1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.

Slides:



Advertisements
Similar presentations
Lawful Intercept Briefing
Advertisements

Fostering worldwide interoperabilityGeneva, July 2009 Lawful Interception and Data Retention Presenter: Mike Sharpe, VP ETSI ESP Source: Peter van.
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
1 TC LI ETSI Technical Committee Lawful Interception ETSI/TC LI Peter van der Arend (Royal KPN) Chairman ETSI/TC LI.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
EduCause LI Overview February 2007
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Voice over IP Fundamentals
Total LI Compliance using Turn-key Applications and Solutions Rami Mittelman V.P. Product Marketing.
DOCUMENT #:GSC15-PLEN-23 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.3 CONTACT(S):Michael J. Fargano, Qwest,
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Michael Fargano, Standards Program Manager, CenturyLink ATIS Lawful Intercept (LI/LAES) Standards.
1 © 2000, Cisco Systems, Inc. CALEA_NANOG_2000_0611.ppt Impact of CALEA on Network Operators What it is and what it ain’t Chip Sharp Cisco System, Inc.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
Presents H.323 Forum ETSI TIPHON Presented by: Richard Brennan - Telxxis LLC Vice-Chair ETSI-TIPHON.
SS8 Lawful Intercept Briefing
Overview of CALEA Conformance Proposed Standard PTSC-LAES R6 Manish Karir, Merit – Research and Development.
Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Lawful Intercept Case Study Harvard Law School November 12, 2003.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
CALEA Discussion Network Policy Council February 4, 2007.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
1 Leveraging SS7 to Deliver IP Services Carl Bergstrom Director – IN & IP Services VeriSign Telecommunication Services Internet Telephony Conference, February.
February 25, Infrastructure-ENUM Secure, Private, Next Generation Addressing Infrastructure Douglas J. Ranalli Founder, Chief Strategy Officer NetNumber,
11/09/2015 State of Lawfully Authorized Electronic Surveillance (LAES), also called Lawful Access (LA), and Legal Interception (LI) Input to.
Support Services & IP Multimedia Subsystem (IMS)
Application-Layer Mobility Using SIP Henning Schulzrinne, Elin Wedlund Mobile Computing and Communications Review, Volume 4, Number 3 Presenter: 許啟裕 Date:
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
January 23-26, 2007 Ft. Lauderdale, Florida Lawful Intercept in VoIP Networks Manohar Mahavadi Vice President, Software Engineering Centillium Communications.
1 Carrier concerns and issues: VoIP Anthony M Rutkowski Vice President, NetDiscovery Service VeriSign President, Global LI Industry.
February 24, 2004 TR-45 Lawfully Authorized Electronic Surveillance (LAES) Activity FCC/TIA Status Meeting on LAES Terri L. Brooks Chair TR-45 LAES Ad.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Copyright © 2003, SS8 Networks, Inc. Proprietary. Do Not Copy or Distribute Without Permission. Emergency Services & Regulatory Compliance Internet Telephony.
February 24, 2004 TR-45 Lawfully Authorized Electronic Surveillance (LAES) Activity Industry Meeting on LAES Terri L. Brooks Chair TR-45 LAES Ad Hoc 817.
IPCablecom - Network and Service Architecture Dipl.-Ing. Volker Leisse Institute for Communications Technology Braunschweig Technical University
Ronald D. (Ron) Ryan Chair T1P1.SAH Slide 1 Copyright Nortel Networks T1P1/ Overview 3G UMTS LI Capabilities T1P1.SAH April 2001.
CALEA and J-STD-025 revisions. CALEA  Communications Assistance for Law Enforcement Act (1994)  Standardized access to telecommunications systems using.
STAR-GATE for PACKET DATA Arkady Linshitz Product Manager.
Evolution towards the Next Generation Network
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
CALEA IMPLEMENTATION IN VoIP NETWORKS By Cemal Dikmen, Ph.D. General Manager Lawful Intercept Products SS8 Networks, Inc. Thursday - 02/24/05, 8:15-9:00am.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Conferencing Status in 3GPP SA3-LI August Jean Trakinat Selvam Rengasami TrideaWorks Consultants to CALEA Implementation Unit Technical Program.
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
3GPP2 Charging Betsy Kidwell Chair, 3GPP2 TSG-X Lucent Technologies OMA-MCC Bangkok, Thailand June 2004.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
February 24, 2004 TR-45 Lawfully Authorized Electronic Surveillance (LAES) Packet Solutions Industry Meeting March 19 th, 2004 Terri L. Brooks Chair TR-45.
FCC Ex Parte March 11, 2004 ATIS 1200 G St. N.W. Suite 500 Washington, DC ATIS Lawfully Authorized Electronic Surveillance Activity.
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
CALEA TAMU ITEC Walt Magnussen, Ph.D. Director TAMU ITEC Joint Techs, February 2007.
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
1 RANS Conference#10, 24 March 2011; session ETSI Lawful Interception standardization Peter van der Arend Питер ван дер Аренд Chairman ETSI/TC LI.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
Session Initiation Protocol
Session Initiation Protocol (SIP)
Global Standards Collaboration (GSC) 14 Security and Lawful Intercept
GSC-13 Security and Lawful Interception TIA
Lawful Interception Basics
PPSO (GRSC) Update: Standards Work on Lawful Interception
Lawfully Authorized Electronic Surveillance (LAES)
Discussion Issues on IMS-based NGN
Presentation transcript:

