0
Special Topic of Telecommunication NetworkChapter 7Case Studies for ISS Solutions                                Aris Cahy...
Case Study 1: Wireline Voice Intercept andSurveillance Solutions from Lucent Technologies
Case Study 1: Wireline Voice Intercept and  Surveillance Solutions from Lucent TechnologiesCALEA function provide by TSP•A...
Case Study 1: Wireline Voice Intercept and    Surveillance Solutions from Lucent TechnologiesCALEA Interfaces (SAS, CDC, a...
Case Study 2: Lawful Interception in CDMA Wireless         IP Networks from SS8 Networks
Case Study 2: Lawful Interception in CDMA Wireless         IP Networks from SS8 Networks
Case Study 2: Lawful Interception in CDMA Wireless         IP Networks from SS8 NetworksReference Function    AF through ...
Case Study 2: Lawful Interception in CDMA Wireless         IP Networks from SS8 NetworksTypical call flow scenarios are ad...
Case Study 3: LIs for 3G Networks Using ALISUses of 3G        Technology      and    Implications    for   LawfulIntercept...
Case Study 3: LIs for 3G Networks Using ALISLawful Interception in 3G Networks    Figure 7.16 and Figure 7.17, give visua...
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 3: LIs for 3G Networks Using ALISALIS in 3G Networks    Implementation of ALIS as a mediation platform in a UM...
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 4: Lawful Interception for IP Networks                      Using ALISInterception of Internet traffic involves...
Case Study 4: Lawful Interception for IP Networks                      Using ALISIP Interception Examples (Internet Access...
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                      Using ALISIP Interception Examples (Email)    Coll...
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                      Using ALISIP Interception Examples (VoIP)    Call ...
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                      Using ALISALIS for IP    ALIS Internet access (Fig...
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 4: Lawful Interception for IP Networks                  Using ALIS
Case Study 6: Monitoring and Logging ActivitiesFeatures of monitoring and logging for conducting LIs:●    Site-usage analy...
Case Study 6: Monitoring and Logging ActivitiesIP Monitoring System (IMS) from GTEN AG●    Data Collection and Filtering S...
Case Study 6: Monitoring and Logging Activities
Case Study 9: MC Case Examples from Siemens AGFixed Network — PSTN●    Network Protocols : E1 to network switches and EDSS...
Case Study 9: MC Case Examples from Siemens AG
Case Study 9: MC Case Examples from Siemens AG
Case Study 9: MC Case Examples from Siemens AGMobile Networks — GPRS/UMTS●    Network Protocols : E1 to network switches a...
Case Study 9: MC Case Examples from Siemens AG
Case Study 9: MC Case Examples from Siemens AG
ConclusionCase studies, in addition to the necessary level of awarenessregarding product features, can help provide an und...
Thank you
Upcoming SlideShare
Loading in...5
×

Lawful Interception Case Studies for ISS Solutions

338

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
338
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Lawful Interception Case Studies for ISS Solutions"

  1. 1. Special Topic of Telecommunication NetworkChapter 7Case Studies for ISS Solutions Aris Cahyadi Risdianto 23210016
  2. 2. Case Study 1: Wireline Voice Intercept andSurveillance Solutions from Lucent Technologies
  3. 3. Case Study 1: Wireline Voice Intercept and Surveillance Solutions from Lucent TechnologiesCALEA function provide by TSP•Access: network entity intercepts and reports call data and/content toLEA•Delivery: network platform provide interface to LEAs for delivery of callcontent/data•Administration: capability that establishes and maintains surveillancewith TSPLevel of Surveillance•Level I — call related information: Only call-identifyinginformation (CII) is reported, and it is intended to satisfy penregister and trap and trace court orders.•Level II — call and content related information: The intent is tosatisfy a Title-III court order.
