Hoffmann / Terplan | Intelligence Support Systems | E-Book | sack.de
E-Book

E-Book, Englisch, 488 Seiten

Hoffmann / Terplan Intelligence Support Systems

Technologies for Lawful Intercepts
Erscheinungsjahr 2005
ISBN: 978-1-4200-3128-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Technologies for Lawful Intercepts

E-Book, Englisch, 488 Seiten

ISBN: 978-1-4200-3128-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors.

This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.

Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems.

Hoffmann / Terplan Intelligence Support Systems jetzt bestellen!

Zielgruppe


Service providers, network engineers, administrators of IT staff, privacy officers, hr professionals

Weitere Infos & Material


Setting the Stage
Positioning Lawful Intercepts (LIs) and Surveillance
ISS Basics and Application Areas
The Position of ISS among Other Support and Security Systems
Basic Requirements for LIs
Electronic Surveillance Laws
Framework of LIs
Challenges

Service Portfolios Overview
Basic Principles for Networking Technologies
Service Portfolios
Circuit-Switched Voice and VoIP
Internet-Related Technologies
Wireless Networks
Cable Networks
Summary

Legal and Technical Standards for Lawful Intercepts
Principal Functions of Interception
Surveillance Rules and Procedures in the United States
Surveillance Rules and Procedures in the European Community
Surveillance Rules and Procedures in Japan
CALEA Reference Model with the J-STD-025 Standard
European Telecommunications Standard Institute (ETSI)
Reference Model for the European Community.85
Summary

Intercept Access Points in Infrastructure Components
Blueprints and Guidelines for TSPs
Reference Model of the Infrastructure
Principles of Monitoring and Intercepts (Hardware and Software Probes)
Use of Signaling Systems for LIs
Resource Planning for LIs
Summary

Extended Functions for Lawful Intercepts
Principal Functions of LIs
Role of Mediation
Handover Interfaces (HIs)
Data Retention and Data Preservation Solutions
Document Management and Document-Related Technology (DRT)
Information Life-Cycle Management
Receiver Applications
Summary

Lawful Intercept Solution Architectures
Frameworks for LIs
Key Products and Players
Siemens AG Monitoring Center
Selection Criteria
Summary

Case Studies for ISS Solutions
Case Study 1: Wireline Voice Intercept and Surveillance
Solutions from Lucent Technologies
Case Study 2: Lawful Interception in CDMA Wireless IP
Networks from SS8 Networks
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 4: Lawful Interception for IP Networks Using ALIS
Case Study 5: Lawful Intercepts for Cable VoIP Networks from
SS8 Networks
Case Study 6: Monitoring and Logging Web Activities
Case Study 7: Lawful Interception of VoIP by NetCentrex and
GTEN AG
Case Study 8: Lawful Interception for E-mail Server Providers
by GTEN AG
Case Study 9: MC Case Examples from Siemens AG
Summary

Operating Lawful Intercepts
Operational Requirements
Prerequisites of Lawful Interception in the
United States, Europe, and Japan
Executing LI Missions in the United States, Europe, and Japan
Functional Role Model
Administration and Management
Security Considerations
Human Resources
Summary

Costs and Reimbursement of Expenses for
Telecommunications Service Providers
Cost Components
Quantification of Costs and Reimbursement Strategies
Return on Investment (ROI)
Summary

Outsourcing Lawful Interception Functions
Forces Driving Outsourcing
The LEA Model
The ASP Model
The Service Bureau Model
Sourcing Governance
Who Are the Principal Players?
Summary

Summary and Trends

Appendices
A Glossary
B Acronyms
C References



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.