dual usage strategy of lawful intercepti on sy stems
TRANSCRIPT
Septier Communication Ltd.
Dual Usage Strategy of Lawful Interception Systems
Elan SharonChief Sales, Marketing & Operations Officer
www.septier.comISS Prague 2008
La#ful In*erce.*ion
The interception of telecommunications by Law Enforcement Agencies (LEA's) and intelligence services, in accordance with local law and after following due process and receiving proper authorization from competent authorities.
Abou* Se.*ier
Founded in 2000Privately ownedDevelops advanced Telecom and IP solutionsMore than 40 customers around the world
Technology & oem partnerships with:
Legisla*ion 6orces 7ommunica*ion Service :rovi;ers <7S:s= *o Ac*
Dozens of countries around the world have legislated lawful interception and intelligence gatheringCommunications services providers must comply with local laws and regulations in order to get and maintain their licenses
The ResultsHeavy investments are carried out by CSPs and LEAs
Systems procurement and installation
Systems maintenance
>conomical 7?allenges
Extract more security out of LI budgetsLEAs
Recuperate the cost of Lawful interceptionCSPs
Maintain LI systems in a high level of service and operations status
CSPs
LEAs
@?a* 7an Ae DoneC
Adopt a (dual usage. strategy whenever possible
Combine lawful interception with commercial systems! Share investments between LEAs & CSPs
Generate additional revenues for the CSPSave costs for the CSPWithout scarifying performance and securityWhile fully complying with local laws and regulations
Dual Dsage Sys*ems for 7ellular F.era*ors
Active systemsLawful interception Mediation & Positioning (LBS) systems
Passive systemsLawful interception Mediation & Positioning (LBS) systemsLawful interception Mediation & Anti FraudLawful interception Mediation & CDR generation and data retentionLawful interception Mediation & Network surveillanceLawful interception Mediation & Revenue assurance solutions
Arc?i*ec*ure
SLR Interception Server
SD
A X D 3 0 1
SD
PO W ERSTACK T M
BSC, RNC MSC / SWITCH
Tx
Rx
SD
ALARM01234567ROUTINGENGINE
AXI520
AXI520
SD
ALARM0 1 2 3 4 5 6 7
ROUTINGENGINE
AXI520
AXI 520
BTS, NODE-B
BTS
IPNetwork
SeptierProbe
n x E1/T1
IuBA, IuCS, IuPS
A-bis
MSC
:assive In*erce.*ion
MPS
Probe
LI MediationBSC, RNC
Probe
LEA 2
LEA n
LEA 1
CSP
CDRs
LBSAnti FraudNetwork Surveillance
2G, 3G
Dual Dsage Sys*ems for In*erne* Service :rovi;ers
Passive systemsLawful interception Mediation & Gray VoIP detection
Lawful interception Mediation & CDR generation and data retention (VoIP)
Lawful interception Mediation & Network surveillance
Se.*ier Tec?nology ! T?e Aasis for Dual Dsage sys*ems
Telecom Signaling (HW & SW)Passive (monitoring)
Active (influencing)
Real time Databases 5ten6s of thousands of insertions per second)
Real time Rule based engineVoice and IP Interception
With deep packet inspection
Se.*ier Solu*ions
Lawful Interception & Intelligence gatheringActive mediationPassive interception Data retentionLocation tracking
Cellular location solutionsPassive Cell ID Active GMLC Assisted GPS
Fraud ManagementReal time & offline
Real Time CDR Generation Network Management & Surveillance
Link trace, Call trace, Counters, Statistics, Reports
Se.*ier LI :ro;uc*s
LI Explorer (Back end & Front end)TDM (GSM, UMTS, CDMA, PSTN)IP (Internet, VoIP)Active & Passive
LI Explorer (Mediation)LI Explorer CDM
Call data retention, mining & reportingLI Explorer (Front End only)
CDR generation for data retention
7ellular :osi*ioning
Comprehensive cellular phones location infrastructureSupporting GSM, UMTS, CDMA and iDEN networks & standardsHybrid configurations of active, passive and assisted GPS
Active GMLCSupporting GSM timing advance (TA), UMTS RTT, CDAM delay
Passive and massive locationA, A-bis, IuCS, IuPS, IuB, IOS, NOIS
Assisted GPS (SUPL & IS-881)Mediation for LBS applications
Pelephone (CDMA & UMTS)
Cellcom (GSM & UMTS)
Increase ARPULaunch new services and applicationsComply with LI laws and regulations
Description Features
Case study Benefits
6rau; >O.lorer
Real time and offline anti fraud systemFor Telecom and NGN operatorsBased on CDRs generated by different sources such as passive probes and network elements
Real time alertingReal time preventionExtensive rule based engineCombating different fraud types
! MIRS (iDEN)Prevents internal fraudReturns investment in a short time
Description Features
Case study Benefits
Signaling Re*#ork Moni*oring
Signaling monitoring system based on passive probes installed at key locations in the networkProviding real time information and statisticsIntended for TDM and converged NGN networks
Link tracingCall tracingCountersStatisticsReporting
CYTA (GSM, UMTS, PSTN, NGN) Improves network performanceImproves network quality of serviceSimplifies problems resolutionImproves network utilization and efficiency
Description Features
Case study Benefits
!"#$"%&'()&*+,&-.-/%'&-0,1%$##("2%3
4,%-%"/-&556&("7&84&),+/+2+#&$"*+,'(/$+"9&-02:&(-&*(0#/-9&)%,*+,'("2%&("7&/,(2$";
<(0#/&
=+"$/+,$";4%,*+,'("2%&'+"$/+,$";
>,(2$";
SDR Menera*ors
Real-time CDRs generated by passive probesMain interfaces:
A, IuCS, ISUP, SIP, MGCP, MEGACO, IOS, NOIS, etc.
Passive generationIndependent source of dataConfigurable fieldsOracle DB
Pelephone (CDMA & UMTS)
MIRS (IDEN)
Can serve many applicationsRevenue assuranceFraud preventionBillingLI Data retention
Works with (Flat rate billing programs.
Description Features
Case study Benefits
Summary
When budgets are tight the only way to maximize security per $ is a dual usage systemExisting products and solutions combine these capabilities todayThe strategy is successfully implemented in the field for years around the world