  4. 4. Case Study 1: Wireline Voice Intercept and Surveillance Solutions from Lucent TechnologiesCALEA Interfaces (SAS, CDC, and CCC) Surveillance administration system (SAS) for provisioning using existing 5ESS TTY ports CDC for reporting CII (CDC messages) from the switch to the LEA CCC for delivering call content from the switch to the LEAConclusions J-STD-025 compliance : allowing TSPs to meet their obligations under CALEA Flexibility: Different LEAs in different locations may require different CALEA interfaces Cost: Integrated delivery function and dial-out capability significantly reduced the costs Evolution: Current 5ESS CALEA solution can be adapted to future technologies without any effect
  5. 5. Case Study 2: Lawful Interception in CDMA Wireless IP Networks from SS8 Networks
  6. 6. Case Study 2: Lawful Interception in CDMA Wireless IP Networks from SS8 Networks
  7. 7. Case Study 2: Lawful Interception in CDMA Wireless IP Networks from SS8 NetworksReference Function AF through IAP responsible for providing access to an intercept subject’s communications and CII. DF is responsible for delivering intercepted communications and CII to collection functions. CF is responsible for collecting lawfully authorized intercepted communications and CII for an LEA. CF handle by the LEAIAP on the CDMA 2000 Packet Data Network AAA (IAP for CII) PDSN (call-content IAP for simple IP) HA (call-content IAP for mobile IP)
  8. 8. Case Study 2: Lawful Interception in CDMA Wireless IP Networks from SS8 NetworksTypical call flow scenarios are addressed Scenario 1: Intercept Provisioning, Target Not Involved in Data Session Scenario 2: Intercept Provisioning, Target Involved in Data Session Scenario 3: Data Session Termination Scenario 4: Intercept Expiration, Target Inactive Scenario 5: Intercept Expiration, Target Active
  9. 9. Case Study 3: LIs for 3G Networks Using ALISUses of 3G Technology and Implications for LawfulInterception Voice, increasing proportion of LI requests from LEAs because increasing amount of voice traffic as users migrate from wireline to wireless services. SMS, LI will have to address growing use of the service among interception targets. General Internet connectivity, added complication of the mobility of the target, the proportion of Internet communications over mobile networks will grow because more "safer" for crimininals and variety of devices with which to communicate (modem, PDA, etc) High-speed photo and video clip upload and download, LI need to be prepared to intercept video and still imagery in against abusers. Multimedia games, LI tracking users and sources of games involving illicit thematic material (child pornography, gambling, and hate targeting). VoIP, VoIP traffic raises a number of technical and legal issues that cannot be ignored.
  10. 10. Case Study 3: LIs for 3G Networks Using ALISLawful Interception in 3G Networks Figure 7.16 and Figure 7.17, give visualization of where to capture call data (IRI) and call content and also where LI management functions flow. Figure 7.18, provide a closer view of interception topology in 3G networks (sufficiently general to include cdma2000) for circuit- switched network operations. LI management commands are conveyed between the administrative function (ADMF) and other network elements via the X1 interface. Intercepted call data (IRI) are conveyed via the X2 interface. Intercepted call content is gathered via the X3 interface, and relayed to LEA using HI3.
  11. 11. Case Study 3: LIs for 3G Networks Using ALIS
  12. 12. Case Study 3: LIs for 3G Networks Using ALIS
  13. 13. Case Study 3: LIs for 3G Networks Using ALIS
  14. 14. Case Study 3: LIs for 3G Networks Using ALIS
  15. 15. Case Study 3: LIs for 3G Networks Using ALISALIS in 3G Networks Implementation of ALIS as a mediation platform in a UMTS and cdma2000 network shown in Figure 7.20 and Figure 7.21 Important are the call data, call content, and LI management paths leading from ALIS-D and ALIS-M to the appropriate network elements and functions.Conclusions The processes are delineated by architectures, such as specified by ETSI, 3GPP, and ANSI, that facilitate systematic implementations and provisioning of LI systems. The challenges to lawful interception remain, including the need to support a diversity of services, vendor technologies, wireless networking technologies, voice, and a multiplicity of high-speed data services.
