article page | 1 | 2 |
                                        3 |
                                      4 | 
                                      The Lawful Intercept
                                        Server is responsible for direct interaction
                                        with the Access Points for both Intercept
                                        Related Information and Content. This,
                                        in fact, should be as best as possible
                                        a view of the raw data as provided by
                                        the switch, soft-switch, or gateway hardware
                                        producing records of the service usage
                                        involved.
                                      The Lawful Intercept
                                        solution must have an Administrative
                                        Function, whereby an operator shall administer
                                        the rules pertaining to the network equipment
                                        involved and the correlation and business
                                        rules for the services deployed. Finally,
                                        the Law Enforcement Agencies must have
                                        direct access to the system via a Collection
                                        Function, with real-time and batch reporting
                                        capabilities to adequately address the
                                        needs described above.
                                      Operators deploying
                                        such solutions note that this is one
                                        of many such systems in the environment
                                        responsible for network collection, data
                                        enhancement, correlation and analysis,
                                        and data retention. With other challenges
                                        at hand, such as Sarbanes-Oxley, and
                                        E911, should operators deploy different
                                        solutions for each of these initiatives,
                                        or should they try to fulfill each of
                                        these requirements with a single system? 
                                      The answer is dependent
                                        upon each operator’s unique environment.
                                        However, there are certain guidelines
                                        that may be applied in all cases:
                                      Pure Sources
                                          of Data
                                      More than any single
                                        factor, the need for pure sources of
                                        data dictates that lawful interception
                                        and surveillance must be done at the
                                        network edge. Data that is enhanced or
                                        altered is of less value to law enforcement
                                        agencies than data straight from the
                                        access network, and in fact many agencies
                                        are now mandating that operators deploy
                                        solutions to meet this requirement.
                                      In fact, this type of
                                        solution is of great benefit to any operator,
                                        because a solution capable of collecting
                                        from the original raw sources of data
                                        can operate upon that data in many ways.
                                        For example, while the raw data may be
                                        used to execute correlation and business
                                        rules for legal authorities, the same
                                        data can be enriched and enhanced in
                                        a separate parallel thread in order to
                                        provide E911 data, as well as accounting
                                        data for the operator’s internal
                                        systems. Finally, such systems must produce
                                        a clear recorded trail of all activities
                                        as well, particularly if any business
                                        or financial data is involved that may
                                        enter the accounting stream.
                                      Data Storage
                                          and Retention
                                      Data that is captured
                                        is only useful for as long as it is stored.
                                        While some information is