological advances have been exploited for conducting felonious conditioning, none has probably had a lesser impact or influence than the internet. This exploitation of the Internet has not only given rise to a fully new form of crime but is also facilitating crime across other crime areas. Thus in order to combat similar lawless operations, Law Enforcement Agencies ( LEAs) must have access to suspicious communications that allows them to nip the cub at an early stage. To enable access to similar dispatches, Governments across the globe have made it obligatory for the Telecommunication Service Providers to block dispatches and transmit them to LEAs for further analysis. Lawful Interception system ( LI) is one of the nonsupervisory conditions that the telecommunication service providers must satisfy as a legal obligation toward the public security of the country in which they're operating their businesses.
The lawful Interception Management System platform consists of the following main components:
iNterceptor Management Server: iNterceptor MS is the main element of the platform, which is responsible for Target Management, Target Provisioning, Warrant Management, Stoner Operation, Administration of Intercept Access Points/ Network fundamentals, and Operation of LEAs and Monitoring Centers.
iNterceptor Mediator : iNteceptor Mediator (MD) is responsible for transferring interdicted communication (IRI/ CC) to the authorized LEAs. It stores the delivery preferences for different LEAs and converts the interdicted data into the asked formats as per the LEAs’ demand. It delivers the intercepted data as per various public and transnational norms including 3GPP, CALEA, ATIS, and ETSI. iNterceptor MD supports network fundamentals of all the major NEPs
iNteliProbe : PertSol iNteliProbe is an anon-intrusive network inquiry that's used in unresistant interception to purity the marketplace to unwarp target business. It's also responsible for decoding the blocked traffic and forwarding it to iNterceptor Mediator for conversion and further delivery to LEAs. iNteliProbe has in erected a Deep Packet Examination machine which helps it to drill into the burden of the packets for in-depth analysis of the marketplace.
Network Aggregator: It is an additional layer of network aggregation which is used for better manageability of links. It is used where the operator has a mix of different types of network links
Network Taps: Network Valve (Test Access Point) tackle device that helps in penetrating and covering network business by copying packets without impacting or compromising network integrity. The Valve allows network business to inflow between its network anchorages without interruption, creating an exact dupe of both sides of the business inflow. The indistinguishable clones are also used by iNteliProbes for business filtration.
What is Interceptor ?
iNterceptor is completely amenable to the international norms like ETSI, CALEA, TEC, ANSI, 3GPP, CCSA, ARIB, ATIS, TTA & other applicable LI norms. The core purpose of iNterceptor is to intercept the business and convert the intercepted business into a format suitable for delivery to the National Authorities or Law Enforcement Agencies, over a secure network. It can also retain the intercepted business for future use by the LEAs.
iNterceptor supports DPI which can be used to passively analyze IP business at the operation position. It can look outside all IP business, drill into the payload (the substance) of the packets, identify the operations used, pick out specific types of business (e.g. HTTP business), isolate a particular operation (e.g. Hotmail), and also crack Operation attributes and content (e.g. web mails transferred and entered by the stoner). The same principle would apply to VoIP, peer-to-peer, and any other business that would need to be interdicted. In other words, iNterceptor produces clear- textbook records for various types of operations and protocols which are effectively not interceptable by routers and switches.
Benefits of Interceptor :
iNterceptor is capable of handling networks with very high throughput requirements. It can handle multiple 100 Gbps links and is capable of selecting required traffic from these links. iNteliProbe have been tested and implemented for traffic up to 40 Gbps per probe.
The integrity check mechanism periodically checks the network elements and if required corrects the erroneous states. It will query the network element for the placed intercepts and add missing intercepts, remove invalid intercepts, etc. This mechanism is used to detect and correct both network flaws as well as tampering with the interception solution. In case of correction of an erroneous state, this will be notified to the operator.
Comments
Post a Comment