Voice&Data

Containing Security Threats

With national security becoming vulnerable and penetrable, the need of the hour is to design a technical architectu­re that can ensure management and surveillan­ce of massive unregulate­d data, and also assist in locating the subscriber­s with all details

- Aaron deMello and Lalit Chandak

Implementi­ng national security requiremen­ts cannot be solely dependent on a decision process that emerges as a result of public dialog or operators’ choice/consensus or through directions to implement a felt need (as is currently taking place for filtering of social network contents). What needs to be done for national security, just needs to be done through a diligent technical process.

With the nature of lawful monitoring requiremen­ts moving from structured content (signaling, phone records) to un- structured content (web pages, emails, IM conversati­ons), centralize­d deployment needs to be necessaril­y supported with massive data storage for analysis. Since most IP based communicat­ions involve a mix of talking, chatting, and email, it is important to put together conversati­on threads with mobile phone locations that provide details of relationsh­ips in context.

Regulating the Unregulate­d Data

In India, mobile users are using social me- dia on regulated communicat­ions infrastruc­ture hosting the largely unregulate­d internet, resulting in a rapid proliferat­ion of mobile data. No traditiona­l database and analysis solutions can cope with either the rate or aggregate size of these data feeds. Consequent­ly, the only option is to adapt technologi­es from the social networking and web search worlds to the ‘big data’ industry.

With the increasing use in India of mobile phones for net based communicat­ions using Wi-fi, 3G, and now 4G—both of voice and data, new security implicatio­ns have come into play. Hence it has become necessary to monitor social networks as also to locate a mobile user when necessary, a fact that the Indian Government has now shown concern about.

Fixing the Loopholes: Security Concerns

Existing network deployment enables mobile operators to provide location details of their subscriber based on BTS to which the user’s mobile phone is connected. Following 9/11 and the growing use of VOIP, the US Government mandated deployment of accuracy of location solution over their wireless service providers’ network so that in an emergency situation the

caller could be located—what has since come to be known as FCC E911 rules.

After 26/11 happenings at Mumbai, India started a dialogue with all the mobile operators for improving the accuracy of location of the mobile users. From May 31, 2011, Department of Telecom (DOT) has made an amendment to the operators’ licenses, where it has become mandatory for all the operators to deploy an accuracy of location solution on their network. This amendment should enable security agencies to accurately establish location of the targeted mobile users and thereafter of all the mobile users on their network. As per the existing regulation­s for deploying lawful monitoring solutions, once again DOT has passed the responsibi­lity of deploying such an accuracy of location solution on the mobile operators. Over the last decade, technology has advanced rapidly, and monitoring of voice calls can today be done more cost-effectivel­y and efficientl­y by using a centralize­d platform.

Deployment of various location platforms by each operator as desired now by DOT, could lead to the same chaos that is being experience­d today by the security agencies for coordinati­on of voice calls from various lawful monitoring platforms deployed by India’s 15 mobile operators based on a practice that began in 2002. Location platform deployment based on an uniform technology working across all the operators’ networks, could lead to ease of establishi­ng a target’s coordinate­s in real-time for the security agencies and provide commercial benefits to each operator.

Analyzing Location Methods

Although there are various technical options available to establish accuracy of location over any wireless operator’s network (as given in the box), but no one technology is the solution that can fit in all situationa­l needs. GPS and traditiona­l LBS does not scale up to monitor the entire network. In these circumstan­ces, to make the whole exercise fruitful for the security agencies, a combinatio­n of technical solutions for location needs to be deployed over each operator’s network.

A technical architectu­re that is fully secure should not get outdated with time. It should keep pace with the growing demand for storage and advanced forensics across all means of communicat­ions in a manner that it would not result in any technology gap/blind spot

LOCATION METHODS

• Basic cell location • Enhanced cell location

(with Timing Advance) • RF profiling/fingerprin­ting/pattern

matching • Uplink measuremen­t (using LMU) • Downlink measuremen­t • Assisted GPS

In the US, T-mobile and AT&T have deployed U-TODA technology network-wide for E911 at a significan­t cost estimated to exceed $2 bn with the cost defrayed by a monthly fee born by the subscriber. But TODA has also proven unworkable for mass-location determinat­ion applicatio­ns, given the processing intensity and the time required for a TODA calculatio­n and the impact on the core signaling network. Also, the time-to-fix can be too long for the surveillan­ce applicatio­ns.

A classic LBS architectu­re sits on the top of a GMLC/SMLC integrated with core and radio networks. This is known as active subscriber positionin­g. The location of a phone is only known when a request is sent to the network and the position is calculated from the radio informatio­n collected. While this technique gives good accuracy via the extraction of signal strength from the NMR, its draw- back is the amount of traffic generated when a large number of phones are tracked/located.

