Page 433 - Handbook of Modern Telecommunications
P. 433
3-224 CRC Handbook of Modern Telecommunications, Second Edition
Real-time, active mediation for lawful intercept requires the following points of consideration:
• Lawful intercept is a regulatory mandate, not a profit generator: the right active mediation deploy-
ment can provide a solution for many of the regulators within a software component that is used
for other profitable purposes.
• Mediation is already in the network: Most likely, the mediation solution is already communicat-
ing with all the network nodes as part of its existing business.
• Restricted use group access: The mediation solution should have a security subsystem to provide a
secure method for delivering access to only those users who are authorized to view the rule base.
• Extensible rules base: Intercept rules and target data sets (cell number, IP address, username)
should be able to be easily added to the system.
• Dynamic deployment rules: Rules deployment should be dynamic, eliminating the need to take
the system offline to update datasets.
New technologies and new telecommunications service providers will become subject to lawful inter-
cept regulations. One of the latest FCC rulings in the United States has decided that communications
services offered over broadband pipes, including VoIP, are subject to CALEA requirements to comply with
LEA requests for IRI and content surveillance. The tentative rules also would cover managed communica-
tions services offered over broadband connections, including managed instant message or video services.
Nonmanaged peer-to-peer services, including consumer-grade instant messaging service and noncom-
mercial VoIP services, likely would not be subject to CALEA regulations under the proposed order.
New applications for dynamic surveillance rules, correlations between intelligence sources and the
use of external databases will help to improve targeting and identifying criminals and terrorists.
Future-proof lawful intercept strategies must consider the following attributes:
• Operates seamlessly in PSTN, IP, next-generation, converged, and hybrid networks
• Offers maximum flexibility for defining rules for multiple data sources:
• Enhances capabilities to dynamically search through live data
• Handles location attributes
• Recognizes multiple identification points for the trace
• Guarantees powerful correlation
• Collects data from multiple sources
• Combines and correlates data
• Integrates with new data sources and feeds additional downstream systems
• Enables cost-effective implementation leveraging a revenue-generating platform
• Uses a state-of-the-art technology, starting with a core platform
• Allows authorized operators to actively manage warrants
• Coordinates secure delivery functions between the carrier’s network and LEAs
• Indirectly provisions core network element for level 1 or level 2 surveillance
• Utilizes secure Web services framework
• Provides secured tunnels for transmitting CDC and CCC to LEAs
In most democratic countries, the lawfulness of surveillance has been constantly supervised by human
rights and privacy organizations. As a result, the number of illegal interceptions could be reduced to a
reasonable minimum. True anonymity while using telecommunications products and services remains
very important. Politically engaged persons of oppressive regimes can pursue political activities without
fear of revealing their identity. But the entertainment industry sees anonymity as an obstacle to protect-
ing digital rights, tracking violations, and collecting due revenues. Furthermore, anonymity protects
criminals and terrorists who violate the law.
Optimal compromises are needed among law enforcement agencies, privacy protectors, invest-
ments in surveillance technologies, and emerging telecommunications services on the basis of mutually
trusted dialogue.