Page 416 - Handbook of Modern Telecommunications
P. 416

Network Management and Administration                                     3-207

              •   Contents of computer long-term storage: LEAs can usually search and/or seize computers and
                 storage media. Even damaged devices may be searched. This falls into computer forensics. It is a
                 combination of science and art. LEAs today process software tools that search PCs, servers, and
                 networks for evidence, such as text files, images, and e-mails that can be used to ferret out crimi-
                 nals. Requests by LEAs can be triggered by noncompliance issues, such as violation of company
                 policies, circulation of inappropriate content, or misappropriation of information.
              •   Current billing and statistical records of communications, desirable in real time. This includes
                 “pen  register”  and/or  “trap  and  trace”  data,  usually  defined  under  IRI  (intercept-related
                 information).
              •   Delivery of content: This includes the collection of the full content of communications, which is offered
                 by telecommunications service providers as communication and not as an information service.

            3.8.5  Principal Functions of Interception

            The principal functions of accessing, delivering, and collecting data, which must be supported by all
            service providers, are summarized here. Identifying basic functions as early as possible will facilitate the
            allocation of functions to various standards.
            3.8.5.1  Functional Group: Accessing Data
            The following functions are important:
              •   Review technology to be intercepted
              •   Identify network elements, such as multiplexers, switches, routers, load balancers, and others
                 with built-in capturing features
              •   Check collaboration willingness of manufacturers of network elements
              •   Identify Incept Access Points (IAPs) for both IRI and content
              •   Provision IAPs for both IRI and content
              •   Provision data channels to central processing (or monitoring) facility
              •   Select and train human resources
            3.8.5.2  Functional Group: Delivering Data
            The following functions are important:

              •   Evaluate processing needs
              •   Evaluate mediation solutions
              •   Decide about build or buy processing applications
              •   Select applications in case of buy decision
              •   Quantify storage requirements
              •   Define interfaces to data sources
              •   Define interfaces to hand-over points
              •   Maintain data, information, and intelligence
              •   Provision data channels from/to LEAs
              •   Secure data channels from/to LEAs
              •   Select and train human resources
            3.8.5.3  Functional Group: Collecting Data
            The following functions are important:

              •   Define process to authenticate requests by LEAs
              •   Select correct information and/or intelligence to be transferred to LEAs
              •   Select and train human resources
   411   412   413   414   415   416   417   418   419   420   421