Decision Group Lawful Interception Suite for both Law Enforcement Agencies & Telecom Service Provid

Collecting cybercriminal data from different telecom networks is a big challenge for law enforcement staff and law makers all over the world.
By: Decision Group Inc. Taiwan
 
TAIPEI, Taiwan - Dec. 11, 2014 - PRLog -- Collecting cybercriminal data from different telecom networks is a big challenge for law enforcement staff and law makers all over the world. The critics of such cyber data collection operations are ever present in the mass media, and across the internet. How to balance security with privacy, as we see, is a hot topic not only among lobbyists and representatives in the halls of parliament, but its pitch also echoes among the debates between the accused and the prosecution in court. For all of us, the questions are frequently asked: What are the issues that underscore private vs public security, and how can we strike a reasonable balance among them?

First, from the viewpoint of human rights protection, it is a natural privilege for humankind to have freedom of expression. But on the other hand, it is the duty of law enforcement staff to protect our society from harms caused by such free expression. There must be a boundary agreed upon by the general populace on the scope of freedom of expression. This consensus has been accepted and written into the criminal code in most countries, i.e. the scope of individual freedom of expression is under protection of state - unless there is a risk that such freedom poses a threat to the interests of the society. This is the bottom line that allows (and often requires) law enforcement staff to carry out cyber data collection operations on telecom networks.

Another critical issue is how to make sure that law enforcement staff (LEA) always act within the law during these operations. Most will agree that there must be a standard operation procedure (SOP) to follow during cyber data collection, and proper auditing procedures should always be implemented based on this SOP. Such auditing procedures can be carried out using activity log files which are collected by SOP. If standard procedures are not followed, the acquired data may be rendered inapplicable in court, and any prosecution will be aborted.

All the devices used for cyber data collection must adhere to the requirements of standard operation procedures and this auditing process. The SOP for cyber data collection must be followed by both telecom service providers and law enforcement agencies. In other words, such data collection should not impact the regular service delivered by telecom service providers - and LEA staff should undertake such operations to monitor designated targets only under approval of the local court or parliament.

All the details of these required procedures are now well defined under a global standard from the European Telecommunications Standards Institute (ETSI), which is a standard setting body for telecommunications of TETRA, DVB, GSM, GPRS, CDMA, LTE, and Fixed Network…etc. Based on the standards of ETSI, cyber data collection can be performed using common protocols for all parties - including telecom equipment suppliers, telecom operators, system integrators, law enforcement staff, court officials and others. This standard operation is called lawful interception, and it is based on a series of common standards. Of course, in different countries, there are variations on ETSI standards. In the US, it is known as the CALEA standard (Commission on Accreditation for Law Enforcement Agencies), whereas in Federal Russia, it is part of SORM-2 standard (Standard Organization and Regulations Manual). No matter how it is customized in different localities, its base scheme is the same.

“For the past ten years, Decision Group lawful interception solutions have been widely adopted by many states as core LI systems.” said Casper Chang, CEO of Decision Group, “We fully understand how important the global ETSI standard is for deployment of a state LI system in terms of targeted communication interception, warrant management, data analysis and auditing procedures.”

Decision Group’s lawful interception suite consists of several systems that offer different functions for cyber investigation operations. These functions are fully in compliance with the data collection requirements of telecom service providers, LEA, and the courts (or parliament). They address targeted traffic interception, warrant management, data analysis and retention, and these functions can be also used for the auditing process based on ETSI or CALEA standards.

These systems in the Decision Group LI suite are well defined and deployed in different domains for the above functions. Some systems can be customized based on existing warrant management or criminal codes, and some of systems can be expanded for data mining or big data analysis. It is all up to customer requirements. The detailed information on systems in the Decision Group LI suite is below:

(i)iMediator

(ii)iMonitor

(iii)EDDM

(iv)iMedia Gateway

(v)Data Retention Management .

(vi)Tactic Lawful Interception Pack

a.For wired network – a trolley system with integrated functions of data access, collection, reconstruction and management for short term lawful interception operation by LEA.

b.For wireless network – a portable system with multiple WiFi interfaces and WEP/WPA breaking capability, to intercept targeted wireless packet network within a limited range.

(vii)HTTPS-Detective – HTTPS-Detective can be deployed in telecom networks as HTTPS proxy similar to function as a content delivery network (CDN) service in order to intercept target HTTPS online services.

In order to provide better service, Decision Group also provides several levels of training programs based on customer requirements. These programs are delivered by qualified instructors, senior cybercrime investigators, or scholars from LEA and university:

1.Cybercrime Investigation Training (CCIT) – Decision Group co-works with National Taiwan Central Police University and Taiwan CIB to offer training for cybercrime investigation skills and theory for LEA staff.

2.Lawful Interception Training (LIT) – Decision Group professional staff delivers training on lawful interception planning, deployment and operation with practical drills.

3.Network Packet Forensic Analysis Training (NPFAT) - Decision Group professional staff delivers training on how to interpret intercepted data and conduct data link analysis.

4.Cyber Intelligence Training (CIT) – Decision Group professional staff delivers training on cyber intelligence deployment and delivery for national security.

As a leading lawful interception solution provider, Decision Group welcomes partners and LEA clients to contact us with requests for LI technical material or suggestions for deployment and operation. Please also check out our website: http://www.edecision4u.com for more product sales, technical and service information. Wherever you are, if you need more information about our products and services, please contact decision@decision.com.tw. We’ll be glad to give you our utmost support service.

Contact
Isabelle Huang
***@decision.com.tw
End
Source:Decision Group Inc. Taiwan
Email:***@decision.com.tw Email Verified
Tags:Lawful Interception, Network Forensics, Cybercrime Investigation
Industry:Internet, Security
Location:Taipei - Taipei - Taiwan
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Decision Group Inc. PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share