1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The contents of this presentation do not constitute legal advice nor does Cisco guarantee the accuracy or completeness of such information.

2 © 2005 Cisco Systems, Inc. All rights reserved. Disclaimers It is Cisco's intent to support its customers by developing products that will help them meet the requirements of the law. Customers are STRONGLY advised to seek qualified legal counsel to advise them about the extent of their obligation under Lawful Intercept regulations and laws in each country in which they operate The contents of this presentation do not constitute legal advice nor does Cisco guarantee the accuracy or completeness of such information.

3 © 2005 Cisco Systems, Inc. All rights reserved. Agenda Lawful Intercept Product Planning Lawful Intercept Architecture Lawful Intercept Standards

4 © 2005 Cisco Systems, Inc. All rights reserved. Lawful Intercept Product Planning

5 © 2005 Cisco Systems, Inc. All rights reserved. Lawful Intercept Product Planning Today – 2/8/2006 – status quo – the NPRM and first report and order have not changed the lawful intercept requirements for enterprises, including institutes of higher education Cannot predict the future If requirements change, service provider architecture adaptable for other product lines

6 © 2005 Cisco Systems, Inc. All rights reserved. Service provider customer’s have been requiring LI capabilities for several years Cisco introduced an architecture for LI in June 2003 Informational RFC 3924 adopted October 2004 Existing protocols should NOT be modified to support LI capabilities Similar approach adaptable for Higher Education, if required Lawful Intercept Product Planning

7 © 2005 Cisco Systems, Inc. All rights reserved. LI Architecture

8 © 2005 Cisco Systems, Inc. All rights reserved. LI Architecture Requirements Carrier must be able to provide: Content of Communication Communication-Identifying Information (CmII) LI must be undetectable by the intercept subject Knowledge of wire-tap limited to authorized personnel Ability to correlate Communication Identifying Information with Content of Communication Confidentiality, Integrity and Authentication of the CmII Requirements vary between agencies, regions, and countries

9 © 2005 Cisco Systems, Inc. All rights reserved. Communication-identifying information (CII) Dialed Digits (Voice Calls) Subject login (data) Network Addresses (data) Content of Communications Audio Content of Voice Call Packets to/from subject LI Architecture – Examples of information reported

10 © 2005 Cisco Systems, Inc. All rights reserved. LI Architecture Requirements Transparency/Confidentiality of Intercept: No indication of intercept to unauthorized parties. No interruption of ongoing communications Intercept not perceptible to target or outside parties LEAs must not be able to detect other LEA intercepts Intercept should not affect service to subscribers Encryption of Communication Identifying Information & Communication Content desirable

