Professional Documents
Culture Documents
I)
Contents
1. Overview – Gateway Interception (G.I) technology ...............................................................................
2. Problem ...............................................................................................................................................
“The Internet has changed the way people communicate with each other- For good as well
as Bad”
Over the past years, the increasing popularity and accessibility of the Internet has caused a
dramatic shift in the way people share information. Today, Internet, e-mail, instant
messaging and IP Telephony have put a whole new world of communication at our
fingertips.
However, with the Internet fast becoming a breeding ground for criminal activity these
ingenious and sophisticated technologies are often used to promote crime, violence and
terror, which compromise the values of human society.
With coordinated attacks becoming a menace plaguing the whole world, Communication
Monitoring has become an instrumental asset to gather vital electronic intelligence data
needed to restrain terrorism and track other such threats to the security of people, assets
and information.
Gateway Interception (G.I) technology obtains real-time information on data and VOIP
packets to gather intelligence against hostile individuals and networks. Similar technology is
already used by law enforcement agencies across the world including Develop country for
real time interception of data.
2. Problem
Traditional interception technologies are fairly standardized with well developed laws and
procedures for the request and implementation of wire taps. However, with the
overwhelming growth of Internet in the country in the last ten years, IP networking has
changed the behaviors of the individuals and businesses, who now take E-mail, chats, Video
conferencing and VOIP as mundane tools of daily communications and information
consumption.
3. G.I Solution
Until now lawful interception (LI) has been based on the user / IP address relation, where the actual
search focuses on the IP address rather than user. However, this approach has become obsolete
and redundant as IP Telephony, Instant Messaging, file exchange networks, and other new
communication technologies come into for
traffic before filtering which enables reliable interception of all voice and data circulating across IP
networks. We use service based targeting which only targets and intercepts data on the following
parameters namely –
G.I. uses new interception standards and methods for advanced deep packet inspection IP probing
solutions, to extract relevant data and deliver it to the Law Enforcement agencies. The technology
integrates lawful Interception, with Data Mining and Artificial Intelligence to provide a
comprehensive package.
3.1 Decodes–
Microsoft Windows based workstation with packet sniffing software and a removable
disk drive
A customized packet interception software to intercept and process all packets
The processing of packets can be on the basis of –
• E-Mail ID of the sender/receiver
• Keyword Filtering
• IP Address
All packets would be analyzed and mined on the above mentioned parameters
A customizable AI module to introduce new rule set and minimize the interception and storage
of irrelevant data
Effective both for tracking down known targets and for wide area search.
Can be utilized as a complete interception solution (Probe and Monitoring Center deployed
together) ‐ also on a laptop.
Immediately displays the result of interception – at any moment within a monitoring session.
Keyword search in large volumes of traffic in various text encodings!
Key words search in complex objects:
MS Office files
Archives
PDF files
Graphics and
in all the said objects being embedded into any of the above
Carnivore permits access to the email of every customer of an ISP and the email of every person
who communicates using the ISP’s in Develop country. Carnivore is roughly equivalent to a wiretap
capable of accessing the contents of the conversations of all of the phone company's customers,
with the assurance that the Develop country will record only conversations of the specified target.