{"id":1333,"date":"2026-01-27T15:30:38","date_gmt":"2026-01-27T14:30:38","guid":{"rendered":"https:\/\/dev.ic-services.io\/?page_id=1333"},"modified":"2026-03-15T20:37:10","modified_gmt":"2026-03-15T19:37:10","slug":"cassetta-temporanea-per-le-intercettazioni-legali","status":"publish","type":"page","link":"https:\/\/ic-services.io\/it\/products\/appliances\/temporary-lawful-interception-box\/","title":{"rendered":"Box temporaneo per le intercettazioni legali"},"content":{"rendered":"\n<p>Our temporary lawful interception appliance is a rapid-deployment interception box that supports VoIP, IP, and messaging interception for short-term investigations. It is easy to configure and available in scalable sizes to suit small, medium, or high-capacity needs.<\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-lnb6wfws alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-info-box uagb-block-ahs9fdug uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h1 class=\"uagb-ifb-title\">Mobile Lawful interception Box<\/h1><\/div><p class=\"uagb-ifb-desc\">This appliance is designed for situations where a full LI infrastructure is not available or not practical to deploy, such as temporary projects, pilot networks or ad\u2011hoc investigative needs. It provides targeted interception capabilities in a self\u2011contained hardware unit that can be installed quickly, operated securely and removed without long\u2011term changes to your network.<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-bsqcm562\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-zq9xqzf1 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"\/contact\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Contact us<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-s1pxd8fa alignfull uagb-is-root-container\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-z7dtrqpx alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-iralinet\">\n<div class=\"wp-block-uagb-info-box uagb-block-eek9nowy uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title-prefix\">Purpose\u2011built for short\u2011term lawful interception<\/h3><p class=\"uagb-ifb-title\">The temporary lawful interception box combines capture, mediation and secure handover in a compact appliance that you can place at strategic points in your network. It supports VoIP, IP and messaging interception for specific targets, based on valid legal orders, and forwards Intercept Related Information and Content of Communication to law enforcement monitoring facilities. Predefined configurations for different capacities allow you to choose the right size for small test networks, regional roll\u2011outs or high\u2011volume scenarios.<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ocols2gr\">\n<div class=\"wp-block-uagb-info-box uagb-block-zt9dhqts uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Innovation-driven Solutions<\/h4><\/div><p class=\"uagb-ifb-desc\">Pre\u2011integrated software and optimized hardware make the appliance fast to deploy and simple to operate. It offers modern interfaces, flexible routing options and standards\u2011aligned handover formats so you can use it as a standalone solution or as an extension of your existing LI environment.<a href=\"https:\/\/ic-services.io\/products\/appliances\/temporary-lawful-interception-box\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-gwneroij uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Personalized Approach<\/h4><\/div><p class=\"uagb-ifb-desc\">CS can tailor the box to your specific use case \u2013 from the supported protocols and capacity to integration with your mediation\/LIMS systems and agency interfaces. This ensures that each deployment matches local legal requirements and your operational procedures.<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-orsi0vh0 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Superior Customer Service<\/h4><\/div><p class=\"uagb-ifb-desc\">Our experts support you through planning, installation, configuration and training, and can assist with test scenarios and acceptance by authorities. Even in temporary or urgent deployments, you benefit from reliable support and clear documentation.<\/p><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@graph\": [\n    {\n      \"@type\": \"Product\",\n      \"@id\": \"https:\/\/ic-services.io\/products\/appliances\/temporary-lawful-interception-box\/#product\",\n      \"name\": \"Temporary Lawful Interception Box\",\n      \"description\": \"ICS Temporary Lawful Interception Box: a plug-and-play hardware appliance for rapid deployment of lawful interception capability in fixed, mobile and VoIP networks. Ideal for temporary deployments, field operations and network testing.\",\n      \"url\": \"https:\/\/ic-services.io\/products\/appliances\/temporary-lawful-interception-box\/\",\n      \"brand\": {\n        \"@type\": \"Brand\",\n        \"name\": \"ICS\"\n      },\n      \"manufacturer\": {\n        \"@id\": \"https:\/\/ic-services.io\/#organization\"\n      },\n      \"category\": \"Lawful Interception Appliances\",\n      \"offers\": {\n        \"@type\": \"Offer\",\n        \"availability\": \"https:\/\/schema.org\/InStock\",\n        \"priceCurrency\": \"EUR\",\n        \"seller\": {\n          \"@id\": \"https:\/\/ic-services.io\/#organization\"\n        }\n      }\n    },\n    {\n      \"@type\": \"BreadcrumbList\",\n      \"@id\": \"https:\/\/ic-services.io\/products\/appliances\/temporary-lawful-interception-box\/#breadcrumb\",\n      \"itemListElement\": [\n        {\n          \"@type\": \"ListItem\",\n          \"position\": 1,\n          \"name\": \"Home\",\n          \"item\": \"https:\/\/ic-services.io\/\"\n        },\n        {\n          \"@type\": \"ListItem\",\n          \"position\": 2,\n          \"name\": \"Products\",\n          \"item\": \"https:\/\/ic-services.io\/products\/\"\n        },\n        {\n          \"@type\": \"ListItem\",\n          \"position\": 3,\n          \"name\": \"Appliances\",\n          \"item\": \"https:\/\/ic-services.io\/products\/appliances\/\"\n        },\n        {\n          \"@type\": \"ListItem\",\n          \"position\": 4,\n          \"name\": \"Temporary Lawful Interception Box\",\n          \"item\": \"https:\/\/ic-services.io\/products\/appliances\/temporary-lawful-interception-box\/\"\n        }\n      ]\n    }\n  ]\n}\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Our temporary lawful interception appliance is a rapid-deployment interception box that supports VoIP, IP, and messaging interception for short-term investigations. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1331,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1333","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"chatgpt","author_link":"https:\/\/ic-services.io\/it\/author\/chatgpt\/"},"uagb_comment_info":0,"uagb_excerpt":"Our temporary lawful interception appliance is a rapid-deployment interception box that supports VoIP, IP, and messaging interception for short-term investigations. [&hellip;]","_links":{"self":[{"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/pages\/1333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/comments?post=1333"}],"version-history":[{"count":7,"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/pages\/1333\/revisions"}],"predecessor-version":[{"id":2039,"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/pages\/1333\/revisions\/2039"}],"up":[{"embeddable":true,"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/pages\/1331"}],"wp:attachment":[{"href":"https:\/\/ic-services.io\/it\/wp-json\/wp\/v2\/media?parent=1333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}