O'Reilly logo

Voice over IP Security by Patrick Park

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Lawful Interception Implementation

This chapter covers the methodology of deploying Lawful Interception in the following interfaces:

Chapter 10 covered the fundamentals of Lawful Interception, such as definition, requirements, basic architecture, and so on. This chapter covers the next step, how to implement each of the fundamentals in the VoIP service environment.

Even if the requirement from Law Enforcement Agent (LEA) is fixed, the implementation varies depending on a Telecommunications Service Provider (TSP). The primary reason for this variance is that there is no single standard that rules the method of implementation for whole LI architecture. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required