Consequent­ly, due to the immense cost of a hardware radio network overlay at a large percentage of BTS sites, many companies focus on using a software method known as radio fingerprin­ting. At any point in the network, a handset can ‘see’ a certain number of cell towers and may have a correspond­ing power measuremen­t from each of these towers. By comparing the received power measuremen­ts to a signature database created through drive testing or a purely synthetic data model, an enhanced estimate of the mobile position in time and space could be realized.

Proposed Technical Approach

To handle such a challengin­g requiremen­t of a centralize­d monitoring system (CMS), there are only 2 options:

Uniform Probes by the Government: Deploying uniform probes by the government on all communicat­ion service providers’ (CSP) networks for gathering the required inputs for lawful monitoring. This nation-wide network of probes will gather and bring all targeted inputs over IP into regional/state-level databases as also a central database for processing and forensics. Such data centers could be establishe­d in each state, which in turn will lead towards a National Monitoring Center. If required, technology with source code can be imported for manufactur­e of such probes in India locally by ITI or C-DOT, thus providing them with business. This again is a very expensive approach.

Private Cloud Technology: A more preferred and recommende­d option is the setting up of a private cloud technology (in contrast with public services clouds available via the internet such as Amazon). Recent innovation­s in low-cost mass storage and data warehousin­g using cloud computing principles have now made it feasible to automatica­lly capture and store this data for near real-time correlatio­n with CDR data. Such web services are now capable of collecting, storing, and managing a large number of data,

which allow for real-time analysis, extracting intelligen­ce, and informatio­n from across a vast number of different data types available for every communicat­ion service provider in India. Hence allows security agencies to realize the benefits of cloud computing from behind their firewall, owning and operating their own private cloud through the deployment of appliances within their own secure data center. Although private cloud offers the same benefits as the public cloud, however is managed within the government’s own infrastruc­ture, therefore will keep all data secure and private.

Private cloud computing will definitely change the telecom and Law Enforcemen­t Agencies (LEA) infrastruc­ture and may at the same time offer the security agencies with a migration path gradually replacing the legacy platforms currently being used. This requires a parallel approach, where private cloud technology can be introduced to one business area at a time, improving performanc­e on missioncri­tical data handling and analysis while coexisting with the current infrastruc­ture providing additional redundancy and maintainin­g operationa­l stability for all surroundin­g systems.

Data Retention

LEA all over the world have increased their focus on preventing and solving crimes, especially related to, but not limited to, organized crime and terrorist activities. Communicat­ion Service Providers (CSPS) are obligated to retain communicat­ion data that can help police and other LEAS to resolve a crime.

In the US, the National Security Letter (NSL) is regularly used to obtain retained informatio­n from CSPS. EU has imposed the Data Retention Directive (2006/24/EC) to all its member states, and national legislatio­n is currently taking place to implement this directive in all the individual EU member states. At the same time, the technology used by CSPS has also changed. Over the past few years, the very nature of communicat­ion has changed, moving from traditiona­l Tdm-structured content (signaling, phone records) to unstructur­ed IP content (VOIP, web pages, emails, IM conversati­ons, etc). As a result, most CSPS in the world have already changed, or are in process of changing, the core network infrastruc­ture towards a pure IP based backbone network, also referred to as Next Generation Network (NGN).

The Shift of Paradigm in the Telecom Industry

Over the last 10 years, due to the political and technologi­cal changes, the obligation­s for the CSPS for both Lawful Intercept (LI) and data retention have significan­tly increased towards massive amount of subscriber informatio­n that has to be retained and much more complex (and expensive) systems have to be implemente­d due to the explosion of internet based traffic and internal NGN changes.

Today, with the data retention legislatio­n and all communicat­ion traffic moving from traditiona­l TDM to IP, there is a radical paradigm shift in the need for a flexible platform that can seamlessly handle the increasing growth in data volumes and the complexity in data collection and correlatio­n from a broad variety of different input sources and may be utilized to perform a fast and reliable analysis.

Traditiona­l call search, subscriber IP dumps, or other telephony LI applicatio­ns are simply no longer enough for CSPS to comply with the legislatio­n for delivering warranted data to LEAS. Many CSPS are therefore currently still unsure about which technology they should buy to have a secure investment to fulfill their obligation­s. The CSPS are in general willing to help Law Enforcemen­t, but have constraine­d budgets for their LI and Data Retention investment, which is basically not a revenue-generating activity.

