dual usage strategy of lawful intercepti on sy stems

26
Septier Communication Ltd. Dual Usage Strategy of Lawful Interception Systems Elan Sharon Chief Sales, Marketing & Operations Officer [email protected] www.septier.com ISS Prague 2008

Upload: others

Post on 19-Oct-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Septier Communication Ltd.

Dual Usage Strategy of Lawful Interception Systems

Elan SharonChief Sales, Marketing & Operations Officer

[email protected]

www.septier.comISS Prague 2008

La#ful In*erce.*ion

The interception of telecommunications by Law Enforcement Agencies (LEA's) and intelligence services, in accordance with local law and after following due process and receiving proper authorization from competent authorities.

Abou* Se.*ier

Founded in 2000Privately ownedDevelops advanced Telecom and IP solutionsMore than 40 customers around the world

Technology & oem partnerships with:

Legisla*ion 6orces 7ommunica*ion Service :rovi;ers <7S:s= *o Ac*

Dozens of countries around the world have legislated lawful interception and intelligence gatheringCommunications services providers must comply with local laws and regulations in order to get and maintain their licenses

The ResultsHeavy investments are carried out by CSPs and LEAs

Systems procurement and installation

Systems maintenance

>conomical 7?allenges

Extract more security out of LI budgetsLEAs

Recuperate the cost of Lawful interceptionCSPs

Maintain LI systems in a high level of service and operations status

CSPs

LEAs

@?a* 7an Ae DoneC

Adopt a (dual usage. strategy whenever possible

Combine lawful interception with commercial systems! Share investments between LEAs & CSPs

Generate additional revenues for the CSPSave costs for the CSPWithout scarifying performance and securityWhile fully complying with local laws and regulations

Dual Dsage Sys*ems for 7ellular F.era*ors

Active systemsLawful interception Mediation & Positioning (LBS) systems

Passive systemsLawful interception Mediation & Positioning (LBS) systemsLawful interception Mediation & Anti FraudLawful interception Mediation & CDR generation and data retentionLawful interception Mediation & Network surveillanceLawful interception Mediation & Revenue assurance solutions

Arc?i*ec*ure

SLR Interception Server

SD

A X D 3 0 1

SD

PO W ERSTACK T M

BSC, RNC MSC / SWITCH

Tx

Rx

SD

ALARM01234567ROUTINGENGINE

AXI520

AXI520

SD

ALARM0 1 2 3 4 5 6 7

ROUTINGENGINE

AXI520

AXI 520

BTS, NODE-B

BTS

IPNetwork

SeptierProbe

n x E1/T1

IuBA, IuCS, IuPS

A-bis

MSC

:assive In*erce.*ion

MPS

Probe

LI MediationBSC, RNC

Probe

LEA 2

LEA n

LEA 1

CSP

CDRs

LBSAnti FraudNetwork Surveillance

2G, 3G

Dual Dsage Sys*ems for In*erne* Service :rovi;ers

Passive systemsLawful interception Mediation & Gray VoIP detection

Lawful interception Mediation & CDR generation and data retention (VoIP)

Lawful interception Mediation & Network surveillance

Se.*ier Tec?nology ! T?e Aasis for Dual Dsage sys*ems

Telecom Signaling (HW & SW)Passive (monitoring)

Active (influencing)

Real time Databases 5ten6s of thousands of insertions per second)

Real time Rule based engineVoice and IP Interception

With deep packet inspection

Se.*ier :ro;uc*s

Se.*ier Solu*ions

Lawful Interception & Intelligence gatheringActive mediationPassive interception Data retentionLocation tracking

Cellular location solutionsPassive Cell ID Active GMLC Assisted GPS

Fraud ManagementReal time & offline

Real Time CDR Generation Network Management & Surveillance

Link trace, Call trace, Counters, Statistics, Reports

Se.*ier LI :ro;uc*s

LI Explorer (Back end & Front end)TDM (GSM, UMTS, CDMA, PSTN)IP (Internet, VoIP)Active & Passive

LI Explorer (Mediation)LI Explorer CDM

Call data retention, mining & reportingLI Explorer (Front End only)

CDR generation for data retention

Ac*ive/:assive In*erce.*ion 6lo#

Ioice In*erce.*ion Resul*

7ellular :osi*ioning

Comprehensive cellular phones location infrastructureSupporting GSM, UMTS, CDMA and iDEN networks & standardsHybrid configurations of active, passive and assisted GPS

Active GMLCSupporting GSM timing advance (TA), UMTS RTT, CDAM delay

Passive and massive locationA, A-bis, IuCS, IuPS, IuB, IOS, NOIS

Assisted GPS (SUPL & IS-881)Mediation for LBS applications

Pelephone (CDMA & UMTS)

Cellcom (GSM & UMTS)

Increase ARPULaunch new services and applicationsComply with LI laws and regulations

Description Features

Case study Benefits

M:7L MML7 N :assive :robes

6rau; >O.lorer

Real time and offline anti fraud systemFor Telecom and NGN operatorsBased on CDRs generated by different sources such as passive probes and network elements

Real time alertingReal time preventionExtensive rule based engineCombating different fraud types

! MIRS (iDEN)Prevents internal fraudReturns investment in a short time

Description Features

Case study Benefits

6rau; >O.lorer TM P @orkflo#

Signaling Re*#ork Moni*oring

Signaling monitoring system based on passive probes installed at key locations in the networkProviding real time information and statisticsIntended for TDM and converged NGN networks

Link tracingCall tracingCountersStatisticsReporting

CYTA (GSM, UMTS, PSTN, NGN) Improves network performanceImproves network quality of serviceSimplifies problems resolutionImproves network utilization and efficiency

Description Features

Case study Benefits

!"#$"%&'()&*+,&-.-/%'&-0,1%$##("2%3

4,%-%"/-&556&("7&84&),+/+2+#&$"*+,'(/$+"9&-02:&(-&*(0#/-9&)%,*+,'("2%&("7&/,(2$";

<(0#/&

=+"$/+,$";4%,*+,'("2%&'+"$/+,$";

>,(2$";

SDR Menera*ors

Real-time CDRs generated by passive probesMain interfaces:

A, IuCS, ISUP, SIP, MGCP, MEGACO, IOS, NOIS, etc.

Passive generationIndependent source of dataConfigurable fieldsOracle DB

Pelephone (CDMA & UMTS)

MIRS (IDEN)

Can serve many applicationsRevenue assuranceFraud preventionBillingLI Data retention

Works with (Flat rate billing programs.

Description Features

Case study Benefits

7all Da*a Mining

History Retention DB

Summary

When budgets are tight the only way to maximize security per $ is a dual usage systemExisting products and solutions combine these capabilities todayThe strategy is successfully implemented in the field for years around the world

Thank You!