Table of Contents
Preface
Chapter 1. Introduction
Section I. Lawful Interception as One of Cyber Intelligence Methods
Chapter 2. A Glance at Network Surveillance
2.1. History of Intercept on telecom facility
2.2. Difference between Lawful Interception and Cyber Intelligence
Chapter 3. National LI Mandates
3.1. LI Acts in Different Countries
3.2. General LI Process Flow in LEA side
3.3. Type of Lawful Intercept
3.4. Admissibility of evidence from LI by Court
Chapter 4. LI Framework
4.1. Data Access / Intercept Access Point (IAP)
4.2. Data Delivery
4.3. Data Collection
4.4. Law Enforcement Monitoring Facility
4.5. LI Standard in Different Countries
Chapter 5. Practical Deployment for Lawful Interception
5.1. LI Intercept at TSP side
5.2. HI1 Interface under ETSI
5.3. HI2 Interface under ETSI
5.4. HI3 Interface under ETSI
5.5. File Transferring between Mediation Device and LEMF
5.6. Technical Document with Definition of LI Protocols
5.7. Function of Mediation Device
5.8. HTTPS Traffic under ETSI
5.9. Common LI Systems in the Set of LEMF
5.10. Systems for LI Process
Section II. Lawful Interception for Cyber Investigation Process and e-Evidence Collection
Chapter 6. Nature and Model of Cybercrimes
6.1. Type of Cybercrimes
6.2. Model of Cybercrime
Chapter 7. Cyber Investigation with Evidence Management and Analysis
7.1. International Guidelines of Common Standards
7.2. Requirement of Digital Evidence Collection from LI Systems
7.3. Compliance of LI Systems with Guidelines of Digital Evidence Management
Chapter 8. LI Case Establishment and Final Report Format
8.1. Items for Approval of Lawful Intercept
8.2. Investigation Report
Chapter 9. Network Forensics for Investigation and Data Analysis
9.1. Data Transmission through Network
9.2. Deep Packet Inspection Tool
9.3. Link Analysis
9.4. Time Line Chart
9.5. Content Analysis
9.6. Structure Analysis
Section III. LI Systems
Chapter 10. Law Enforcement Monitor Facility (LEMF): LI Monitor
10.1. LI Monitor
10.2. Subsystem components of LI monitor
10.3. Data Processing with HI2 and H3 files
10.4. General Product Specification of LI Monitor
Chapter 11. Mediation Device
11.1. Mediation device
11.2. Subsystems of mediation device
11.3. Data Flow of mediation device
11.4. Product Specification of mediation device
Chapter 12. Media Gateway
12.1. Function of Mediation Device
12.2. The position of media gateway in LI process
12.3. Media Gateway Products in Market
Chapter 13. Protocol Analyzer and Content Reconstruction System
13.1. Position of Protocol Analyzer in LI Process
13.2. Protocol Analyzer System
13.3. Data Flow of Protocol Analyzer
13.4. General Specification of Protocol Analyzer
Chapter 14. Tactic Wi-Fi Interceptor
14.1. Position of Tactic Wi-Fi Interceptor in LI process
14.2. General Specification of Tactic Wi-Fi Interceptor
Chapter 15. System Capacity and Sizing Planning
15.1. Choices of Hardware, Network and Middleware for LI platform
15.2. Mediation System
15.3. Media Gateway System
15.4. Protocol Analyzer system
15.5. LI Monitor system
15.6. Data Center Planning for LI system
Chapter 16. Business Resilience
16.1. Viewpoints at Hardware Platform and OS Level
16.2. Shared Storage within Cluster
16.2. Network level
16.3. Link level
16.4. Disaster Recovery
16.5. Backup/Archive
16.6. Vulnerability Assessment
16.8. Prevention from External Probing
Chapter 17. Virtual Machine for LI Deployment on VMware vSphere
17.1. The Mechanism of Virtualization Platform
17.2. Functionalities of Virtualization Platform by Hypervisor of VMware vSphere
17.3. Clustering Mechanism of VMware vSphere
17.4. Virtualization Planning for LI Deployment
17.5. Suggested Specification of LI Systems on vSphere Platform
17.6. Conclusion
Section IV. Telecom Network Infrastructure for LI
Chapter 18. Starting Point of LI Process at Telecom Network
