Page 433 - Handbook of Modern Telecommunications
P. 433

3-224                   CRC Handbook of Modern Telecommunications, Second Edition

              Real-time, active mediation for lawful intercept requires the following points of consideration:

              •   Lawful intercept is a regulatory mandate, not a profit generator: the right active mediation deploy-
                 ment can provide a solution for many of the regulators within a software component that is used
                 for other profitable purposes.
              •   Mediation is already in the network: Most likely, the mediation solution is already communicat-
                 ing with all the network nodes as part of its existing business.
              •   Restricted use group access: The mediation solution should have a security subsystem to provide a
                 secure method for delivering access to only those users who are authorized to view the rule base.
              •   Extensible rules base: Intercept rules and target data sets (cell number, IP address, username)
                 should be able to be easily added to the system.
              •   Dynamic deployment rules: Rules deployment should be dynamic, eliminating the need to take
                 the system offline to update datasets.
              New technologies and new telecommunications service providers will become subject to lawful inter-
            cept regulations. One of the latest FCC rulings in the United States has decided that communications
            services offered over broadband pipes, including VoIP, are subject to CALEA requirements to comply with
            LEA requests for IRI and content surveillance. The tentative rules also would cover managed communica-
            tions services offered over broadband connections, including managed instant message or video services.
            Nonmanaged peer-to-peer services, including consumer-grade instant messaging service and noncom-
            mercial VoIP services, likely would not be subject to CALEA regulations under the proposed order.
              New applications for dynamic surveillance rules, correlations between intelligence sources and the
            use of external databases will help to improve targeting and identifying criminals and terrorists.
              Future-proof lawful intercept strategies must consider the following attributes:

              •   Operates seamlessly in PSTN, IP, next-generation, converged, and hybrid networks
              •   Offers maximum flexibility for defining rules for multiple data sources:
                 •   Enhances capabilities to dynamically search through live data
                 •   Handles location attributes
                 •   Recognizes multiple identification points for the trace
              •   Guarantees powerful correlation
                 •   Collects data from multiple sources
                 •   Combines and correlates data
              •   Integrates with new data sources and feeds additional downstream systems
              •   Enables cost-effective implementation leveraging a revenue-generating platform
              •   Uses a state-of-the-art technology, starting with a core platform
              •   Allows authorized operators to actively manage warrants
              •   Coordinates secure delivery functions between the carrier’s network and LEAs
              •   Indirectly provisions core network element for level 1 or level 2 surveillance
              •   Utilizes secure Web services framework
              •   Provides secured tunnels for transmitting CDC and CCC to LEAs
              In most democratic countries, the lawfulness of surveillance has been constantly supervised by human
            rights and privacy organizations. As a result, the number of illegal interceptions could be reduced to a
            reasonable minimum. True anonymity while using telecommunications products and services remains
            very important. Politically engaged persons of oppressive regimes can pursue political activities without
            fear of revealing their identity. But the entertainment industry sees anonymity as an obstacle to protect-
            ing digital rights, tracking violations, and collecting due revenues. Furthermore, anonymity protects
            criminals and terrorists who violate the law.
              Optimal  compromises  are  needed  among  law  enforcement  agencies,  privacy  protectors,  invest-
            ments in surveillance technologies, and emerging telecommunications services on the basis of mutually
            trusted dialogue.
   428   429   430   431   432   433   434   435   436   437   438