11 © 2005 Cisco Systems, Inc. All rights reserved. Generic View of the LI Architecture LI Administration Function Mediation Device Intercepting Control Element (ICE) Request IRI Intercepting Network Element (INE) Request Content Service Provider Request Demarcation Point (SP, LEA responsibility) Information for the same intercept may be sent to multiple LEA’s Cisco Equipment 3 rd Party Equipment Collection Function Law Enforcement Agency (LEA) Communication Identifying Information CmII Communication Content (CC) Access Function (AF)/ Intercept Access Point (IAP)

12 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Lawful Intercept Architecture IETF First draft June 2003 IETF Second draft October 2003 Informational RFC 3924 adopted October 2004 Modular architecture – adapts to regional requirements via partner equipment (mediation device) Key Features: –Common architecture (SII) for voice and data –Separation of intercept control from call control (voice) and session control (data) –Controlled by Mediation Device –Standardized interface for mediation device to provision intercepts via SNMPv3

13 © 2005 Cisco Systems, Inc. All rights reserved. IETF – RFC 3924 Lawful Intercept Architecture Reference Model Lawful Intercept Architecture Reference Model Law Enforcement Agency (LEA) Law Enforcement Agency (LEA) Law Intercept Administration Function Law Intercept Administration Function Intercept Related Information (IRI) IAP Intercept Related Information (IRI) IAP Mediation Device (MD) Content Intercept Access Point (IAP) Content Intercept Access Point (IAP) Service Provider Functions MD Provisioning Interface b HI1(a) e IRI (e) HI2(g) User Content c Intercept Request (d) f Intercepted Content ( f) HI3(h) d

14 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Service Independent Intercept LI Administration Function Mediation Device Intercepting Control Element (ICE) Request IRI Intercepting Network Element (INE) Request Content Service Provider Cisco Equipment 3 rd Party Equipment Collection Function Law Enforcement Agency (LEA) Intercept Related Info (IRI) Communication Content (CC) Voice - Call Agent Data - Radius, AAA RADIUS Event Messages SNMPv3 RTP or UDP transport for delivery Configuration Commands Voice - Edge router, Trunk G/W Data – Access/Aggregation router

15 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Service Independent Intercept Separates control for intercept from network authorization and control functions Mediation Device sets up filter specification, destination, transport, controls intercept via SNMPv3 Intercept Access Point (router/switch) replicates content stream based on configuration by M/D Intercept NOT visible through command line at the router/switch (IAP) Modular architecture – Mediation device adapts to regional requirements (M/D partners familiar with local requirements/variations)

16 © 2005 Cisco Systems, Inc. All rights reserved. IRI CC LI Architecture – Voice Intercept LI Administration Function Service Provider (a/c) Collection Function Request (c2) Request (c1) Content (d1) RTP Stream Request (a1) IRI (d2) INE ICE Target Subscriber Customer Premise IAD or IP Phone (SIP, H.323, or MGCP-based) Customer Premise IAD or IP Phone LI Administration Function Aggregation Router Gatekeeper, SIP Proxy, Call Agent Mediation Device (3 rd Party) Admin Config IRI Call Control CC SNMPv3 SET Voice Packets Admin Call Control LEA

17 © 2005 Cisco Systems, Inc. All rights reserved. IRI CC LI Architecture – Data Intercept LI Administration Function Service Provider Collection Function LEA Request Content Request IRI Intercepting Control Element Intercepting Network Element Mediation Device Target Subscriber AAA Server (Cisco Access Registrar, other) Sniffer/ Probe Aggregation Router LI Administration Function Data Stream Admin (HI1) 1 Admin 2 Config 3 Access Request 4 IRI 6 Intercept Request 7 8 Ack 13 Intercepted Data 14 CC 15 9 Access Accept IRI5 11 Acct Start 10 12

18 © 2005 Cisco Systems, Inc. All rights reserved. Lawful Intercept Standards

19 © 2005 Cisco Systems, Inc. All rights reserved. Why Lawful Intercept Standards? Developed cooperatively in standards organizations (eg. ETSI, ATIS, TIA) with participation from service providers, equipment vendors, and law enforcement Compliance with Lawful Intercept Standards provides “Safe Harbor” under CALEA “Safe Harbor” status until challenged Appeals to FCC and courts