18.1. The Network Environment and Concerns in TSP Site
18.2. LI Requirements in LEA side
18.3. Evolution of Telecom Network Technologies
18.4. Choice of Intercept Access Point
18.5. Subscriber ID
18.6. Type of Intercepted Data
18.7. Role of Mediation Device
Chapter 19. LI at Terrestrial Telecom Networks
19.1. Circuit Switch and Softswitch Network
19.2. IP Media Subsystem Network (IMS)
19.3. Fixed Data Network
Chapter 20. LI at Wireless Telecom Networks
20.1. GSM Network
20.2. GPRS Network
20.3. LTE network
20.4. Proposed LI Deployment at 5G Network
Chapter 21. LI on HTTPS Traffic
21.1. HTTPS Mechanism
21.2. Global Governance on Certificates
21.3. The Need of Intermediate PKI Certificate for Lawful Interception
21.4. Deployment of LI System on HTTPS for Cybercrime Investigation
21.5. The Proposed Availability of PKI Certificate for LI
Section V. Plans for LI Deployment Project
Chapter 22. LI Project Preparation
22.1. Objective for LI Deployment and Development
22.2. LI Project Preparation Task List
22.1. Work Scope Definition
22.2. Cost Estimation
22.3. Scheduling
22.4. Cost of Labor Planning for Project
Chapter 23. Management for Project Delivery
23.1. Management Functions
23.2. System Test
23.3. Customer Acceptance Testing
Chapter 24. LI Deployment Planning after Project Delivery
24.1. Training program
24.1.1. On-site Training
24.1.2. Off-site Training
24.2. Maintenance Service
Chapter 25. Software Development Planning
25.1. Product Design Process
25.2. Product Development Tool
Section VI. Case Study with Lawful Interception Operation
Chapter 26. Case 01: LI Deployment in the Data Center of APP Service Provider
26.1. Objective
26.2. Background
26.3. Common Backend of Social Communication Service
26.4. LI Deployment for ETSI Compliance
26.5. Concerns of High Availability
Chapter 27. Case 2: LI Deployment Integrated with both Circuit Switching and Packet Switching Networks
27.1. Objective
27.2. Background
27.3. Conceptual Implementation based on ETSI
27.4. Requirement and Network Environment in the Case
27.5. LI deployment
Chapter 28. Case 3: Investigation on VoIP Phishing
28.1. Objective
28.2. Background
28.3. Track down by Local Investigation
28.4. Track by Lawful IRI Records
Chapter 29. Case 4: Conduct Lawful Intercept at Radio Access Network of 3G/4G Network
29.1. Objective
29.2. Background
29.3. Object Positioning on Mobile Phone
29.4. Positioning Calculation by GPS in the Lab
29.5. RF Positioning
29.6. Measurement of BTS by Mobile Tracking Device
Chapter 30. Case 5: Tactic LI Application – Crime Investigation on Drug Dealing Case by Wi-Fi Interceptor
30.1. Objective
30.2. Background
30.3. Passive lawful Wi-Fi Intercept
30.4. Active lawful Wi-Fi Intercept
30.5. Distributed Wi-Fi Interception
30.6. Case of drug dealing investigation in Internet Café
30.7. Data integrated into ETSI compliance LI process
Chapter 31. Case 6: Lawful Interception on Breach Trust of Former Employee in High Tech Company
31.1. Objective
31.2. Background
31.3. Digital Criminal Data Collection
31.4. Legal Procedure and Final Sentence
Chapter 32. Conclusion
32.1. Telecom Technologies
32.2. APPs Used by Cyber Criminals
32.3. Juristic Environment
32.4. IoT Platform
32.5. Data Analysis
32.6. Investigation Process
32.7. IT Security Requirement due to Virtualization
Appendix A – Building a Simulated Lawful Interception Lab
A.1. Objective of Simulated LI Lab
A.2. The Deployment of LI Simulation Lab
A.3. The Operation Procedure
A.4. The Target Simulated Service Network
A.5. The Role of Each LI Device
A.6. Simulated Lawful Interception Procedure
A.7. Data Analysis
A.8. Equipment List for LI Simulation Lab
A.9. The Conceptual Deployment
A.10. Conclusion
Appendix B - LI Ready Country List
Appendix C - XML and Its Application in Lawful Interception
Appendix D - Introduction on ASN.1
Appendix E - Acronym List
Reference