De­cen­tral­ized Law­ful Mon­i­tor­ing


Law­ful mon­i­tor­ing is de­ployed at the edge of op­er­a­tor’s net­work us­ing dif­fer­ent tech­nolo­gies as cho­sen by an op­er­a­tor based on techno-com­mer­cial con­sid­er­a­tion of­ten at the detri­ment of the se­cu­rity re­quire­ments.

Mul­ti­ple means of com­mu­ni­ca­tion us­ing mul­ti­ple means for law­ful mon­i­tor­ing

Pur­chase based on the op­er­a­tor’s eval­u­a­tion of se­cu­rity needs

Cap­tured tar­geted out­puts avail­able to LEAS in dif­fer­ent for­mats

Syn­chro­niza­tion of cap­tured out­puts across var­i­ous op­er­a­tors for post-pro­cess­ing and an­a­lyt­ics—a dif­fi­cult task

Prone to leak­age at many points

De­lay in tar­get def­i­ni­tion and pro­cess­ing of cap­tured records for timely ac­tion

Scal­ing up and pro­vi­sion­ing of new mon­i­tor­ing fea­tures is a chal­lenge

Mon­i­tor­ing of roam­ing tar­gets and au­dit of op­er­a­tor’s net­work for com­pli­ance is dif­fi­cult

No cen­tral ad­min­is­tra­tion is pos­si­ble

Tar­gets get in­ter­cepted only in an area when they are on the op­er­a­tor’s net­work

Lack of con­fi­den­tial­ity, since the tar­get def­i­ni­tion is done by the op­er­a­tor

Num­ber of LEAS hav­ing ac­cess is lim­ited by in­stal­la­tion as is avail­able with each op­er­a­tor

No au­dit trail avail­able to LEA for mon­i­tor­ing mis­use and this is al­ways de­pen­dent on the op­er­a­tor’s co­op­er­a­tion

List of IDS blocked from in­ter­cep­tion, ie, black­list is at the dis­cre­tion of each op­er­a­tor Cor­re­la­tion of CDRS (and LDRS) across op­er­a­tors is dif­fi­cult and the his­tor­i­cal anal­y­sis is more man­u­ally driven

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.