article page | 1 | 2 |
3 |
4 |
The Lawful Intercept
Server is responsible for direct interaction
with the Access Points for both Intercept
Related Information and Content. This,
in fact, should be as best as possible
a view of the raw data as provided by
the switch, soft-switch, or gateway hardware
producing records of the service usage
involved.
The Lawful Intercept
solution must have an Administrative
Function, whereby an operator shall administer
the rules pertaining to the network equipment
involved and the correlation and business
rules for the services deployed. Finally,
the Law Enforcement Agencies must have
direct access to the system via a Collection
Function, with real-time and batch reporting
capabilities to adequately address the
needs described above.
Operators deploying
such solutions note that this is one
of many such systems in the environment
responsible for network collection, data
enhancement, correlation and analysis,
and data retention. With other challenges
at hand, such as Sarbanes-Oxley, and
E911, should operators deploy different
solutions for each of these initiatives,
or should they try to fulfill each of
these requirements with a single system?
The answer is dependent
upon each operator’s unique environment.
However, there are certain guidelines
that may be applied in all cases:
Pure Sources
of Data
More than any single
factor, the need for pure sources of
data dictates that lawful interception
and surveillance must be done at the
network edge. Data that is enhanced or
altered is of less value to law enforcement
agencies than data straight from the
access network, and in fact many agencies
are now mandating that operators deploy
solutions to meet this requirement.
In fact, this type of
solution is of great benefit to any operator,
because a solution capable of collecting
from the original raw sources of data
can operate upon that data in many ways.
For example, while the raw data may be
used to execute correlation and business
rules for legal authorities, the same
data can be enriched and enhanced in
a separate parallel thread in order to
provide E911 data, as well as accounting
data for the operator’s internal
systems. Finally, such systems must produce
a clear recorded trail of all activities
as well, particularly if any business
or financial data is involved that may
enter the accounting stream.
Data Storage
and Retention
Data that is captured
is only useful for as long as it is stored.
While some information is