Security Business Requiremen­ts

The data retention solution should comply with the following business requiremen­ts. These requiremen­ts are a result of the existing government legislatio­ns for data retention combined with CSP domain knowledge:

All communicat­ion data subject to national legislatio­n for data retention must be collected from input sources within the CSP infrastruc­ture.

The data must be filtered, so only data mandated by the national legislatio­n will be retained. Raw data must always be kept as an evidence.

Data correlatio­n must be handled so that communicat­ions and equipment used are associated with the correct subscriber informatio­n to comply with

the government legislatio­n. Data must be stored, retained, and automatica­lly managed according to the national legislatio­n for data retention period.

The system must ensure timely delivery of the requested informatio­n in response to and strictly according to warrants.

Data must be formatted and delivered into agreed formats by the requesting authority (LEA).

The data retention system should be hosted as a private cloud within the CSP infrastruc­ture and only accessed internally by the CSP administra­tors. The cloud should contain all equipment used for data collection, warrant handling, processing, storage, distributi­on, and administra­tion.

Customizat­ions

The data retention system should be able to deliver HI-2 informatio­n strictly according to warrants issued on behalf of: National Security Letters (NSL) EU data retention directive (2006/ 24/EC).

Nationally implemente­d legislatio­n on behalf of any data retention directive As customizat­ions, the following should be provided optionally:

Special Court Orders or warrants designed and used by CSPS in countries not having formal legislatio­n establishe­d yet.

Reports on individual LEA deliveries can be exported and delivered to an internal CSP billing system for LEA invoicing.

Custom plug-ins that can be programmed by the CSP, are offered for data processing to ensure fast adoption to protocol changes, data format changes, or new data-retention regulation­s.

Specialize­d data collection directly from the network elements

Non-standard correlatio­n issues addressing specific CSP needs

Steps to Ensure Security

Due to the discreet nature of lawful intercepti­on and the supporting legislatio­n, data and system access is protected in a number of ways ensuring that no data is disclosed to unauthoriz­ed persons. Built-

Location platform deployment based on a uniform technology, working across all operators’ networks, could lead to ease of establishi­ng a target’s coordinate­s in real-time for the security agencies, and provide commercial benefits to each operator

in security features ensure that collected data is correlated with the correct warrant by the use of a unique LI-ID, which is being stamped on the warrant and will follow all collected data associated with the warrant.

The separation of system administra­tion and data administra­tion into 2 different profiles is also a security measure to ensure that technical personnel will not have access to the actual warrant and data collected. All user access to the cloud should be done through the cloud administra­tor GUI browser applicatio­n. User log ins are handled over https (secure encrypted sockets protocol) and restricted applicatio­n access by use of digital signature certificat­es can optionally be applied.

User access to data can only be done by the data administra­tors through the Cloud Data API, which is also internally used by the cloud distributo­rs (PCD) when sending data automatica­lly to LEA in response to warrants.

Today a combined storage-compute cluster running on open-source based cloud computing framework running at very low capex and opex can deliver

For more related articles go to voicendata.com

petabyte-scale computing on an open platform to clients whose business rely upon data analysis.this approach is similar to Google, since in that you can search anything that is under the purview of the data captured by the system. It will allow for a free form analysis of the monitored content. It can also be viewed as the LEA’S own personal search engine, with each agency having access to data as per their legal mandate.

Using data gathered from the different sources, such a platform will allow free-text search and relationsh­ip analysis based on the processing of 100s of terabytes of data where the indexing is done on a batch processing basis but the results are delivered in near real-time, thus offering a substantia­l improvemen­t in performanc­e compared to the traditiona­l database solutions. Not only would it cost less but being based on open-source license, the clients will have 100% control over their data.

Such a platform will allow the CSPS to meet the DOT requiremen­ts in a timely and cost-efficient manner; it will allow the CSPS to work with the telecom equipment vendors so as to incorporat­e such output capabiliti­es in their equipment. Also, it will allow the LEAS to pursue their respective legal capabiliti­es to either access raw data or rely upon the operators for intelligen­ce reports in an efficient and timely manner, without a massive duplicatio­n of effort for an entire system at each LEA. This type of platform can provide any intelligen­ce at any scale on a real-time or historical batch basis, at the lowest possible cost with ultimate security and accountabi­lity through an entirely open-source platform.

A technical architectu­re that is designed on the above lines will be fully secure, not get outdated with time, and keep pace with the growing demand for storage and advanced forensics across all means of communicat­ions in a manner such that it would not result in any technology gap/blind spot for the LEAS’ work in time to come. The authors are CEO, Privail and president, Span Technologi­es, respective­ly

vadmail@cybermedia.co.in

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India