20 © 2005 Cisco Systems, Inc. All rights reserved. Standards Organizations (Cisco Participation) Telecommunications Industry Association (TIA) Alliance for Telecommunications Industry Solutions (ATIS formerly Committee T1) PacketCable™ European Telecommunications Standards Institute (ETSI)

21 © 2005 Cisco Systems, Inc. All rights reserved. Delivery Function Delivery Function Telecommunication Service Provider Administration Function Service Provider Administration Function Access Function Access Function Law Enforcement Agency (LEA) Law Enforcement Administration Function Law Enforcement Administration Function Collection Function Collection Function a b c d e The scope of J-STD-025 is limited to the e reference point. Network Reference Model TIA – J-STD-025

22 © 2005 Cisco Systems, Inc. All rights reserved. J-STD-025 B – J-STD-025 A, current standard for telephone network LI, published May 2000 – B ver adds cdma2000® packet data, and references for VoP and 3GPP, approved as trial standard Dec 2003, second default ballot as ANSI standard completed TIA 1066 – LI for cdma2000® - developed in TR 45.6, currently in ballot comment resolution TIA 1071 – LI for IP Multimedia Subsystem – developed in TR45.2 AHI, moved to TR45.6, needs to be aligned with TIA 1066 TIA – LI Standards of Interest

23 © 2005 Cisco Systems, Inc. All rights reserved. ATIS – T1.678

24 © 2005 Cisco Systems, Inc. All rights reserved. T1.678v2 – LI for VoIP (SIP, H.323) – V2 completed January 2006, includes supplementary services (call hold, call transfer, multiparty calls) T1.IPNA – LI for Public IP Network Access (data) – V1 in progress New Issue NGN – TR for application of LI standards to ATIS NGN architecture T Handover Interface for Lawful Interception of Packet-Data Services, Circuit Switched Services, and Multimedia Services within the Universal Mobile Telecommunications System (UMTS) – adoption of TS ATIS – LI Standards of Interest

25 © 2005 Cisco Systems, Inc. All rights reserved. PacketCable Electronic Surveillance Reference Model PacketCable™ - LI Reference Model

26 © 2005 Cisco Systems, Inc. All rights reserved. Electronic Surveillance Protocol - PKT-SP-ESP-I Published 29 Dec PKT-SP-ESP-I Published 1 Aug PKT-SP-ESP-I Published 13 Jan 2004 PKT-SP-ESP- I Published 23 July 2004 –Meets Law Enforcements requirements, including call forward, call transfer, and PC “Punch-List” items PacketCable 2.0 currently in development PacketCable™- LI Standards of Interest - VoIP

27 © 2005 Cisco Systems, Inc. All rights reserved. ETSI – Lawful Intercept Reference Model LEMF Network Internal Functions Intercept related information (IRI) Content of Communication (CC) Administration function IRI Mediation function Content Mediation function IIF INI HI1 HI2 HI3 IIF: Internal interception Function INI: Internal Network Interface HI1: Administrative Information HI2: Intercept Related Information HI3: Content of Communication NWO/AP/SvP Domain

28 © 2005 Cisco Systems, Inc. All rights reserved. ETSI – Third Generation Mobile (3GMS) TS Lawful interception requirements within a Third Generation Mobile Communication System (3GMS) – v6.1.0 Published January, 2005 TS Lawful interception architecture and functions –v5.6.0 Published Sept, 2003 TS Handover Interface for Lawful Intercept – v5.5.0 Published Sept, 2003

29 © 2005 Cisco Systems, Inc. All rights reserved. ETSI TS v1.1.1 – Lawful Interception: Handover Interface for IP Delivery – Published Feb, 2004, Updated Oct, 2004 (v1.2.1) ETSI TS v1.2.1 – Lawful Interception: Service Specific Details for Services – Published May, 2004 ETSI TS v1.1.1 – Lawful Interception: Service Specific Details for Internet Access Services – Published Feb, 2004, updated Oct 2004, (v1.2.1) ETSI – LI Standards of Interest - IP Data

30 © 2005 Cisco Systems, Inc. All rights reserved.