Page 416 - Handbook of Modern Telecommunications
P. 416
Network Management and Administration 3-207
• Contents of computer long-term storage: LEAs can usually search and/or seize computers and
storage media. Even damaged devices may be searched. This falls into computer forensics. It is a
combination of science and art. LEAs today process software tools that search PCs, servers, and
networks for evidence, such as text files, images, and e-mails that can be used to ferret out crimi-
nals. Requests by LEAs can be triggered by noncompliance issues, such as violation of company
policies, circulation of inappropriate content, or misappropriation of information.
• Current billing and statistical records of communications, desirable in real time. This includes
“pen register” and/or “trap and trace” data, usually defined under IRI (intercept-related
information).
• Delivery of content: This includes the collection of the full content of communications, which is offered
by telecommunications service providers as communication and not as an information service.
3.8.5 Principal Functions of Interception
The principal functions of accessing, delivering, and collecting data, which must be supported by all
service providers, are summarized here. Identifying basic functions as early as possible will facilitate the
allocation of functions to various standards.
3.8.5.1 Functional Group: Accessing Data
The following functions are important:
• Review technology to be intercepted
• Identify network elements, such as multiplexers, switches, routers, load balancers, and others
with built-in capturing features
• Check collaboration willingness of manufacturers of network elements
• Identify Incept Access Points (IAPs) for both IRI and content
• Provision IAPs for both IRI and content
• Provision data channels to central processing (or monitoring) facility
• Select and train human resources
3.8.5.2 Functional Group: Delivering Data
The following functions are important:
• Evaluate processing needs
• Evaluate mediation solutions
• Decide about build or buy processing applications
• Select applications in case of buy decision
• Quantify storage requirements
• Define interfaces to data sources
• Define interfaces to hand-over points
• Maintain data, information, and intelligence
• Provision data channels from/to LEAs
• Secure data channels from/to LEAs
• Select and train human resources
3.8.5.3 Functional Group: Collecting Data
The following functions are important:
• Define process to authenticate requests by LEAs
• Select correct information and/or intelligence to be transferred to LEAs
• Select and train human resources