  16. 16. Case Study 3: LIs for 3G Networks Using ALIS
  17. 17. Case Study 3: LIs for 3G Networks Using ALIS
  18. 18. Case Study 4: Lawful Interception for IP Networks Using ALISInterception of Internet traffic involves complications Target source and destination identities embedded on overall data flow Target and non-target data are mixed at numerous IP circuits and network elements Many parties involved in transporting data (access, transport, core) Current laws on how to handle Internet interception are not clear. Separation of applications and data from the flow are difficult There is a lack of standards implementation
  19. 19. Case Study 4: Lawful Interception for IP Networks Using ALISIP Interception Examples (Internet Access) Internet Access Target Identification : LEA must coordinate interception activities with the TSP, regarding IP addresses which assigned through DHCP (including AAA) and fixed IP addresses assigned to customers business (T1, xDSL, etc). Others identifiers (username, ethernet address, Dial-in calling number identity, etc) Collected Data (IRI) : Identity target, service and access, time of access success or denied, access location, etc. This data delivered to LEA through HI3 interfaces, but make sure LEA not become IP address spoofing Lawful Interception Configurations for Network Access (shown in Figure 7.24a to Figure 7.24d) : interception points implement internal interception by applying probes or networking interfaces to local networks,access loops, routers, gateways, AAA functions, and so forth
  20. 20. Case Study 4: Lawful Interception for IP Networks Using ALIS
  21. 21. Case Study 4: Lawful Interception for IP Networks Using ALIS
  22. 22. Case Study 4: Lawful Interception for IP Networks Using ALIS
  23. 23. Case Study 4: Lawful Interception for IP Networks Using ALIS
  24. 24. Case Study 4: Lawful Interception for IP Networks Using ALISIP Interception Examples (Email) Collected Data (IRI) : Server IP, Client IP, Server port, Client port, E- mail protocol ID, E-mail sender, E-mail recipient list, Total recipient count, Server octets sent, Client octets sent, Message ID, Status. Internal interception take place in the context of any e-mail server to identify targeted e-mail traffic and route the corresponding call data (CD) information to the mediation platform LEAs as well must deal with spam to ensure not receive modified header on the email, use reverse DNS lookup practices to authenticate the origination of an e-mail, and subscribe to the e-mail blacklists for spam prevention.
  25. 25. Case Study 4: Lawful Interception for IP Networks Using ALIS
  26. 26. Case Study 4: Lawful Interception for IP Networks Using ALISIP Interception Examples (VoIP) Call control events : answer and origination target, release and terminated attempt. Signaling events : Dialed digit extraction/DDE (captured extra digit after call connected), Direct signal reporting (signaling message), Network signal (activity network for provide signal), Subject Signal (signal initiate features) Feature use events : signaling associated with conference calling, call transfer, and other call feature Registration events : occur when the target provides address information to the VoIP network
  27. 27. Case Study 4: Lawful Interception for IP Networks Using ALIS
  28. 28. Case Study 4: Lawful Interception for IP Networks Using ALISALIS for IP ALIS Internet access (Figure 7.28) : data information is extracted from RADIUS server and access termination point (CMTS, DSLAM, or modem pool). An internal intercept function (IIF) in a router replicates call content to and from the target and sends this data to ALIS-D. ALIS mediation platform for e-mail (Figure 7.29) : Relevant e-mail header and other protocol information captured directly from the e- mail server as call data and routed to ALIS-D for reformatting and delivery to the LEA, while contents of e-mail messages routed to ALIS-D as call content. ALIS for VoIP Calling (Figure 7.30) : ALIS-M sets triggering events for relevant network equipment, including the call agent (gatekeeper, SIP server, gateway, etc.) and routers assigned to capture data flow. Call data information is extracted via internal interception and sent to ALIS- D for processing.
