Page 411 - Handbook of Modern Telecommunications
P. 411
3-202 CRC Handbook of Modern Telecommunications, Second Edition
Service portfolio Lawful
management intercepts
Business/Operational Needs
Customer and Service Level Information Infrastructure
partner relationship ISS protection
management Subscriber Level Information
Surveillance/Security Needs
Billing for usage Fraud
and value detection
ISS Intelligence Support System
FIGu RE 3.8.1 Vision for Intelligence Support Systems.
broadband), on any information, and on any scale. The ISS-based process should provide comprehen-
sive information on a real-time basis providing proactive intelligence.
An ISS provides, in addition to surveillance, general business information on networks for differ-
ent purposes:
• Service usage information
• Definition and deployment of value-based services
• Subscriber-level information
• Information on network abuse or infrastructure attacks (security)
• Fraud detection
• Layer 4 to 7 information for more accurate value- and/or usage-based billing
• Carrier-grade tier 1 network coverage for any network type (mobile, broadband, backbone)
• Customer and partner relationship management
The vision for ISS is shown in Figure 3.8.1. ISS is the core surrounded by various layers, such as:
• Subscriber-level information (names, addresses, reach numbers)
• Service-level information (metrics, compliance, service portfolios)
• Business and operational needs (usage- and value-based billing, relation management)
• Surveillance and security needs (infrastructure protection, fraud detection)
Proactive intelligence requires that nationwide, even global networks be constructed in such a manner
that all communications can be monitored on a grand scale to identify potential targets with summary
intelligence while respecting privacy laws. Once these targets have been identified, further monitoring
can be done and intelligence can be obtained as lawful authorization is received. An ISS that provides
this level of information needs to capture all key summary information in a manner that is lawful and
protects the rights of individuals. For instance, an ISS may provide “capture of everyone” that visits a
particular suspect Web site but without capturing the individuals’ names. The ISS may then take this
information and see if any of the IP addresses visiting the Web site have also been communicating via
e-mail or chatting with another known target. If so, a legal authorization may then be obtained to look
at the individual in more detail.
Government law enforcement agencies have developed the ability to deal with one-dimensional com-
munication on a limited scale. But what is now needed is the ability to deal with multidimensional com-
munication on a global scale if countries are to prevent terrorist attacks and other criminal acts. This
can be achieved today with Intelligence Support Systems.