Solutions for Internet Service Providers

More and more communication services rely on the Internet, respectively on the Internet Protocol (IP). Such public communication services are commonly subject to lawful interception regulations, too. Hence, Utimaco LIMS™ not only intercepts on the network level, it can also be configured to intercept specific communication services only. Service providers can choose between active interception methods, where LIMS™ directly connects with the serving nodes, or passive methods, which use deep packet inspection (DPI) methods for monitoring certain network links.

LIMS - Email Interception

E-mail Interception

As illustrated in the example above, e-mail interception is commonly realized with network probes that are connected to the network via taps or switch span-ports (passive interception). The probes monitor the entire e-mail traffic of a provider and forward intercepted e-mails to the LIMS Mediation Device. Encrypted e-mail protocols (e.g. POP3s, SMTPs, IMAPs) can be decrypted by an LIMS Decoder if the server certificate is known.
Active interception is feasible with some e-mail servers that provide integrated interception capabilities.

LIMS - Voice Interception

VoIP and IP Multimedia Interception

Lawful interception of Voice over IP (VoIP) generally follows a two-step process, as VoIP signaling is separated from VoIP content. At first, the call signaling needs to be monitored by the VoIP call agent (softswitch) to intercept call events of a person under surveillance. Once the addresses and routing information have been detected, a media gateway (or border gateway) can then be provisioned to capture the call content of the interception target.

Utimaco LIMS™ secures and mediates intercepted data and media before they are delivered to the authorized law enforcement agency in compliance with national laws and international standards, such as ETSI TS 102 232, PacketCable and ATIS T1.678.