REX_immediate-response-to-autorithy-requ

REX –

Immediate response to authority requests

  • Search result in 15 seconds

  • Automate requests

  • Efficient processes

  • Reduces risk of human error

Automate authority data
requests securely

 

All communication service providers (CSPs) within EU/EES are mandated to provide the authorities with traffic data to support during criminal investigations, search & rescue, fraud etc. This means that all data related to a certain subscriber, during a certain time, at a certain location depending on the case. CSPs generally manages a huge amount of data to accommodate for this regulation and it causes a lot of work for each request, often provides too much data for the receiver to process efficiently.

 

To handle these types of requests efficiently and correctly, all data can be  consolidated  into one secure platform that can automate the process from order to delivery. The data driven reports is delivered in a common standardized way depended on local requirements. This way more accurate information is handed efficiently to the authorities, as the risk of human errors is reduced.

The REX platform handles all types of authority requests 

The platform tracks traffic for calls, SMS, data and location where results can be viewed in the program on a map or in a table, as well as being exported to Excel or CSV. Typical use cases would be finding last known cell for a missing person, viewing SIM:s and/or devices present at a crime scene or raising alarm if defined person enters a geo zone or country. For each query, different criteria can be applied to perform a search. Desired time period is set and you can search a user’s number or e.g. look at different cells.

MORE EFFICIENT PROCESSES

Automate as large part of the process as possible both for efficiency and potential "human factor" errors. Retain data for desired number of days. The database allows for prompt search results that can be viewed on a map or in a table.

CONSOLIDATE DATA IN ONE SYSTEM

Collect relevant information such as calls, SMS, data connections and locations from both fixed and mobile network via XDR’s, (passive probes or network element), and provide one-stop entrance for authorities. 

ADAPTABLE SOURCES AND FORMATS

The platform is adaptable both for input source formats and output export formats, as well as mappings and possible needed correlations and flexible to new sources and technologies, such as 5G.

SECURE PLATFORM

On-premise installation with access restriction and different security zones is usually recommended. All data searches should be logged, and can be exported to external logging system. The platform supports a separate front-end for external authority logins. 

REX - retention
& positioning system

The requested data will be processed, mapped and retained for the desired number of days. The databases are built for quick search-times and it is possible to search both on individual subscribers as well as on all traffic related to, for instance, a certain site. It is also possible to do a map-based search. Location information can be viewed both in table-like reports and in a map view. The stored positioning data, is primarily from the network information, like cell identities, but there are also possibilities to integrate towards a positioning/location system, if available, to get an even better accuracy. The REX platform handles mapping between subscriber and current IP address allocation, including NAT logs; that is, the mapping to public IP address and port number used by individual subscribers at all times.

In order to enrich the requested network information the platform can integrate with other relevant data sources for instance cell database, device, database, CRM and Roaming records (TAP files). To easily make the information accessible REX consolidates reports automatically, visualized in an intuitive GUI or exported in Excel, CSV or XML format. Conduct detailed user logging of all searches, possibilities to integrate with active directory and enforcing the user to enter a search cause are examples of built-in security features in the system.

Image by Joshua Sortino

Subtonomy REX

product sheet

Regulations for CSPs to be mandated to provide retained information about subscribers

on request of lawful intercept is here to stay. The challenge for CSPs is to do this

as efficient and smoothly as possible. Read the keys to succeed.

nw-quality-feedback.jpg

How to enhance mobile network quality with customer feedback

 

Customer service has often been a reactive activity for CSP’s. When customer complaints come in, they are, in best case, mapped to known network issues, like e.g. provisioning, terminal or coverage.

Subscribe to our newsletter

© Subtonomy AB 2020. All rights reserved. | GDPR policy