DG Lawful Intercept Solution Suite for ETSI version

  • Slides: 20
Download presentation
DG Lawful Intercept Solution Suite (for ETSI version) Product Marketing Decision Group Inc. 2014

DG Lawful Intercept Solution Suite (for ETSI version) Product Marketing Decision Group Inc. 2014

Agenda v Lawful Intercept Operation v DG LI Solution Suite § i. Mediator §

Agenda v Lawful Intercept Operation v DG LI Solution Suite § i. Mediator § § EDDM i. Monitor i. Media Gateway HTTPS Interceptor v Training Programs and Services v Reference (2013) v Conclusion 2

Lawful Interception v. Lawful Interception is the authorized operation of law enforcement authority taking

Lawful Interception v. Lawful Interception is the authorized operation of law enforcement authority taking on the telecom networks in the definite period for the purpose of crime investigation by the warrant order from court based on law v. There are 2 domains for LI deployment and operation based on ETSI standard: § Telecom service provider domain: target traffic intercept service with data access and delivery § Law enforcement authority domain: data collection and law enforcement management facility (LEMF) 3

LI Framework 4

LI Framework 4

ETSI Compliance Ø Ø Ø 5 ETSI ES 201 153 for Network Framework Definition,

ETSI Compliance Ø Ø Ø 5 ETSI ES 201 153 for Network Framework Definition, ETSI ES 201 671 for Handover Definition, ETSI TR 101 973 for Generic LI Network Requirement, ETSI TS 101 331 for Requirement of LEA, ETSI TS 101 671 for Handover Definition, ETSI TS 102 232 -1 for Handover of IP Delivery, ETSI TS 102 232 -2 for Handover of e. Mail Services, ETSI TS 102 232 -3 for Handover of Internet Access, ETSI TS 102 232 -4 for Handover of Layer 2 Services, ETSI TS 102 232 -5 for Handover of IP Multimedia Services. 3 GPP TS 33. 107 for Handover Definition of Mobile Network 3 GPP TS 33. 108 for Handover of IP Delivery on Mobile Network

DG LI Solutions v i. Mediator – for lawful interception operation as mediation platform

DG LI Solutions v i. Mediator – for lawful interception operation as mediation platform v i. Monitor – for warrant administration process to TSP network center and monitoring system in LEA Monitoring Center v EDDM – for lawful interception operation as content reconstruction v i. Media Gateway – for lawful interception operation on circuit switch v HTTPS-Interceptor – 2 types of HTTPS Interception Solution for LAN (forward proxy) and Telecom networks – ED 2 S (transparency proxy) 6

i. Mediator v Works for data intercept based on warrant order and data delivery

i. Mediator v Works for data intercept based on warrant order and data delivery to LEA v Provides Web Service calls for customer warrant management v Decision Group provides customized service for new LI module interface in order to meet customer requirement 7 v The network interface (X) of i. Mediator to ISP network devices supports the below LI module interfaces– § § § Alcatel Lucent Juniper Ericsson Cisco …etc

i. Monitor-EDDM v All data will be input and processed based on Case ID

i. Monitor-EDDM v All data will be input and processed based on Case ID from i. Monitor system v FTP server and client services launched v Data will be decoded, correlated and reconstructed based on protocol type 8 v Lawful Enforcement Management Utility • Data Scoping • Full Text Search • Primary Link Analysis v Functions Provided �System Parameter Configuration and Tuning �Case Management �User Authentication �Backup and Archive Utilities �Statistics of Lawful Interception Operation �Upgrade and Update Task

i. Monitor v Major function of i. Monitor is to send the authorized information

i. Monitor v Major function of i. Monitor is to send the authorized information to i. Mediator fulfillment of lawful interception operation v Upon receiving IRI and CC data from i. Mediator, it will take action to correlate both data based on case ID v i. Monitor will send correlated data to EDDM for content reconstruction and data lookup 9 v DG i. Monitor system is a prototype platform for client to customize based on state act or regulation and internal LEA procedure v Decision Group also provides customized service to develop it for customer requirement

i. Media Gateway For Regular Lawful Interception For Live Call Lawful Interception v As

i. Media Gateway For Regular Lawful Interception For Live Call Lawful Interception v As X 3 or HI 3 interface for reception of Vo. IP stream or SS 7/ISUP v Convert Vo. IP stream into voice file (wav format) v Correlate SIP data with HI 2 data by i. Monitor v As X 3 or HI 3 interface for either Vo. IP stream or SS 7/ISUP signaling stream v Directly deliver to LEA Center for live call monitoring under i. Monitor v Output can be delivered by SS 7/ISUP stream or SIP/RTP to LEA v There are still 3 -5 seconds voice delay due to processing 10

HTTPS Interception v HTTPS interception will be well performed by Decision Group ED 2

HTTPS Interception v HTTPS interception will be well performed by Decision Group ED 2 S Proxy System v ED 2 S Proxy system will work by transparency way with edge router or PDN for HTTPS interception v Features of System § ED 2 S must rely on mediation device for target provision § ED 2 S, as a HTTPS proxy, is able to handle certificate(s) of single online HTTPS services § ED 2 S can intercept HTTPS-based mobile APP services 11

