Dual Usage Strategy of Lawful Interception Systems



Similar documents
Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

The challenge of IP Data Retention to Traditional Approach.

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

utimaco a member of the Sophos Group

Mobile Wireless Overview

Mobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks

EAGLE EYE IP TAP. 1. Introduction

Acme Packet Palladion Communications Operations Monitor

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS

Agilent Network Monitoring Content Intercept Manager

Ethernet/IP Test Solutions

GL Communications Inc.

Session Border Controller

NCAS National Caller ID Authentication System

SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA

Network Monitoring Solutions for VoIP Network

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Session Border Controllers in Enterprise

Introducing STAR-GATE Enhancements for Packet Cable Networks

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Communication Services in the Cloud: Challenges and Solutions Oracle Communications Session Monitor

Network Overview. Background Traditional PSTN Equipment CHAPTER

Automatic Monitoring & Detection System (AMDS) for Grey Traffic

An Oracle White Paper July Oracle Enterprise Operations Monitor: Real-Time Voice over Internet Protocol Monitoring and Troubleshooting

BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

Outsourcing and network sharing: key considerations to solve the backhaul challenge

RNM Reply Network Manager

Understanding Mobile Wireless Backhaul

Mobile network evolution A tutorial presentation

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

PDF vytvořeno zkušební verzí pdffactory UMTS

Use of MPLS in Mobile Backhaul Networks

Palladion Enterprise SOLUTION BRIEF. Overview

Utimaco Safeware: Capturing a First-to-Market Opportunity with a Telecom Solution

Mobile Voice Off-Load

9-1-1 Services for Interconnected VoIP and Local Exchange Carriers

An Oracle White Paper July Palladion Enterprise: Real-Time Voice over Internet Protocol Monitoring and Troubleshooting

ORACLE COMMUNICATIONS OPERATIONS MONITOR

Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies

Why sample when you can monitor all network traffic inexpensively?

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

Your new VoIP Network is working great Right? How to Know. April 2012 WHITE PAPER

ADVOSS SIP APPLICATION SERVERS

VoIP Business Model Case Studies

Cellular Backhaul: Extending the Edge of the Network November 2008

LTE Overview October 6, 2011

UNDERSTANDING CORE TELECOM SECURITY

GSM or GPRS. JaeWon Kang, Badri Nath. Dataman Lab Department of Computer Science Rutgers University

SMG Integrated Media Gateway. Remove Unclearness, Disconnection and Complexity

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper

Gateways and Their Roles

NTEGRA WHOLESALE SUITE Multnational Team

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Application Note. Introduction to Monitoring Use Cases Using Dialogic DSI SS7HD Network Interface Boards

CA NetQoS Unified Communications Monitor

IP PBX using SIP. Voice over Internet Protocol

VoLTE and the Service Delivery Engine

OneSight Voice Quality Assurance

Status of 3G deployments and interoperability with 4G. Mike Hobby CDMA Data Marketing

Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge

Skype Connect for TDM and IP-PBXs

How To Use Big Data And Analytics For Csp (China Mobile)

Delivery of Voice and Text Messages over LTE

Our Solutions. Flexibility. Project Management

Big Data in Telecom value chain. Presented by: Gurjot S Sandhu Director Sales Xalted Information Systems Pvt. Ltd.

Deploying In-Building Wireless Solutions

Oracle Communications Performance Intelligence Center

Hosted PBX Platform-asa-Service. Offering

Real Time Intercept from Packet Networks, Challenges and Solutions. Presented by Keith Driver

Deploying Media Probes in Evolving VoIP Networks

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

1 Introduction Services and Applications for HSPA Organization of the Book 6 References 7

Lawful Interception in German VoIP Networks

Packetized Telephony Networks

Cellular Network Planning and Optimization Part XI: HSDPA. Jyri Hämäläinen, Communications and Networking Department, TKK, 25.1.

A generic monitoring architecture for assuring the QoS in Mobile TV platforms

BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

ClearGain Tower Mounted Amplifiers A Deployment Guide for Wireless Carriers

2005 Ameritec Corporation

Testing IVR Systems White Paper

Posterity PSX-S system is designed in the leading edge IMS technology. It provides

Impact of IP on Mobile Communications THIS IS CISCO ON THE MOVE

Voice over IP Probe! for Network Operators and! Internet Service Providers

Challenges in Future Wireless Broadband Access Networks

NGN Interconnection Standards & Protocols

Understanding Mobile Terminated Call Failures

Business mopera IP Centrex Service System

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

SOUL S DIGITAL VOICE 30

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Copyright 2013, Oracle and/or its affiliates. All rights reserved. Interconnect 2013

IP Voice Reseller. Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity.

How to Use Call Accounting in a VoIP Environment January 2009

Index. Common Packet Channel (CPCH) 25 Compression 265, , 288 header compression 284

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Total cost of charging and billing: CapEx and OpEx

Transcription:

Septier Communication Ltd. Dual Usage Strategy of Lawful Interception Systems Elan Sharon Chief Sales, Marketing & Operations Officer elan@septier.com www.septier.com ISS Prague 2008

La#ful In*erce.*ion The interception of telecommunications by Law Enforcement Agencies (LEA's) and intelligence services, in accordance with local law and after following due process and receiving proper authorization from competent authorities.

