Intelligence Support Systems: Technologies for Lawful Intercepts

Intelligence Support Systems: Technologies for Lawful Intercepts

Pub. Date:
Taylor & Francis

Hardcover - Rent for

Select a Purchase Option (New Edition)
  • purchase options
    $53.18 $132.95 Save 60% Current price is $53.18, Original price is $132.95. You Save 60%.
  • purchase options


Intelligence Support Systems: Technologies for Lawful Intercepts

Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors.

This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.

Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems.

Product Details

ISBN-13: 9780849328558
Publisher: Taylor & Francis
Publication date: 07/28/2005
Edition description: New Edition
Pages: 488
Product dimensions: 6.40(w) x 9.30(h) x 1.30(d)

Table of Contents

Setting the Stage
Positioning Lawful Intercepts (LIs) and Surveillance
ISS Basics and Application Areas
The Position of ISS among Other Support and Security Systems
Basic Requirements for LIs
Electronic Surveillance Laws
Framework of LIs

Service Portfolios Overview
Basic Principles for Networking Technologies
Service Portfolios
Circuit-Switched Voice and VoIP
Internet-Related Technologies
Wireless Networks
Cable Networks

Legal and Technical Standards for Lawful Intercepts
Principal Functions of Interception
Surveillance Rules and Procedures in the United States
Surveillance Rules and Procedures in the European Community
Surveillance Rules and Procedures in Japan
CALEA Reference Model with the J-STD-025 Standard
European Telecommunications Standard Institute (ETSI)
Reference Model for the European Community .................................85

Intercept Access Points in Infrastructure Components
Blueprints and Guidelines for TSPs
Reference Model of the Infrastructure
Principles of Monitoring and Intercepts (Hardware and Software Probes)
Use of Signaling Systems for LIs
Resource Planning for LIs

Extended Functions for Lawful Intercepts
Principal Functions of LIs
Role of Mediation
Handover Interfaces (HIs)
Data Retention and Data Preservation Solutions
Document Management and Document-Related Technology (DRT)
Information Life-Cycle Management
Receiver Applications

Lawful Intercept Solution Architectures
Frameworks for LIs
Key Products and Players
Siemens AG Monitoring Center
Selection Criteria

Case Studies for ISS Solutions
Case Study 1: Wireline Voice Intercept and Surveillance
Solutions from Lucent Technologies
Case Study 2: Lawful Interception in CDMA Wireless IP
Networks from SS8 Networks
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 4: Lawful Interception for IP Networks Using ALIS
Case Study 5: Lawful Intercepts for Cable VoIP Networks from
SS8 Networks
Case Study 6: Monitoring and Logging Web Activities
Case Study 7: Lawful Interception of VoIP by NetCentrex and
Case Study 8: Lawful Interception for E-mail Server Providers
Case Study 9: MC Case Examples from Siemens AG

Operating Lawful Intercepts
Operational Requirements
Prerequisites of Lawful Interception in the
United States, Europe, and Japan
Executing LI Missions in the United States, Europe, and Japan
Functional Role Model
Administration and Management
Security Considerations
Human Resources

Costs and Reimbursement of Expenses for
Telecommunications Service Providers
Cost Components
Quantification of Costs and Reimbursement Strategies
Return on Investment (ROI)

Outsourcing Lawful Interception Functions
Forces Driving Outsourcing
The LEA Model
The ASP Model
The Service Bureau Model
Sourcing Governance
Who Are the Principal Players?

Summary and Trends

A Glossary
B Acronyms
C References

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews