The LI-5B is a purpose-built surveillance platform for Ethernet, IP and MPLS networks. This fanless, small form factor platform integrates 8GB of solid-state NAND storage with four 10/100 network interfaces, and uses less than 11W of power. It is an ideal surveillance platform for small to medium-sized telecom network operators, wireless ISPs, universities, and other organizations with government-mandated fiduciary compliance requirements. A perfect CALEA solution, the LI-5B offers best-in-class performance, flexibility, and economics. The optional ability to run non-CALEA applications increases the value of your investment and makes this platform truly unique in the industry.
The LI-5B is tailored toward specific needs in the areas of lawful intercept, network intelligence collection, and communications policy enforcement. The LI-5B is a complete turnkey Lawful Intercept solution fully contained in a proprietary hardware/software platform. Offering the most affordable approach to CALEA and other lawful intercept requirements, the comprehensive system is designed for flexibility and can be enhanced to support several other applications related to network surveillance.
•Allows for drop-in technical CALEA compliance
•Communicates directly with law enforcement using Safe Harbor standards such as T1.678, T1.IAS, and several others
•Able to pair with another LI-5B to deliver a virtual tap anywhere in the world
•Provides both IAP/Probe and Mediation functions
•Performs dialed digit extraction using multiple methods
•Records network traffic with intelligent ring buffering
•Surveils networks using deep packet inspection
•Enables carrier-class performance and stability
•Exceeds standard LI criteria selection capabilities
•Uses advanced firmware-update to support evolving LI standards
•Allows add-on applications to operate on separate physical interfaces
•World-class surveillance that fits in your backpack or briefcase
Packet Forensics adds value and reduces costs and installation challenges by using a unified hardware/software solution. This approach eliminates the expense of traditional systems that require separate IAPs and mediation devices, and integrates these functions into one streamlined system. This approach also avoids back-haul of data from edge collection probes back inside the core to mediation and then out again to the LEA. Management and maintenance of the single device is also greatly simplified to save time and reduce steps to comply with time-critical intercept orders.
Unlike many competitive solutions, Packet Forensics' surveillance software goes beyond identifying voice traffic and gives it the special handling it deserves. Instead of delivering a data intercept containing voice, our solution uses the proper mediation methodology and delivery protocol to treat voice intercepts differently than data intercepts. This affords you the most specific form of compliance while doing the best job of upholding the privacy of your constituents.