Abou* Se.*ier Founded in 2000 Privately owned Develops advanced Telecom and IP solutions More than 40 customers around the world Technology & oem partnerships with:

Legisla*ion 6orces 7ommunica*ion Service :rovi;ers <7S:s= *o Ac* Dozens of countries around the world have legislated lawful interception and intelligence gathering Communications services providers must comply with local laws and regulations in order to get and maintain their licenses The Results Heavy investments are carried out by CSPs and LEAs Systems procurement and installation Systems maintenance

>conomical 7?allenges Extract more security out of LI budgets LEAs Recuperate the cost of Lawful interception CSPs Maintain LI systems in a high level of service and operations status CSPs LEAs

@?a* 7an Ae DoneC Adopt a (dual usage. strategy whenever possible Combine lawful interception with commercial systems! Share investments between LEAs & CSPs Generate additional revenues for the CSP Save costs for the CSP Without scarifying performance and security While fully complying with local laws and regulations

Dual Dsage Sys*ems for 7ellular F.era*ors Active systems Lawful interception Mediation & Positioning (LBS) systems Passive systems Lawful interception Mediation & Positioning (LBS) systems Lawful interception Mediation & Anti Fraud Lawful interception Mediation & CDR generation and data retention Lawful interception Mediation & Network surveillance Lawful interception Mediation & Revenue assurance solutions

AXI520 AXI520 AXI520 0 1 2 3 4 5 6 7 ROUTINGENGINE AXI 520 SD SD Arc?i*ec*ure SD 01234567 ALARM ROUTINGENGINE BTS A-bis PO W E RSTAC K T M Tx Rx n x E1/T1 A X D 3 0 1 SD IuB A, IuCS, IuPS ALARM BTS, NODE-B BSC, RNC MSC / SWITCH Septier Probe IP Network SLR Interception Server

:assive In*erce.*ion LEA n LEA 2 LEA 1 CSP CDRs 2G, 3G Probe BSC, RNC Probe MPS LI Mediation LBS Anti Fraud Network Surveillance MSC

Dual Dsage Sys*ems for In*erne* Service :rovi;ers Passive systems Lawful interception Mediation & Gray VoIP detection Lawful interception Mediation & CDR generation and data retention (VoIP) Lawful interception Mediation & Network surveillance

Se.*ier Tec?nology! T?e Aasis for Dual Dsage sys*ems Telecom Signaling (HW & SW) Passive (monitoring) Active (influencing) Real time Databases 5ten6s of thousands of insertions per second) Real time Rule based engine Voice and IP Interception With deep packet inspection

Se.*ier :ro;uc*s

Se.*ier Solu*ions Lawful Interception & Intelligence gathering Active mediation Passive interception Data retention Location tracking Cellular location solutions Passive Cell ID Active GMLC Assisted GPS Fraud Management Real time & offline Real Time CDR Generation Network Management & Surveillance Link trace, Call trace, Counters, Statistics, Reports

Se.*ier LI :ro;uc*s LI Explorer (Back end & Front end) TDM (GSM, UMTS, CDMA, PSTN) IP (Internet, VoIP) Active & Passive LI Explorer (Mediation) LI Explorer CDM Call data retention, mining & reporting LI Explorer (Front End only) CDR generation for data retention

Ac*ive/:assive In*erce.*ion 6lo#

Ioice In*erce.*ion Resul*

7ellular :osi*ioning Comprehensive cellular phones location infrastructure Supporting GSM, UMTS, CDMA and iden networks & standards Hybrid configurations of active, passive and assisted GPS Pelephone (CDMA & UMTS) Description Active GMLC Supporting GSM timing advance (TA), UMTS RTT, CDAM delay Passive and massive location A, A-bis, IuCS, IuPS, IuB, IOS, NOIS Assisted GPS (SUPL & IS-881) Mediation for LBS applications Increase ARPU Features Launch new services and applications Comply with LI laws and regulations Cellcom (GSM & UMTS) Case study Benefits

M:7L MML7 N :assive :robes

6rau; >O.lorer Real time and offline anti fraud system For Telecom and NGN operators Based on CDRs generated by different sources such as passive probes and network elements Real time alerting Real time prevention Extensive rule based engine Combating different fraud types Description Features! MIRS (iden) Prevents internal fraud Returns investment in a short time Case study Benefits

6rau; >O.lorer TM P @orkflo#

Signaling Re*#ork Moni*oring Signaling monitoring system based on passive probes installed at key locations in the network Providing real time information and statistics Intended for TDM and converged NGN networks Link tracing Call tracing Counters Statistics Reporting Description CYTA (GSM, UMTS, PSTN, NGN) Improves network performance Improves network quality of service Simplifies problems resolution Improves network utilization and efficiency Features Case study Benefits

!"#$"%&'()&*+,&-.-/%'& -0,1%$##("2%3 4,%-%"/-&556&("7&84& ),+/+2+#&$"*+,'(/$+"9& -02:&(-&*(0#/-9& )%,*+,'("2%&("7&/,(2$"; <(0#/& 4%,*+,'("2%& '+"$/+,$"; =+"$/+,$"; >,(2$";

SDR Menera*ors Real-time CDRs generated by passive probes Main interfaces: A, IuCS, ISUP, SIP, MGCP, MEGACO, IOS, NOIS, etc. Passive generation Independent source of data Configurable fields Oracle DB Pelephone (CDMA & UMTS) MIRS (IDEN) Description Features Can serve many applications Revenue assurance Fraud prevention Billing LI Data retention Works with (Flat rate billing programs. Case study Benefits

7all Da*a Mining History Retention DB

Summary When budgets are tight the only way to maximize security per $ is a dual usage system Existing products and solutions combine these capabilities today The strategy is successfully implemented in the field for years around the world

Thank You!