Você está na página 1de 16

Passive surveillance in support of LI

Andr Scholtz a.scholtz@vastech.co.za

VASTech
! Created 1999 ! Development and system contractor house in Passive Surveillance ! Core focus: Zebra Passive Surveillance System ! Operational systems in number of countries

Legal interception
How to identify targets and prevent incidents ?!

Incident
Target identification

Warrant (order)
Interception for legal purposes Legal processes

Understanding passive surveillance demands ! ! ! ! ! 40 000 channels plus in high density Petabytes of storage Covert and passive interception Multiple agencies IP, TDM; satellite, international switching centers, mobile, submarine landing stations

!Conventional systems not suited

What ifsys'emisavailable'.a'
! Provides LI targets while supporting intelligence community ! Provides unique intelligence proposition (go back in history) ! Requires low vendor support dependence ! Is flexible to adjust to changes in threat, technology and communications, operational conditions ! Dense, scalable and distributable ! Benefit naturally from technological advantages '.roug.Moore5sla6

The ideal solution


Changing communications environment
(Satellite, landline, mobile; circuit and packet switched; different protocols)

Suitable active/passive gateways


(E1/T1, E3/DS3, STM-1/-4, IP)

Off-the-shelf Processing and Storage


(Networked architecture; distributed implementation; content capturing - records and stores everything; content enrichment 7 speech analysis, etc)

Integration API Industry leading applications (Intelligence mining, extraction)

Zebra

24 U: 4000 channels

Zebra Architecture
Remote Capture Unit 1
Fax Demod Server Modem Demod Server Temp File Storage

Master Data Centre

Zebra Gateway

Channel Processor Server NAS Head Server

Utility Server

Utility Server Database Server

Database Storage (CDR)

File Storage

NAS Head Servers

Switching Centres

Compression Server Application +API Server

Database Server
Firewall

Remote Capture Unit 2


Zebra Gateway
Fax Demod Server Modem Demod Server Temp File Storage

Database Storage (CDR)

Archiving Server

Application +API Server Firewall

Channel Processor Server NAS Head Server

Utility Server Database Server

Database Storage (CDR)

Compression Server

Satellite Systems

`
Application +API Server Firewall

Administrator

User Workstations

Key characteristics
! Record everything that it is connected to
7 No switches 7 no previous target knowledge required 7 High intelligence value 7 analyze and listen to the past

! Software centric, aimed at integration


7 Fax, data and satellite DCME demodulation integrated as software 7 API to integrate to customer applications and analysis tools

! 8ommerciallyavailable:off-the-s.elf;.ar<6are
7 Low vendor dependence 7 =enefi'fromMoore5sla6

Key characteristics
! Highly scalable and distributable
7 50 000 channels+ with unified view 7 Add more servers into Capture Unit 7 Add more Capture units

! High density
7 500 stereo E1s per 42 U rack 7 64 stereo E1s in 1U interception on remote sites 7 small footprint!

! Groups and permission based security


7 Tagging and workflow

! Advanced CIC mapping

Record all and filter


Old approach
Capture and store No content, lost intelligence New targets

Traffic

Switch CRI Analysis

New approach
Intermediate Storage Long term Storage

Capture all Traffic

Filter

CRI
Analysis New targets

Filtering and permissions


Interception and processing

IRI Database Storage Call Content Storage

Hot monitoring Group filter Operator filter and permissions

Storage flexibility - example


All intercepts in 64 kbps stereo for 5 days

All voice compressed 8 kbps stereo 360 days

All fax and data uncompressed for further 30 days

Fax and data compressed for remainder of 365 days

All IRI for 2 years

All known target content for additional year online archive

Exporting and migration

Storage flexibility - example

Content enrichment and intelligence extraction


! OCR and text search ! Speaker identification and speech tools ! Customer applications

Conclusion
Passive surveillance is complementary to LI
! Provides a much larger pool of information ! Helps identify targets and prevent incidents

Systems do exist that provide large scale passive surveillance capabilities while:
! Providing unique intelligence value ! Protect investment against changes in technology ! Low vendor hardware dependence

Você também pode gostar