Documents
Exploiting Foreign Lawful Intercept Roundtable
Sep. 28, 2015
TOP TO USA, FVEY
Exploiting Foreign
Lawful Intercept (Ll)
Roundtable
831122
TOP TO USA, FVEY
TOP TO USA, FVEY
Exploiting Foreign
Lawful Intercept (Ll)
Roundtable
831122
TOP TO USA, FVEY
47? 2
TOP TO USA, FVEY
A (U) Definition
Lawful Intercept (LI) obtaining communications
network data by legal authority for analysis or
evidence
5 domain LEA
.
function
interna
Funcnons
In}: :3 Li
.rnummuorufli' '5?"in
I
L17. 1131?-
LI handover interface HI
IF: internal intarcup?nn funcliun Hl1: admin??traiivn
."Hruetnal "mmtk interface HIE: intercept ralatadiniurmatiun
HIS: contain 01" communicalinn
TOP TO USA, FVEY
47? 2
TOP TO USA, FVEY
A (U) Definition
Lawful Intercept (LI) obtaining communications
network data by legal authority for analysis or
evidence
5 domain LEA
.
function
interna
Funcnons
In}: :3 Li
.rnummuorufli' '5?"in
I
L17. 1131?-
LI handover interface HI
IF: internal intarcup?nn funcliun Hl1: admin??traiivn
."Hruetnal "mmtk interface HIE: intercept ralatadiniurmatiun
HIS: contain 01" communicalinn
TOP TO USA, FVEY
.
TOP TO USA, FVEY
(U) LI Standards
.n CALEA (US)
I ETSI (European)
SORM (Russian)
Other
TOP TO USA, FVEY
4.2
.
TOP TO USA, FVEY
(U) LI Standards
.n CALEA (US)
I ETSI (European)
SORM (Russian)
Other
TOP TO USA, FVEY
4.2
TOP TO USA, FVEY
Countries of Interest
4 Pakistan 4 Egypt
4 Afghanistan 4 Algeria
4 Iran 4 Mexico
4 Iraq 4 Indonesia
4 Yemen 4 UAE
4 Syria 4 SaudiArabia
4 China 4 Russia
TOP TO USA, FVEY
TOP TO USA, FVEY
Countries of Interest
4 Pakistan 4 Egypt
4 Afghanistan 4 Algeria
4 Iran 4 Mexico
4 Iraq 4 Indonesia
4 Yemen 4 UAE
4 Syria 4 SaudiArabia
4 China 4 Russia
TOP TO USA, FVEY
TOP TO USA, FVEY
XKS Fingerprints
4 Aqsacom 4 Nokia
4 ATIS 1* Siemens
4 Ericsson Trovicor
4' ETSI 4' Utimaco
4 Huawei ZTE
Motorola GENERIC
TOP TO USA, FVEY
TOP TO USA, FVEY
XKS Fingerprints
4 Aqsacom 4 Nokia
4 ATIS 1* Siemens
4 Ericsson Trovicor
4' ETSI 4' Utimaco
4 Huawei ZTE
Motorola GENERIC
TOP TO USA, FVEY
TOP TO USA, FVEY
Access Methods
FORNSAT
4 Microwave (F6)
4 Special Source Operations (880)
4 Tailored Access Operations (TAO)
TOP TO USA, FVEY
TOP TO USA, FVEY
Access Methods
FORNSAT
4 Microwave (F6)
4 Special Source Operations (880)
4 Tailored Access Operations (TAO)
TOP TO USA, FVEY
TOP TO USA, FVEY
Taplists
Developing advanced analytics to determine
patterns in numbers being tasked
Creating database to store LI-related
information
i 4 Discovering informal tasking
TOP TO USA, FVEY
TOP TO USA, FVEY
Taplists
Developing advanced analytics to determine
patterns in numbers being tasked
Creating database to store LI-related
information
i 4 Discovering informal tasking
TOP TO USA, FVEY
i.
i.
in
TOP TO USA, FVEY
Mapping Networks
Telecommunication and Internet Service
Providers in a region
LI vendors/service providers
IP addresses/ports of usage
Likely transmission medium
TOP TO USA, FVEY
i.
i.
in
TOP TO USA, FVEY
Mapping Networks
Telecommunication and Internet Service
Providers in a region
LI vendors/service providers
IP addresses/ports of usage
Likely transmission medium
TOP TO USA, FVEY
TOP TO USA, FVEY
Processing Solution
KITTYBINGE
4 TAO custom solutions
4* STARPROC
TOP TO USA, FVEY
TOP TO USA, FVEY
Processing Solution
KITTYBINGE
4 TAO custom solutions
4* STARPROC
TOP TO USA, FVEY
TOP TO USA, FVEY
Types of LI
Telecommunication
Internet
Differentiating between regular voice/Internet
traffic from tasked traffic. Protocol indications?
TOP TO USA, FVEY
TOP TO USA, FVEY
Types of LI
Telecommunication
Internet
Differentiating between regular voice/Internet
traffic from tasked traffic. Protocol indications?
TOP TO USA, FVEY
TOP TO USA, FVEY
Pod
TOP TO USA, FVEY
TOP TO USA, FVEY
Pod
TOP TO USA, FVEY
TOP TO USA, FVEY
LI Discussion Topics
Discovery
Access Methods
Taplist Analytics
Corporate Database
Corporate Processing Solution
4 Other Issues/Roadblocks
TOP TO USA, FVEY
TOP TO USA, FVEY
LI Discussion Topics
Discovery
Access Methods
Taplist Analytics
Corporate Database
Corporate Processing Solution
4 Other Issues/Roadblocks
TOP TO USA, FVEY