Page 431 - Handbook of Modern Telecommunications
P. 431

3-222                   CRC Handbook of Modern Telecommunications, Second Edition

              Storage and archiving are critical parts of the process that is expected to be automated to a certain
            extent to prevent errors and to reduce labor expenses.
              A portable court playback solution replays original evidence for courtroom presentations.


            3.8.9  Summary and Trends
            Lawful interception will play an important role with telecommunications service providers. Honest
            support is expected regardless of whether lawful interception is helping to generate additional revenue
            or not. Combining lawful interception with powerful ISS is the optimal path for telecommunications
            service providers. In addition to providing the basic functionality for lawful interception, an ISS can
            support other important functions, such as real-time and usage-based billing, fraud avoidance, churn
            avoidance, providing government agencies with the necessary data, and real-time traffic control. Cost
            recovery is guaranteed somehow this way, assuming a certain level of reimbursement by governments.
              Critical success factors for lawful interception are:
              •   Process: the functional steps of lawful interception, including request for lawful interception, pro-
                 visioning resources, accessing, delivering and collection of data, maintaining data, and converting
                 data into intelligence by telecommunications service providers, by LEAs, and by outsourcers.
              •   Products: all existing and future applications supporting process steps, including active and pas-
                 sive hardware or software probes, built-in intercept access points, management software, in-band
                 or out-of-band data communication networks, receiver applications, forensics, evidence collec-
                 tion, and court replays.
              •   People: necessary skills and experiences of subject matter experts of telecommunications service
                 providers, LEAs, and outsourcers to support process steps and available lawful intercept products
                 and tools.
              Lawful intercept (LI) also referred to as wiretapping or communications interception, is the identifi-
            cation, isolation, delivery, and collection of communication sessions (voice, e-mail, packet data, etc.)
            for use by law enforcement. This critical law enforcement tool is used by many authorized government
            agencies to investigate criminal activities. Law enforcement agencies (LEAs), telecommunications ser-
            vice providers, and equipment manufacturers are continuously working together to develop products
            and define technical standards for lawful intercept in the quest to aid LEAs in their role of protecting
            the public.
              At this time, the operating principles may be summarized as follows:
              •   The technology of intercepting practically all telecommunications services is available, but the
                 price tag may be high to pursue interceptions in particular for SMS, MMS, VPNs, VoIP, and for
                 encrypted traffic.
              •   Existing laws are usually for telephone systems and they actually do not work with Internet-based
                 voice, data, and video technologies; there is still argument about the border line between informa-
                 tion and communications services.
              •   There are practically no laws, rules, or guidelines for data retention, which causes problems with
                 very large volumes of stored e-mails, intercepted voice communications, video teleconferences,
                 and other communications-related applications.
              •   There are very few examples of direct dialogue among LEAs, outsourcers, and telecommunica-
                 tions service providers addressing technical, economic, and privacy challenges.
              •   Telecommunications service providers are usually not yet deploying ISSs with the result of offer-
                 ing segmented applications around otherwise powerful mediation solutions.
              •   In particular, the hand-over between LEAs and TSPs is not supported by the latest technology
                 with the result that state-of-the-art security solutions cannot be fully implemented to protect
                 sensitive data and intelligence.
   426   427   428   429   430   431   432   433   434   435   436