SlideShare a Scribd company logo
1 of 8
Lawful Interception System
• Lawful Interception is a legal requirement which telecommunication service providers,
throughout the world, have to support for national security.
• It is mandatory for the Telecom Service Providers to have an interception system in their
network which can help them comply with these Government Regulations.
• The service providers have to make sure that the interception system covers all the
technologies, both present and future.
• The lawful interception framework is directed by the international standards
along with the local laws and regulation laid down by local governing bodies.
• With advent of communication technologies and its ever-increasing reach, its use
by criminals to plan and execute the crimes has also augmented.
• To tackle these crimes Law Enforcement Agencies (LEAs) need to have access to
their communications which can enable them to nip bud at an early stage.
Lawful Interception (LI) implementation is required by the European Union International
User Requirements 19951 which allows for LI to prevent crime, including fraud and
terrorism. The ETSI specifications are now in widespread use in many countries that require
the Lawful Interception of telecommunications.
iNterceptor: One Stop LI Solution
• PertSol iNterceptor is a unified Lawful Interception System for network operators
and service providers which is fully
• compliant to the international standards and has a proven track record. It is a
complete solution which is capable of
• handling both circuit switch and packet switch traffic from both legacy as well as
latest telecom technologies including
• PSTN, 2G, 3G, 4G, LTE, NGN, IMS etc.
Pertsol’s Lawful Interception Chart
Pertsol works closely with the leading telecom operator, MNOs, network equipment
providers and regulators to evolve its products as er the technology and market trends
Why Pertsol
• Pertsol’s LI is a proven and mature solution that continues to benefit from
functional
• enhancement and feature evolution. It has been deployed in varied networks,
enabling
• TSPs / Law Enforcement Agencies to benefit.

More Related Content

Similar to Lawful Interception System-Pertsol

smart-city
smart-citysmart-city
smart-city
nflatau
 
An examination of legal regulation and environmental
An examination of legal regulation and environmentalAn examination of legal regulation and environmental
An examination of legal regulation and environmental
Alexander Decker
 
An examination of legal regulation and environmental
An examination of legal regulation and environmentalAn examination of legal regulation and environmental
An examination of legal regulation and environmental
Alexander Decker
 
Emergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptxEmergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptx
nitin_009
 

Similar to Lawful Interception System-Pertsol (20)

EMTC will be commercialized in china - C&T RF Antennas Inc
EMTC will be commercialized in china - C&T RF Antennas IncEMTC will be commercialized in china - C&T RF Antennas Inc
EMTC will be commercialized in china - C&T RF Antennas Inc
 
IoT Final Project
IoT Final ProjectIoT Final Project
IoT Final Project
 
TTG's OSS Tools
TTG's OSS ToolsTTG's OSS Tools
TTG's OSS Tools
 
Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing Initiative
 
smart-city
smart-citysmart-city
smart-city
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
Legal and Technical Standards for Lawful Intercepts
Legal and Technical Standards for Lawful InterceptsLegal and Technical Standards for Lawful Intercepts
Legal and Technical Standards for Lawful Intercepts
 
FTTx Summit Europe 2011
FTTx Summit Europe 2011 FTTx Summit Europe 2011
FTTx Summit Europe 2011
 
Ttg leaflet
Ttg leafletTtg leaflet
Ttg leaflet
 
Understanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATEUnderstanding Australia's anti encryption law | EAGLEGATE
Understanding Australia's anti encryption law | EAGLEGATE
 
IEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTSIEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTS
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuong
 
IT unit 1
IT unit 1IT unit 1
IT unit 1
 
Deloitte - Incentive regulation to promote investments in new networks
Deloitte - Incentive regulation to promote investments in new networksDeloitte - Incentive regulation to promote investments in new networks
Deloitte - Incentive regulation to promote investments in new networks
 
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
 
An examination of legal regulation and environmental
An examination of legal regulation and environmentalAn examination of legal regulation and environmental
An examination of legal regulation and environmental
 
An examination of legal regulation and environmental
An examination of legal regulation and environmentalAn examination of legal regulation and environmental
An examination of legal regulation and environmental
 
Ntp (2)
Ntp (2)Ntp (2)
Ntp (2)
 
Remote Monitoring 2020 Vison
Remote Monitoring 2020 VisonRemote Monitoring 2020 Vison
Remote Monitoring 2020 Vison
 
Emergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptxEmergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptx
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Lawful Interception System-Pertsol

  • 2. • Lawful Interception is a legal requirement which telecommunication service providers, throughout the world, have to support for national security. • It is mandatory for the Telecom Service Providers to have an interception system in their network which can help them comply with these Government Regulations. • The service providers have to make sure that the interception system covers all the technologies, both present and future.
  • 3. • The lawful interception framework is directed by the international standards along with the local laws and regulation laid down by local governing bodies. • With advent of communication technologies and its ever-increasing reach, its use by criminals to plan and execute the crimes has also augmented. • To tackle these crimes Law Enforcement Agencies (LEAs) need to have access to their communications which can enable them to nip bud at an early stage.
  • 4. Lawful Interception (LI) implementation is required by the European Union International User Requirements 19951 which allows for LI to prevent crime, including fraud and terrorism. The ETSI specifications are now in widespread use in many countries that require the Lawful Interception of telecommunications.
  • 5. iNterceptor: One Stop LI Solution • PertSol iNterceptor is a unified Lawful Interception System for network operators and service providers which is fully • compliant to the international standards and has a proven track record. It is a complete solution which is capable of • handling both circuit switch and packet switch traffic from both legacy as well as latest telecom technologies including • PSTN, 2G, 3G, 4G, LTE, NGN, IMS etc.
  • 7. Pertsol works closely with the leading telecom operator, MNOs, network equipment providers and regulators to evolve its products as er the technology and market trends
  • 8. Why Pertsol • Pertsol’s LI is a proven and mature solution that continues to benefit from functional • enhancement and feature evolution. It has been deployed in varied networks, enabling • TSPs / Law Enforcement Agencies to benefit.