Intelligence Support Systems: Technologies for Lawful Intercepts
Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they b...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1420 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1420 |
---|---|
record_format |
dspace |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors.
This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components.
Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems. |
format |
Book |
author |
Terplan, Kornel Hoffmann, Paul |
spellingShingle |
Terplan, Kornel Hoffmann, Paul Intelligence Support Systems: Technologies for Lawful Intercepts |
author_facet |
Terplan, Kornel Hoffmann, Paul |
author_sort |
Terplan, Kornel |
title |
Intelligence Support Systems: Technologies for Lawful Intercepts |
title_short |
Intelligence Support Systems: Technologies for Lawful Intercepts |
title_full |
Intelligence Support Systems: Technologies for Lawful Intercepts |
title_fullStr |
Intelligence Support Systems: Technologies for Lawful Intercepts |
title_full_unstemmed |
Intelligence Support Systems: Technologies for Lawful Intercepts |
title_sort |
intelligence support systems: technologies for lawful intercepts |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1420 |
_version_ |
1757660671382650880 |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-14202009-12-02T07:17:04Z Intelligence Support Systems: Technologies for Lawful Intercepts Terplan, Kornel Hoffmann, Paul Telecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests. Intelligence Support Systems: Technologies for Lawful Intercepts addresses the information and intelligence needs of service providers, law enforcement agencies, representatives of governments and international standards bodies, and product and service vendors. This volume offers solutions for many technological challenges, explaining how to provide networking equipment and probes for lawful intercepts, and detailing methods for reducing the performance impacts on network equipment that result from intercepts. It explores how to access, collect, and deliver information in real-time and how to improve mediation efficiency while serving multiple functions. The book also covers data retention and preservation issues and examines how to standardize intercept technologies for various service portfolios and infrastructure components. Focusing on intelligence support systems (ISS), the text demonstrates how the information that an ISS gathers can be applied toward security, and illustrates how an ISS interfaces with billing, ordering, provisioning, authenticating, and law enforcement systems. Setting the Stage Positioning Lawful Intercepts (LIs) and Surveillance ISS Basics and Application Areas The Position of ISS among Other Support and Security Systems Basic Requirements for LIs Electronic Surveillance Laws Framework of LIs Challenges Service Portfolios Overview Basic Principles for Networking Technologies Service Portfolios Circuit-Switched Voice and VoIP Internet-Related Technologies Wireless Networks Cable Networks Summary Legal and Technical Standards for Lawful Intercepts Principal Functions of Interception Surveillance Rules and Procedures in the United States Surveillance Rules and Procedures in the European Community Surveillance Rules and Procedures in Japan CALEA Reference Model with the J-STD-025 Standard European Telecommunications Standard Institute (ETSI) Reference Model for the European Community .................................85 Summary Intercept Access Points in Infrastructure Components Blueprints and Guidelines for TSPs Reference Model of the Infrastructure Principles of Monitoring and Intercepts (Hardware and Software Probes) Use of Signaling Systems for LIs Resource Planning for LIs Summary Extended Functions for Lawful Intercepts Principal Functions of LIs Role of Mediation Handover Interfaces (HIs) Data Retention and Data Preservation Solutions Document Management and Document-Related Technology (DRT) Information Life-Cycle Management Receiver Applications Summary Lawful Intercept Solution Architectures Frameworks for LIs Key Products and Players Siemens AG Monitoring Center Selection Criteria Summary Case Studies for ISS Solutions Case Study 1: Wireline Voice Intercept and Surveillance Solutions from Lucent Technologies Case Study 2: Lawful Interception in CDMA Wireless IP Networks from SS8 Networks Case Study 3: LIs for 3G Networks Using ALIS Case Study 4: Lawful Interception for IP Networks Using ALIS Case Study 5: Lawful Intercepts for Cable VoIP Networks from SS8 Networks Case Study 6: Monitoring and Logging Web Activities Case Study 7: Lawful Interception of VoIP by NetCentrex and GTEN AG Case Study 8: Lawful Interception for E-mail Server Providers by GTEN AG Case Study 9: MC Case Examples from Siemens AG Summary Operating Lawful Intercepts Operational Requirements Prerequisites of Lawful Interception in the United States, Europe, and Japan Executing LI Missions in the United States, Europe, and Japan Functional Role Model Administration and Management Security Considerations Human Resources Summary Costs and Reimbursement of Expenses for Telecommunications Service Providers Cost Components Quantification of Costs and Reimbursement Strategies Return on Investment (ROI) Summary Outsourcing Lawful Interception Functions Forces Driving Outsourcing The LEA Model The ASP Model The Service Bureau Model Sourcing Governance Who Are the Principal Players? Summary Summary and Trends Appendices A Glossary B Acronyms C References 2009-12-02T07:17:04Z 2009-12-02T07:17:04Z 2005 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1420 en application/rar CRC Press |