Understanding 5G Lawful Interception Challenges Facing Law Enforcement and Vendor Solutions Under Development

Sponsored By: TeleStrategies' ISS WorldŽ

July 30, 2019 : Online Webinar

TIME: 9:00-10:00 AM US Eastern (New York) Time

Free for and Only Open to Government, 5G Telecoms and their Network Equipment Vendors . Registration with Corporate or Government e-mail address is required.


Click here to register  Click Here To Register


Understanding 5G Lawful Interception Challenges Facing Law Enforcement and Vendor Solutions Under Development

Lawful Interception in the new 5G network will be altogether different than past mobile wireless operations. Many reasons but here are just three: 

First, Architecture Changes: MIMO/millimeter radio interfaces, virtualized core infrastructure (NFV, SDN, etc.), cloud-based edge computing and more requires a new look at communications interception.  

Second, Traffic Volume: Target intercept traffic bursting to 5Gbps and billions of expected devices (IoT) will presenting demands on monitoring facilities never before experienced. 

Third, Privacy Driven 5G Architecture: The 5G standards are heavily influence by privacy driven specification organizations like the IETF and the new, non-traditional network equipment vendors having strong anti-government surveillance views will introduce new levels of 5G encryption making many traditional LI tools such as IMSI Catchers obsolete. 

This webinar will present these challenges facing law enforcement and solutions under development by lawful interception vendors. Specifically: 

  • 5G RAN – how LEAs possibly keep up with 5G speeds, density, traffic types (IoT, device, heavy media), expected traffic volume, TCP limits … let alone backhaul that?

  • Mobile edge computing – how do you address localized computing and connectivity, including mobile edge computing, cloud infrastructure/partnerships/applications, and V2X?
  • NFV/Slicing/MVNO – how does a virtualized environment, slicing applications, technical considerations, roaming, content/edge routing impact intercept?
  • Privacy/IETF – how are efforts to protect/obfuscate identity (e.g., SUPI/IMSI masking, AAA/Diameter, encryption mandates) impact intercept?

Presenters:
Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies
Rene Nitzinger, Product Manager, Utimaco

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2019
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

voice:
703-734-7050 fax:703-893-3197