Monitoring obligations. DataBridge : Fulfil CSP requirements for communcations monitoring

Similar documents
MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.

Alcatel-Lucent 1357 ULIS

Utimaco OX Summit

Lawful Intercept Overview

Streamlining Lawful Intercept for WiMAX Networks

Integrating Communications Compliance into the Next Generation 4G LTE Network

Trends in Lawful Interception and Its Applications in National Security

Electronic evidence: Worth it!s weight in gold?

We manage network capacity

Utimaco LIMS. Lawful Interception of Telecommunication Services

ETSI LI Standards Overview

EAGLE EYE MC. 1. Introduction

Traffic Management Solution: Allot NetEnforcer and Juniper Networks Session and Resource Control (SRC) Platform

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government

4G: Convergence, Openness for Excellence and Opportunity Cisco Systems, Inc

ORACLE ENTERPRISE COMMUNICATIONS BROKER

Canada Life Cyber Security Statement 2018

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Utimaco LIMS TM. Techpaper. Lawful Interception with Umbrella Systems

WHITE PAPER. The Growing Impact of Social Networking Trends on Lawful Interception

COURSE DESCRIPTION IP IN MODERN NETWORKS. Format: Classroom. Duration: 2 Days

Alcatel-Lucent 1675 LambdaUnite MultiService Switch

Electrical Solutions in action

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1

Overview. Business value

2nd ETSI Security Workshop Future Security. Lawful Interception standardisation, Retained Data

DATA RETENTION SUITE CARRIER-GRADE TELECOM DATA RETENTION

ALCATEL Edge Services Router

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

CAPABILITY STATEMENT

Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet

ETSI Plugtests 2007 Test Cases Description 06-SEPT-2007 Release 4

AAA Authentication: New Use Cases

5G outlook for Asia Pacific: market impact and standardisation programmes

Solutions Overview. Nortel Networks. Preside. Next-Generation Management Solutions

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Portable Network & Service Analyzer Solutions

Mission Critical MPLS in Utilities

EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA

Managed Services Rely on us to manage your business services

POMONA EUROPE ADVISORS LIMITED

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Financial Services Solutions

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

Six steps to proactive cyber security protection

TRANSFORM YOUR NETWORK

Oracle Communications Diameter Signaling Router

Continuous protection to reduce risk and maintain production availability

Gerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

E-Seminar. Voice over IP. Internet Technical Solution Seminar

Private data networks

Oracle Communications Operations Monitor

Oracle Communications WebRTC Session Controller

IMS Adoption Fueled by the Open IMS Core Project and MySQL

FUJITSU Backup as a Service Rapid Recovery Appliance

Better Operational Agility. For more flexible, resilient and secure communications. Vodafone Power to you

Privacy Impact Assessment

Juniper Care Plus Advanced Services Credits

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats

Accelerate Your Enterprise Private Cloud Initiative

Seven Criteria for a Sound Investment in WAN Optimization

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

A revolutionary visual security and analytics solution

VOXOX. A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX. a VOXOX ebook VOXOX, Inc A Comprehensive Guide

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE

RANtoCoreTM. Delivering the most realistic test environments

Brochure. Dialogic BorderNet Session Border Controller Solutions

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Contents. Enterprise Solution 04. Why Samsung? 05 WLAN 06. Voice Solution 08. Mobile Unified Communications 09. Enterprise Security 10

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

HBW LAW LTD T/A HESELTINE BRAY & WELSH

DIMETRA X CORE DATA SHEET DIMETRA X CORE

The importance of RAN to Core validation as networks evolve to support 5G

5 Best Practices for Transitioning from Legacy Voice to VoIP and UC&C

SCHOOL SUPPLIERS. What schools should be asking!

Gujarat Forensic Sciences University

ngenius Products in a GDPR Compliant Environment

COURSE DESCRIPTION LTE FOR COMMERCIAL PROFESSIONALS. Format: 4 x 2 Hour Modules. Duration: 1 Day (with 2-Day Option)

Securing intelligent networks: a guide for CISO and CIOs

Solution Highlights. Supports all major signaling protocols. Widely deployed multi-national SS7 solution. NEBS3 certified standard server platform

Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Samsung Wireless LAN Straightforward Guide

Cisco Hosted Unified Communications Services

Real-time Communications Security and SDN

Cyber Security Law --- Are you ready?

