LAWFUL INTERCEPTION FOR IP NETWORKS White Paper
ثبت نشده
چکیده
The proliferation of communications over networks based on Internet Protocol (IP) technology imposes ever growing challenges for Law Enforcement Agencies. This Aqsacom White Paper provides an introductory background on the issues behind lawful interception as applied to IP networks and their overlying applications, with emphasis on the dominant applications of E-mail and Voice-Over-IP (VOIP).
منابع مشابه
Efficient Lawful Interception in Mobile IPv6 Networks
The Lawful Interception (LI) of communications is necessary in modern telecommunications networks in order to help law enforcement agencies with the investigation and prosecution of criminal activities. For IP networks that support user mobility, such as Mobile IP, the LI solution must be distributed throughout the network in order to satisfy the requirement that it capture 100% of a target use...
متن کاملLawful Interception of IP Traffic
When compared with access network interception, Lawful Interception of the Internet is both more difficult and much less mature. However, Internet interception is becoming increasingly more important as Law Enforcement Agencies find that access network interception is becoming less effective. Unfortunately, the most common approach to Internet interception has some fundamental weaknesses, which...
متن کاملMinimising Cost of Lawful Interception in Mobile IP
Communications Interception is an essential part of law enforcement used by authorised government agencies to investigate criminal activities. With the growth of IP based applications and new IP technologies such as mobile IP, Internet Service Providers (ISPs) will find themselves increasingly obliged to provide interception capabilities. IP interception is usually done with expensive hardware ...
متن کاملLawful Interception of the Internet
This paper describes the state of Lawful Interception of the Internet and compares it with Lawful Interception of access networks. Lawful Interception is the process of secretly intercepting communications between parties of interest to Law Enforcement agencies. Internet interception is both more difficult and much more immature than access network interception. Refusal by the main standards bo...
متن کاملOn Identities in Modern Networks
Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt...
متن کامل