  29. 29. Case Study 4: Lawful Interception for IP Networks Using ALIS
  30. 30. Case Study 4: Lawful Interception for IP Networks Using ALIS
  31. 31. Case Study 4: Lawful Interception for IP Networks Using ALIS
  32. 32. Case Study 6: Monitoring and Logging ActivitiesFeatures of monitoring and logging for conducting LIs:● Site-usage analysis: provides an understanding of how visitors (target) interact with Web sites● Site-user analysis: particular messages to increase the likelihood that site visitors (targets) will be interested on web site information● Site-content analysis: analyzes the content and structure of Web sites that may help indirectly with recognizing usage patternsFeatures and Attributes of Monitoring and Logging Tools● Monitoring devices used at distributed locations● Monitors are passively measuring the traffic in the network segments● Data-capturing technique is also very important (location of probe, capturing schedule, location of logs)● Intelligent filtering during collection and data compression/compaction● Management of log files is very important (automatic log cycling, Visitors clustered)● Predefined reports (template) and scheduler report
  33. 33. Case Study 6: Monitoring and Logging ActivitiesIP Monitoring System (IMS) from GTEN AG● Data Collection and Filtering Subsystem : deployed in strategic field with DCFD as for target monitoring based on log-in identification.● Mass Storage Subsystem : file server acting as the mass storage which receive pre-filtered data from data collection and filter subsystem manually or automatic triggered.● Data Re-Creation and Analysis Subsystem : recorded data viewed by standard browser (example e-mail displayed in e-mail format and an Internet page displayed as Internet page) including WWW sessions, FTP transfer, Email, Chat, Radius, etc.Typical Monitoring Applications● Web-Site Monitoring : collect all traffic moving to and from a particular Web site, which done by wiretaps on Internet line and on Radius Server connection in order to correlate data recorded.● Target Monitoring : monitored target must have unique ID (fixed IP address or user ID in RADIUS server), which DCFD sniff the all the packet after retrieves assigned IP address from RADIUS.
  34. 34. Case Study 6: Monitoring and Logging Activities
  35. 35. Case Study 9: MC Case Examples from Siemens AGFixed Network — PSTN● Network Protocols : E1 to network switches and EDSS1 line protocol.● Network Switches : Any manufacturer switch comply to ETSI standard such as Siemens, Ericsson, Alcatel, and Nokia switches.● Interception and Recording Modes : can be setup as mono or stereo, and compression mode to save space● Types of Interception : conversation, call-related information, DTMF transmission, SMS, Fax, and modem● Interception Management Systems : Any IMS comply ETSI standard such as Siemens LIOS, Utimaco IMS, Ericsson IMS, and Alcatel IMSMobile Network — GSM● Feature highlights are identical with intercepting fixed networks.● Add-On Systems : location of the mobile cell is known through GIS
  36. 36. Case Study 9: MC Case Examples from Siemens AG
  37. 37. Case Study 9: MC Case Examples from Siemens AG
  38. 38. Case Study 9: MC Case Examples from Siemens AGMobile Networks — GPRS/UMTS● Network Protocols : E1 to network switches and EDSS1 line protocol.● Network Switches : Any manufacturer switch comply to ETSI standard● Interception Types : IP traffic on the packet-switch● Add-On Systems : based on current location information can indicate the direction of travel● Feature Highlights : IP traffic with the attributes read, view, navigate entire Web, e-mail, FTP, and chat sessions.Internet Monitoring● Data Collectors : data collectors to connect points on the Internet to intercept● Internet Applications : all IP traffic with decoding support for Web, Email (SMTP, POP3, Webmail), and Chat (IRC)● Internet Access Points : collectors to any IP source such as GPRS switches, ISP SPAN ports, Internet backbone links, orInternet core computers● Physical Interfaces : support many physical interfaces include Ethernet 100 Mbps, Ethernet 1000 Mbps, and OC3● Filtering : applied by the MC mediation device to collector, and filters IP data● Back-End Internet Applications : operator can replay visited Web sites and viewed Web pages by the target user● Interception Management Features : offered a single unified set of interception management features
  39. 39. Case Study 9: MC Case Examples from Siemens AG
  40. 40. Case Study 9: MC Case Examples from Siemens AG
  41. 41. ConclusionCase studies, in addition to the necessary level of awarenessregarding product features, can help provide an understandingof how to deal with practical solutions. This chapter hasaddressed nine different cases — with some overlaps — thatrepresent actual telecommunications services and products.These case studies, e.g., for wireless networks, packet dataapplications and VoIP, show that there are no technologicalbarriers to lawful interception activities
  42. 42. Thank you
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×