Você está na página 1de 26

Septier Communication Ltd.

Dual Usage Strategy of Lawful Interception Systems


Elan Sharon Chief Sales, Marketing & Operations Officer elan@septier.com www.septier.com
ISS Prague 2008

La#ful In*erce.*ion

The interception of telecommunications by Law Enforcement Agencies (LEA's) and intelligence services, in accordance with local law and after following due process and receiving proper authorization from competent authorities.

Abou* Se.*ier
Founded in 2000 Privately owned Develops advanced Telecom and IP solutions More than 40 customers around the world

Technology & oem partnerships with:

Legisla*ion 6orces 7ommunica*ion Service :rovi;ers <7S:s= *o Ac*


Dozens of countries around the world have legislated lawful interception and intelligence gathering Communications services providers must comply with local laws and regulations in order to get and maintain their licenses

The Results
Heavy investments are carried out by CSPs and LEAs Systems procurement and installation Systems maintenance

>conomical 7?allenges
Extract more security out of LI budgets LEAs Recuperate the cost of Lawful interception CSPs Maintain LI systems in a high level of service and operations status CSPs LEAs

@?a* 7an Ae DoneC


Adopta(dualusage.strategywhenever possible Combine lawful interception with commercial systems
! Share investments between LEAs & CSPs

Generate additional revenues for the CSP Save costs for the CSP Without scarifying performance and security While fully complying with local laws and regulations

Dual Dsage Sys*ems for 7ellular F.era*ors


Active systems Lawful interception Mediation & Positioning (LBS) systems Passive systems Lawful interception Mediation & Positioning (LBS) systems Lawful interception Mediation & Anti Fraud Lawful interception Mediation & CDR generation and data retention Lawful interception Mediation & Network surveillance Lawful interception Mediation & Revenue assurance solutions

Arc?i*ec*ure
SD AXI520

S D

A-bis

PO W E RST AC K

TM

n x E1/T1
Tx Rx

SD

A X D 30 1

0 1 2 34 5 6 7 R O U T I N G E N G I E A L R M BTS
AXI 520

IuB
AXI 520

S D

A, IuCS, IuPS

A L R M BTS, NODE-B
AX I 520

6 7 R O U T IN G E N G IN E

BSC, RNC

MSC / SWITCH

Septier Probe

IP Network

SLR Interception Server

:assive In*erce.*ion
LEA n LEA 2 LEA 1 CSP

CDRs
Probe

MPS

LBS

2G, 3G
LI Mediation
BSC, RNC
Probe

Anti Fraud
Network Surveillance

MSC

Dual Dsage Sys*ems for In*erne* Service :rovi;ers


Passive systems Lawful interception Mediation & Gray VoIP detection Lawful interception Mediation & CDR generation and data retention (VoIP) Lawful interception Mediation & Network surveillance

Se.*ier Tec?nology ! T?e Aasis for Dual Dsage sys*ems Telecom Signaling (HW & SW) Passive (monitoring) Active (influencing) Real time Databases 5ten6softhousandsofinsertions
per second)

Real time Rule based engine Voice and IP Interception With deep packet inspection

Se.*ier :ro;uc*s

Se.*ier Solu*ions
Lawful Interception & Intelligence gathering Active mediation Passive interception Data retention Location tracking Cellular location solutions Passive Cell ID Active GMLC Assisted GPS Fraud Management Real time & offline Real Time CDR Generation Network Management & Surveillance Link trace, Call trace, Counters, Statistics, Reports

Se.*ier LI :ro;uc*s
LI Explorer (Back end & Front end) TDM (GSM, UMTS, CDMA, PSTN) IP (Internet, VoIP) Active & Passive LI Explorer (Mediation) LI Explorer CDM Call data retention, mining & reporting LI Explorer (Front End only) CDR generation for data retention

Ac*ive/:assive In*erce.*ion 6lo#

Ioice In*erce.*ion Resul*

7ellular :osi*ioning
Comprehensive cellular phones location infrastructure Supporting GSM, UMTS, CDMA and iDEN networks & standards Hybrid configurations of active, passive and assisted GPS
Active GMLC Supporting GSM timing advance (TA), UMTS RTT, CDAM delay Passive and massive location A, A-bis, IuCS, IuPS, IuB, IOS, NOIS Assisted GPS (SUPL & IS-881) Mediation for LBS applications
Features

Description

Pelephone (CDMA & UMTS)

Increase ARPU Launch new services and applications Comply with LI laws and regulations

Cellcom (GSM & UMTS)

Case study

Benefits

M:7L MML7 N :assive :robes

6rau; >O.lorer
Real time and offline anti fraud system For Telecom and NGN operators Based on CDRs generated by different sources such as passive probes and network elements
Real time alerting Real time prevention Extensive rule based engine Combating different fraud types

Description

Features

MIRS (iDEN)

Prevents internal fraud Returns investment in a short time

Case study

Benefits

6rau; >O.lorer

TM

P @orkflo#

Signaling Re*#ork Moni*oring


Signaling monitoring system based on passive probes installed at key locations in the network Providing real time information and statistics Intended for TDM and converged NGN networks
Description

Link tracing Call tracing Counters Statistics Reporting

Features

CYTA (GSM, UMTS, PSTN, NGN)

Improves network performance Improves network quality of service Simplifies problems resolution Improves network utilization and efficiency

Case study

Benefits

!"#$"%&'()&*+,&-.-/%'& -0,1%$##("2%3

4,%-%"/-&556&("7&84& ),+/+2+#&$"*+,'(/$+"9& -02:&(-&*(0#/-9& )%,*+,'("2%&("7&/,(2$";


<(0#/&

=+"$/+,$";
4%,*+,'("2%& '+"$/+,$";

>,(2$";

SDR Menera*ors
Real-time CDRs generated by passive probes Main interfaces: A, IuCS, ISUP, SIP, MGCP, MEGACO, IOS, NOIS, etc.
Passive generation Independent source of data Configurable fields Oracle DB

Description

Features

Pelephone (CDMA & UMTS)

MIRS (IDEN)

Can serve many applications Revenue assurance Fraud prevention Billing LI Data retention Workswith(Flatratebillingprograms.
Benefits

Case study

7all Da*a Mining

History Retention DB

Summary
When budgets are tight the only way to maximize security per $ is a dual usage system Existing products and solutions combine these capabilities today The strategy is successfully implemented in the field for years around the world

Thank You!

Você também pode gostar