Deployment Scheme/Fixed Network Warrant Order Intercepted Data Review Returned HTTPS Intercept Command HTTPS Broker

Deployment Scheme/Fixed Network Warrant Order Intercepted Data Review Returned HTTPS Intercept Command HTTPS Broker 12 *Process specified by sequence number

LI Network Scheme – Mobile Networks LEA Monitoring Center Inp officer Mobile Operator arr

LI Network Scheme – Mobile Networks LEA Monitoring Center Inp officer Mobile Operator arr ant o ① ⑬ rde r i. Monitor ④ ⑤ Da X 1 ta ② Data Retention Management System Warrant Order Intercepted Data Review Returned HTTPS Intercept Command *Process specified by sequence number ③ X 2 ⑨ ⑥ ⑦ R 3 HI Data Archiving 2& sis aly ⑭ HI An EDDM Target 1 PDN-GW ④ ⑫ Data Decoding & Reconstruction 1 HI Ch re eck Investigator cords out ⑮ ④ GSN/SGW ut w Target 2 Target HTTPS Traffic ⑧ X 3 ED 2 S ⑩ ⑦ ⑪ ⑦ R Decoded HTTPS ⑩ Metadata Traffic i. Mediator R – intercept request Internet

LI Network Scheme – CS Networks Telecom Operator Telephony Center For Lawful Interception on

LI Network Scheme – CS Networks Telecom Operator Telephony Center For Lawful Interception on Vo. IP, SS 7/ISUP Signaling in 3 G, IMS and TDM networks Mediation Device LEA Monitor Center HI 1 ant arr w ut Inp er ord out k c e Ch rds o e r c HI 2 i. Monitor SBC HI 2 Investigator Da ta Controller An sis aly TP X 3/R P /ISU SS 7 i. Media Gateway Data Retention Management System 14 HI 1 SS 7 X 3/R TP /ISU P IGW X 1

Advantages of DG LI Suite v Full Spectrum of Product Portfolio from Mediation Device

Advantages of DG LI Suite v Full Spectrum of Product Portfolio from Mediation Device to LEMF v For LI on both Fixed and Mobile Networks v Compliance with ETSI and 3 GPP Standards v Getting Target IRI and CC data from Telecom and Internet Service Providers v Decoding 140+ protocols as well as 40 mobile protocols v Handling HTTPS intercept and decoding v Data retention capability for long term tracking and reporting v Easy to deploy and manage with high security Flexible Interactive, Real-time Analysis, Adaptive Solution 15

Lawful Interception Training Introduction to Lawful Interception Topic Includes In order to keep up

Lawful Interception Training Introduction to Lawful Interception Topic Includes In order to keep up with fastchanging lawful interception technology on digital networks, we deliver the most updated content of LI framework, global standards, Decision Group LI solution suite and deployment methodology for LEA staffs, SI engineers, project managers and technical consultants. Ø Framework of Lawful Intercept Ø ETSI and CALEA standard Ø Deployment in different telecom networks Ø Decision Group Lawful Intercept Solution Suite Ø Data Analysis and Evidence Admissibility Ø Case Study

Associated LI Training Programs Network Packet Forensic Analysis Training Cyber Crime Investigation Training This

Associated LI Training Programs Network Packet Forensic Analysis Training Cyber Crime Investigation Training This 3 day course utilizes the knowledge of computer security concepts together with switched network topologies and gives students hands on practical exposure to critical knowledge base essential for network forensic investigation and analysis In this 5 day course, several experienced speakers from National Taiwan Central Police University and Taiwan CIB will deliver the nature of cyber crime, investigation skills and the legal procedure on cyber criminal, digital data analysis, and participants can learn the lesson of real cases from experienced investigators and experts in panel discussion session. 17

What We Provide v Solid Consulting and Delivery Services: v Extensive Training Programs: §

What We Provide v Solid Consulting and Delivery Services: v Extensive Training Programs: § Clear objectives § Train-the-trainer § Appropriate surveillance § Law enforcement systems officials and prosecutors § Vulnerability assessment § Administrators § Deployment plan v Future Development § Legal procedure Plan: § Data analysis/text mining § Technology update and upgrade § Technical skill shift § Integration with backend warrant and lawful interception data analysis system

Conclusion v Lawful Interception is fast-changing operation for both Telco and LEA because of

Conclusion v Lawful Interception is fast-changing operation for both Telco and LEA because of emerging all IP telecom networks deployed. v Decision Group has lot of Self-developing turnkey Solutions, Technologies, and Product Plan for requirement in current lawful interception demand. v Fully meeting customer requirement and expectation is the top priority for Decision Group talented team v Good references and globalized services in different countries 20

URL: http: //www. edecision 4 u. com Email: decision@decision. com. tw Q&A 21

URL: http: //www. edecision 4 u. com Email: decision@decision. com. tw Q&A 21