More and more communication services rely on the Internet, respectively on the Internet Protocol (IP). Such public communication services are commonly subject to lawful interception regulations, too. Hence, Utimaco LIMS not only intercepts at network level. But the system can also be configured to intercept specific communication services only. Service providers may choose between active interception methods, where LIMS directly connects with the serving nodes, or passive methods, which use deep packet inspection (DPI) methods for monitoring individual communication links.
As illustrated in the diagram, e-mail interception is commonly realized with network probes that are connected to the core network via taps or switch span-ports (passive interception). The probes monitor the entire e-mail traffic of a service provider and forward intercepted e-mails to the LIMS Mediation Device.
Active interception is feasible with some e-mail servers that provide integrated interception capabilities.
LI of VoIP calls
Lawful interception of Voice over IP (VoIP) generally follows a two-step process, as VoIP signaling is separated from call content. At first, the call signaling needs to be monitored by the VoIP call agent (softswitch) to intercept call events of a person under surveillance. Once the addresses and routing information have been detected, a media gateway (or border gateway) can then be provisioned to capture the call content of the interception target. Another option is the use of a Session Border Controller (SBC), which acts as a proxy switch and is able to intercept and mirror targeted calls to LIMS.
Utimaco LIMS secures and mediates intercepted data and media before they are delivered to the authorized law enforcement agency in compliance with national laws and international standards, such as ETSI TS 102 232, PacketCable and ATIS T1.678.