2. Who we collect information (data) from & why we collect it

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

COURSE DESCRIPTION VOICE OVER LTE (VOLTE) Format: Face to Face, Live on Web. Duration: 2 Days, 4 x 3 Hours

keeping executives safe

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

CYBER SOLUTIONS & THREAT INTELLIGENCE

Trust Harris for LTE. Critical Conditions Require Critical Response

IP network probe systems increasing role in managing the customer experience

Transcription:

Monitoring obligations DataBridge : Fulfil CSP requirements for communcations monitoring

DataBridge Flexible communications monitoring 2

Meeting your obligations flexibly As terrorists and organised criminals take advantage of cyber space more and more to facilitate their real world crimes, the data transported by Communications Service Providers (CSPs) becomes increasingly valuable to those public authorities charged with detecting crimes and investigating and prosecuting criminals. CSPs are required by legislation to monitor many types of communications services and deliver lawfully authorised data to Law Enforcement Agencies (LEAs). In order to facilitate reliable, efficient and lawful monitoring, communication legislation is constantly changing. As a result, CSPs are continually required to fulfil new legal obligations. The requirement tends to be vague and difficult to manage considering the huge amount of data that exists in those networks. It is a real challenge to identify, process and distribute only the requested information to the requesting Law Enforcement Monitoring Facility (LEMF). BAE Systems provides CSPs with products and solutions that meet changing lawful intercept obligations. We have an extensive global track record within the communications monitoring domain. We know the challenges involved and we know how to handle complex communications networks. The solution - DataBridge To meet the ever changing requirements concerned with the Lawful Interception (LI) of IP networks, our DataBridge solution suite is based on a design criterion benefiting all parties with regard to financial investment, time and human resources. DataBridge enables CSPs to fulfil their current and future legal obligations for lawful interception DataBridge is compliant with worldwide standards for lawful interception including ETSI, ATIS and 3GPP DataBridge has a centralised LI mediation system that optimises workflow, saves human resources, money and ensures that only the information required is delivered DataBridge is tailored to the network, whenever possible and not the other way around DataBridge is based on features in the network elements, rather than requiring additional components and works with our own probes or other third party probes as required Finding the relevant information Considering the huge amount of data that exists in modern CSP networks it is a challenge for the CSP to identify process and distribute only the required information to the Law Enforcement Monitoring Facility (LEMF). This is where you can benefit from our extensive global track record in the realm of communications monitoring. We know the challenges involved and we know how to handle complex communications networks. CSP DataBridge LEMF www.baesystems.com/businessdefence

Experience and quality We are a global provider of lawful intercept solutions which enable reliable and efficient monitoring of all types of communication. We have 30 years experience within the development and production of advanced analysis and monitoring solutions for all types of communications networks. We can help your organisation fulfil all legal obligations in reference to communications monitoring. Monitoring of IP data DataBridge complies with worldwide lawful intercept (LI) standards for all voice and data based traffic ranging from carrier-grade VoIP to high-speed broadband, Wi-Fi, 2G/3G/ LTE and IP Multimedia System (IMS) networks. Calls and signalling information can be acquired in the network through active interception utilising existing network equipment with LI capabilities, or passive probes whenever active LI capabilities are neither present nor desired. The utilisation of existing infrastructure and network elements for LI compliance enables a simplified and cost efficient deployment. DataBridge supports provisioning and mediation of data for all major network vendors such as: Cisco Juniper Huawei Ericsson Samsung Nokia Solutions & Networks (NSN) GENBAND Acme Packet (Oracle) Alcatel-Lucent plus many more We also have a comprehensive range of probes from tactical to full core network solutions which allow all network configurations and requirements to be met. DataBridge can acquire data and signalling information from the same network element in case both voice or data traffic and signalling data transmits to the same devices (for example session border controllers). In case voice or data traffic and signalling information does not traverse the same elements DataBridge can also acquire signalling and voice traffic from different elements including signalling from soft switches and voice or data content from routers and switches. The intercept access point (IAP) may change dynamically depending on services provisioned by the user which could include call forwarding to an off-net destination. DataBridge supports complex call and data scenarios and automatically determines the correct intercept access point in real-time. 4

