Understanding 5G Lawful Interception Challenges Facing Law Enforcement and Vendor Solutions Under Development

Sponsored By: TeleStrategies' ISS WorldŽ

September 24, 2019 : Online Webinar

TIME: 1:00-2:00 PM, US Eastern (New York) Time

Free for and Only Open to Government, 5G Telecoms and their Network Equipment Vendors . Registration with Corporate or Government e-mail address is required.


Click here to register  Click Here To Register


Understanding 5G Lawful Interception Challenges Facing Law Enforcement and Vendor Solutions Under Development

Lawful interception in 5G networks will be different than past mobile wireless operations. There are many reasons for this, but here are the critical three:  First, the 5G network is completely overhauled whereby the entire network core (everything from circuits to network elements to computing elements) will be virtualized, including LI interfaces and capabilities. Second, the sheer scale, transmission rates and density of user devices - as well as new devices themselves such as IoT, cars, video terminals, and embedded systems - will present demands on monitoring facilities never before experienced. Third, 5G standard bodies are heavily influenced by privacy-driven organizations like the IETF and non-traditional network equipment vendors with strong anti-government surveillance views, thereby introducing new levels of encryption and privacy making many traditional LI tools such as IMSI catchers obsolete. 

This webinar will present these and other challenges facing law enforcement as well as solutions under development by leading lawful interception vendors. Topics covered include: 

  • 5G RAN – how can LEAs keep up with 5G speeds, density, traffic types (IoT, device, heavy media), expected traffic volume and encrypted traffic … let alone backhaul and process that in real-time?

  • Mobile edge computing – how do LEAs address localized computing and connectivity (e.g., peer to peer live streaming), mobile edge computing, cloud infrastructure/partnerships/applications, and V2X?
  • NFV/Slicing/MVNO – how does a virtualized environment, slicing applications, roaming, and content/edge routing impact intercept?
  • Privacy/IETF – how are efforts to protect/obfuscate identity (e.g., SUPI/IMSI masking, AAA/Diameter, and encryption mandates) impact intercept?

  • What does the intercept look like while networks are transitioning from a 4G/LTE to a 5G core?

Presenters:
Matthew Lucas, TeleStrategies
Curt Schwaderer, Yaana, Inc.

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2019
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

voice:
703-734-7050 fax:703-893-3197