This chapter covers the methodology of deploying Lawful Interception in the following interfaces:
• Call Data Connection Interface
• Call Content Connection Interface
CHAPTER 11Lawful Interception Implementation
Chapter 10 covered the fundamentals of Lawful Interception, such as definition, requirements, basic architecture, and so on. This chapter covers the next step, how to implement each of the fundamentals in the VoIP service environment.
Even if the requirement from Law Enforcement Agent (LEA) is fixed, the implementation varies depending on a Telecommunications Service Provider (TSP). The primary reason for this variance is that there is no single standard that rules the method of implementation for whole ...
Get Voice over IP Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.