DataBridge features Supports and is deployed in carrier-grade networks, NGN, 2G/3G/LTE and IMS High performance with up to 5 Gbps mediation throughput Support for worldwide LI standards for handover of voice and data Wide support for network element vendors for active LI Support for complex call scenarios Automatic determination of correct intercept access points depending on signalling information DataBridge integrates directly with LI capable network elements and automatically provisions the relevant network elements to acquire signalling and voice and IP data. Signalling Switch Signalling (IRI) Provisioning Call content Voice content DataBridge Handover to LEA ETSI/CALEA Law enforcement agency Provisioning Signalling SBC/Router Provisioning Signalling (IRI) Handover to LEA ETSI/CALEA Law enforcement agency Voice and data content Voice and data content DataBridge integrates directly with LI capable network elements and automatically provisions the correct network elements to acquire signalling and voice data. www.baesystems.com/businessdefence

Acquisition and mediation Scalable, flexible and secure Live monitoring Timely delivery is a significant requirement faced by the CSP. This is accomplished by streaming data from the IAP, to the DataBridge Mediator and further on to the LEMF. The data streaming allows for live monitoring of intercepted traffic at the LEMF Management, mediation and handover DataBridge Mediator is the core of the DataBridge concept. It is the central component for management, control and configuration of the entire system. DataBridge Mediator performs LI mediation and handover of product to the requesting Law Enforcement Monitoring Facility (LEMF). User-friendly interface DataBridge Director provides an intuitive and user-friendly interface for all system operations. The application simplifies day-to-day tasks as well as maintenance, initial setup and configuration and also brings together all data in a single centralised system for automated and converged distribution. Centralised system DataBridge Mediator allows for configuration of the various inputs: routers, switches, DataBridge probes, or third party equipment. Management of network elements, target setup, distribution to the correct monitoring facilities, integrated audit, and optional billing of services is done via DataBridge Mediation and handover Data mediation and handover are vital features of LI. DataBridge Mediator verifies the received data according to warrant information, converts the data into a standard output format, as required by the individual LEA and subsequently distributes the data to the LEMF. All processing is performed in real time and the handover from DataBridge Mediator to the LEMFs is compliant with ETSI, CALEA and other standards, as required. Acquisition and mediation Based on identification headers assigned during the acquisition phase, DataBridge Mediator determines which LEMF should receive what data. In case data has to be delivered to multiple LEMFs, the data is replicated without delay in the forwarding process. Note that it is also possible to deliver the same data in different output formats, both streaming and file-based. 6

CALEA compliant ETSI compliant DataBridge probe In the event existing network equipment cannot provide the required LI functionality, the system may be further augmented with probes. These probes passively interface to various line types, covering both WAN and LAN connections. Based on user-defined criteria, the DataBridge probes acquire the requested data. Following acquisition, data is forwarded to the DataBridge Mediator, which in turn distributes the required information to the authorized receiving LEMF. High performance acquisition The main task of the DataBridge probe is to interface to various communication lines used to transport all traffic. Furthermore, the unit processes data and communication protocols (the protocol stack) to a point where data filtering can be performed. Output is forwarded to the DataBridge Mediator system, which in turn distributes the required information to the correct recipients. The output can either be in filtered form, or presented as raw intercepted traffic, depending on the requirements. All management of the DataBridge probe units is done via DataBridge Mediator. Continuous development The DataBridge probe is currently available for the following line types: STM1-16/OC3-48 Ethernet 10/100/1000/10G To satisfy our customers requirements and the challenges they face, we are committed to continuously developing DataBridge units, as new communication lines become available within the public networks. www.baesystems.com/businessdefence

