From: Anonymous <anon@anon.efga.org>
To: cypherpunks@cyberpass.net
Message Hash: 62abcecc04555b0d67afe35163992e4903592d55082a511583b5bb95762a5030
Message ID: <3ab277387c80cdaa7f82bfc0bf24e729@anon.efga.org>
Reply To: N/A
UTC Datetime: 1997-09-22 14:32:14 UTC
Raw Date: Mon, 22 Sep 1997 22:32:14 +0800
From: Anonymous <anon@anon.efga.org>
Date: Mon, 22 Sep 1997 22:32:14 +0800
To: cypherpunks@cyberpass.net
Subject: End-to-end cellular encryption needed - CDisk from Comverse Technology
Message-ID: <3ab277387c80cdaa7f82bfc0bf24e729@anon.efga.org>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="Boundary..3984.1071713733.multipart/signed"
--Boundary..3984.1071713733.multipart/signed
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
This is just one commercial product that implements most of what CALEA
requires. The great thing about market economies is that we'll obtain the
surveillance state at a competitive price.
======
Excerpts from "The CDisk Product Description", Reliable, Customized Solutions
for Intercepting Calls from Cellular Switches
Comverse's CDisk is a comprehensive digital audio system. It intercepts
and captures call audio and data from cellular switches and distributes it to
designated Monitoring Centers where it is processed and archived.
In order to be effective, interception facilities for switches in cellular
networks must offer
* One system that supports all cellular networks.
* Target subscriber management.
* Access to all calls in which the target subscriber is a party.
* Coverage of all types of calls.
* Automatic collection of call data (Session Related Information - SRI),
combined unambiguously into one conversation file.
* Strict security provisions.
CDisk meets the need with a mature, field-proven product
CDisk covers all cellular networks:
* Its field-proven interface connects with all major switches.
* Its open system supports multiple networks and Monitoring Centers.
* Its modular concept adapts simply to new standards and technologies.
With CDisk's target-subscriber management tools, authorized users can:
* Automatically process thousands of targets.
* Add, edit and delete targets from the list.
* Schedule start and end times, as well as define other conditions for
interception.
* Seamlessly cover targets across multiple networks.
* For each target, define access rights for multiple Monitoring Centers,
from organizations down to individual users.
* Define priority targets.
CDisk provides comprehensive call access by:
* Covering all types of calls including voice calls, data calls - voice band
modem, facsimile calls, short message service (SMS), unrestricted data calls.
* Monitoring all types of call services, including call transfer,
forward calls, diverted calls, conference or multi-party calls (CDisk
accesses all parties involved.), call waiting.
* Processing mixed voice and data calls.
* Monitoring uncompleted and busy call attempts.
* Supporting call diversion supplementary services.
* Covering roaming visitors.
Automatic collection of the following data for each target subscriber's call
(Session Related Information):
* Equipment ID - IMEI.
* Called number, including cases of uncompleted calls (for MSISDN and IMSI).
* Specification of the type of call (voice, data, fax, or SMS).
* Conference call party numbers.
* Diverted call number.
* Target subscriber cell location - Location Area Identity (LAI) at call
start and call termination.
* Date, time, and duration of call.
* Enabling users to listen to calls in real-time or in playback (after they
are recorded).
--Boundary..3984.1071713733.multipart/signed
Content-Type: application/octet-stream; name="pgp00007.pgp"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="pgp00007.pgp"
Content-Description: "PGP signature"
LS0tLS1CRUdJTiBQR1AgTUVTU0FHRS0tLS0tClZlcnNpb246IDIuNi4zaQoK
aVFDVkF3VUJOQ1Z0Y0xRZ3l4dzF3MURkQVFFSm13UCtMSEYvb2JNc3A3cytp
cjJ5UitnWEVpUWEzUkJjc1RCQQpPcWV5VmhGN1pIdkx4WFh5V1lneGxlQUpQ
OGhZbXZjdG5FUWdRNEpqcVZORVA0NitWWVVpUk9YTjAvLzA4bU41CkZ3aCti
MGVKbmlKRHBMY3hZcjlpYXE3NGZDSllNNHl3akkvNStYUUtNckVOMEZFN2RO
Qy9tOWJmcFNTdEFoUisKZnNUQUNDSHFiNlk9Cj1VNkRXCi0tLS0tRU5EIFBH
UCBNRVNTQUdFLS0tLS0K
--Boundary..3984.1071713733.multipart/signed--
Return to September 1997
Return to “Anonymous <anon@anon.efga.org>”
1997-09-22 (Mon, 22 Sep 1997 22:32:14 +0800) - End-to-end cellular encryption needed - CDisk from Comverse Technology - Anonymous <anon@anon.efga.org>