ISBN-10:
0849328551
ISBN-13:
9780849328558
Pub. Date:
07/28/2005
Publisher:
Taylor & Francis
Intelligence Support Systems: Technologies for Lawful Intercepts / Edition 1

Intelligence Support Systems: Technologies for Lawful Intercepts / Edition 1

by Paul Hoffmann, Kornel Terplan

Hardcover

Current price is , Original price is $140.0. You

Temporarily Out of Stock Online

Please check back later for updated availability.

Item is available through our marketplace sellers.

Product Details

ISBN-13: 9780849328558
Publisher: Taylor & Francis
Publication date: 07/28/2005
Edition description: New Edition
Pages: 488
Product dimensions: 6.12(w) x 9.25(h) x 1.30(d)

Table of Contents

Setting the Stage
Positioning Lawful Intercepts (LIs) and Surveillance
ISS Basics and Application Areas
The Position of ISS among Other Support and Security Systems
Basic Requirements for LIs
Electronic Surveillance Laws
Framework of LIs
Challenges

Service Portfolios Overview
Basic Principles for Networking Technologies
Service Portfolios
Circuit-Switched Voice and VoIP
Internet-Related Technologies
Wireless Networks
Cable Networks
Summary

Legal and Technical Standards for Lawful Intercepts
Principal Functions of Interception
Surveillance Rules and Procedures in the United States
Surveillance Rules and Procedures in the European Community
Surveillance Rules and Procedures in Japan
CALEA Reference Model with the J-STD-025 Standard
European Telecommunications Standard Institute (ETSI)
Reference Model for the European Community .................................85
Summary

Intercept Access Points in Infrastructure Components
Blueprints and Guidelines for TSPs
Reference Model of the Infrastructure
Principles of Monitoring and Intercepts (Hardware and Software Probes)
Use of Signaling Systems for LIs
Resource Planning for LIs
Summary

Extended Functions for Lawful Intercepts
Principal Functions of LIs
Role of Mediation
Handover Interfaces (HIs)
Data Retention and Data Preservation Solutions
Document Management and Document-Related Technology (DRT)
Information Life-Cycle Management
Receiver Applications
Summary

Lawful Intercept Solution Architectures
Frameworks for LIs
Key Products and Players
Siemens AG Monitoring Center
Selection Criteria
Summary

Case Studies for ISS Solutions
Case Study 1: Wireline Voice Intercept and Surveillance
Solutions from Lucent Technologies
Case Study 2: Lawful Interception in CDMA Wireless IP
Networks from SS8 Networks
Case Study 3: LIs for 3G Networks Using ALIS
Case Study 4: Lawful Interception for IP Networks Using ALIS
Case Study 5: Lawful Intercepts for Cable VoIP Networks from
SS8 Networks
Case Study 6: Monitoring and Logging Web Activities
Case Study 7: Lawful Interception of VoIP by NetCentrex and
GTEN AG
Case Study 8: Lawful Interception for E-mail Server Providers
by GTEN AG
Case Study 9: MC Case Examples from Siemens AG
Summary

Operating Lawful Intercepts
Operational Requirements
Prerequisites of Lawful Interception in the
United States, Europe, and Japan
Executing LI Missions in the United States, Europe, and Japan
Functional Role Model
Administration and Management
Security Considerations
Human Resources
Summary

Costs and Reimbursement of Expenses for
Telecommunications Service Providers
Cost Components
Quantification of Costs and Reimbursement Strategies
Return on Investment (ROI)
Summary

Outsourcing Lawful Interception Functions
Forces Driving Outsourcing
The LEA Model
The ASP Model
The Service Bureau Model
Sourcing Governance
Who Are the Principal Players?
Summary

Summary and Trends

Appendices
A Glossary
B Acronyms
C References

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

Intelligence Support Systems: Technologies for Lawful Intercepts 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
This book is really quite outstanding and unique. It describes the aspects by which federal agencies conduct legal intercepts of those involved in criminal activities, including terrorism, money laundering, drugs, kidnapping and other serious crimes. In some instances of capturing communications over the internet, non-targeted communications may unintentionally be collected as well. The authors describe how the system is extremely far reaching, highly technical, very complicated, well financed, international, and undetectable. Criminals who use today¿s communication systems including hard wire, wireless, cell, phone cameras, cordless, microwave, satellite, PDAs, email, instant messaging, VoIP, etc., are susceptible to having their discussions and messages intercepted. Even packet data traveling by various routes can be identified, captured and delivered in encrypted form to law enforcement monitoring centers in real time. Monitoring centers are high technology facilities equipped with their own security systems and are staffed with personnel from various federal agencies. At these facilities, they receive, review, analyze, store, and catalog data, to disrupt planning by terrorists, detect and thwart their attacks, track their movements, make arrests and plan liquidation measures. To make positive identification ¿voice banks,¿ i.e., samples of voice, are used to compare against newly captured voice communications. They also have geographical information systems to locate fixed addresses and mobile locations. Because telephone service providers (TSP) and internet service providers (ISP)tend to be very efficient performers in today¿s highly competitive, technical markets, they are very efficient in assisting federal agencies in installing equipment, and surmounting technical obstacles. With the help of ISPs, federal agencies monitor suspect¿s activities on the internet. They can track who visits web sites, how long they stay, what key words may have attracted them there, and which chat rooms they visit. If encrypted, the National Security Agency (NSA) can decrypt it. The US works in cooperation with at least 50 foreign countries and that figure is presumably growing. The US is helping Mexico establish a similar system to monitor communications of its illegal drug business. The authors inform us that intercept access points (IAP) can be installed virtually anywhere in a network and may be near to, or distant from the target, and are undetectable and invisible. There are challenges in intercepting some communications but the system is so sophisticated with proprietary hardware and software, so well-staffed, and so well-attended it adapts to changing technologies and absorbs and accommodates them to ensure its own existence and continuity, resulting in new and improved solutions. The book¿s topic begs the question: Should the average citizen be concerned about their privacy being violated by federal agencies? The answer is ¿No¿ Lawful intercepts cannot be conducted without a court order and a court order is not issued unless it can be shown the suspect is involved in significant criminal activity. Federal law enforcement agencies are like any other organization. They have budgets, limited time and resources and are required to produce results consequently there is no time, resources, or interest in the life of the average citizen.