Future requirements 8

Valuable partnerships Through our partnerships with leading manufacturers of network equipment such as Cisco, Juniper, Huawei, Ericsson, Samsung, Nokia Solutions & Networks (NSN), GENBAND, Acme Packet (Oracle), Alcatel-Lucent we ensure seamless integration between a CSP s existing network elements and DataBridge Mediator. This limits investment and ensures easy implementation of the DataBridge products in the networks. Thus, customers do not need to upgrade existing network equipment to comply with legal requirements. Cost effective solution CSPs can save significant resources by utilising our solutions. The flexibility of our solutions ensures that future CSP needs are met. Our solutions are cost effective, as new units interact with existing units and are designed to integrate with any future products. Intelligent acquisition For existing equipment, our concept provides central management and mediation as the DataBridge Mediator subsystem is designed to set up target data on both DataBridge and third party equipment. Our acquisition units are highly intelligent, network independent, easy-to-install, and user friendly. The result is a straightforward technical implementation of our solutions in the network. Law Enforcement Monitoring Facility (LEMF) As an additional part of the overall solution, we develop and supply complete LEMFs that include tools for meeting the challenges of extensive IP monitoring. Our LEMF platform is made in an open format, giving our customers the best of our expertise. Although the DataBridge concept can be used with any kind of LEMF, as delivery of data from the DataBridge Mediator is in a standardised format, we recommend taking advantage of our extensive knowledge and decades of experience in data processing, storage, and presentation. Project implementation In the ever-evolving industry of communications our goal is to fulfil the requirements of our customers by solving their real needs. This is accomplished by delivering advanced, flexible, and user-friendly solutions. Keeping you updated When you choose to work with us the relationship is long term. We provide outstanding support and service to ensure that systems are constantly updated to meet your LI needs now and in the future. www.baesystems.com/businessdefence

Service level agreement We understand the need for high-quality support and maintenance, to ensure optimal system performance and compatibility with the latest technology. Consequently, we offer flexible Service Level Agreements adapted to the specific needs of each customer. Elements can be added or omitted from the package, as needed. However, to ensure optimum performance of the equipment we always recommend: Support hotline service with access to technical experts 24/7 Software updates of products On-site support engineer when requested E-mail support service User friendly design The flexible and user-friendly design of the DataBridge products, based on industry standard components, enables our customers to perform a significant level of self-support. Onsite spares can be added to the Service Level Agreement, for immediate replacement of damaged or faulty system components. Training courses Regular training courses ensure the highest level of competence for staff operating the DataBridge products. Our academy provides training courses that can be added to the Service Level Agreement. Training courses are offered on various levels, e.g. System Management and Administration, System Maintenance and System Operation. Databridge is the monitoring solution of choice allowing you to meet your obligations effectively and efficiently. 10

www.baesystems.com/businessdefence

We are BAE Systems We help nations, governments and businesses around the world defend themselves against cyber crime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes - often collecting and analysing huge volumes of data. These, combined with our cyber special forces - some of the most skilled people in the world, enable us to defend against cyber attacks, fraud and financial crime, enable intelligence-led policing and solve complex data problems. We employ over 4,000 people across 18 countries in the Americas, APAC, UK and EMEA. Global Headquarters BAE Systems Surrey Research Park Guildford Surrey GU2 7RQ United Kingdom T: +44 (0) 1483 816000 BAE Systems 265 Franklin Street Boston MA 02110 USA T: +1 (617) 737 4170 BAE Systems Level 12 20 Bridge Street Sydney NSW 2000 Australia T: +612 9240 4600 BAE Systems Arjaan Office Tower Suite 905 PO Box 500523 Dubai, U.A.E T: +971 (0) 4 556 4700 BAE Systems 1 Raffles Place #23-03, Tower 1 Singapore 048616 Singapore T: +65 6499 5000 BAE Systems, Surrey Research Park, Guildford Surrey, GU2 7RQ, UK E: learn@baesystems.com W: baesystems.com/businessdefence linkedin.com/company/baesystemsai twitter.com/baesystems_ai Victim of a cyber attack? Contact our emergency response team on: US: 1 (800) 417-2155 UK: 0808 168 6647 Australia: 1800 825 411 International: +44 1483 817491 E: cyberresponse@baesystems.com Certified Service Cyber Incident Response Copyright BAE Systems plc 2016. All rights reserved. BAE SYSTEMS, the BAE SYSTEMS Logo and the product names referenced herein are trademarks of BAE Systems plc. BAE Systems Applied Intelligence Limited registered in England & Wales (No.1337451) with its registered office at Surrey Research Park, Guildford, England, GU2 7RQ. No part of this document may be copied, reproduced, adapted or redistributed in any form or by any means without the express prior written consent of BAE Systems Applied Intelligence.