CALEA Communications Assistance For Law Enforcement Act

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.
EduCause LI Overview February 2007
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Packet Based Multimedia Communication Systems H.323 & Voice Over IP Outline 1. H.323 Components 2. H.323 Zone 3. Protocols specified by H Terminal.
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Unified Carrier Registration (UCR) Update August 24, 2006.
Fiducianet, inc. tm 1 Presented by H. Michael Warren, President fiducianet, inc. VoIP Technology Perspectives Law Enforcement Concerns & CALEA Compliance.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
1 © 2000, Cisco Systems, Inc. CALEA_NANOG_2000_0611.ppt Impact of CALEA on Network Operators What it is and what it ain’t Chip Sharp Cisco System, Inc.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Session border control applications
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Latham & Watkins operates as a limited liability partnership worldwide with an affiliate in the United Kingdom and Italy, where the practice is conducted.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
Virtual Private Network
IT Expo SECURITY Scott Beer Director, Product Support Ingate
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
CALEA Discussion Network Policy Council February 4, 2007.
Saumil Shah IEOR 190G 3/19/08.  Vonage is a VoIP(voice over IP) company that provides telephone service via a broadband connection.  In order to use.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
1 Leveraging SS7 to Deliver IP Services Carl Bergstrom Director – IN & IP Services VeriSign Telecommunication Services Internet Telephony Conference, February.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Latham & Watkins operates as a limited liability partnership worldwide with an affiliate in the United Kingdom and Italy, where the practice is conducted.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
January 23-26, 2007 Ft. Lauderdale, Florida Lawful Intercept in VoIP Networks Manohar Mahavadi Vice President, Software Engineering Centillium Communications.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
CALEA Communications Assistance for Law Enforcement Act October 20, 2005.
Twenty-first Century Communications and Video Accessibility Act of 2010 Rosaline Crawford National Association of the Deaf Coalition of Organizations for.
CALEA and J-STD-025 revisions. CALEA  Communications Assistance for Law Enforcement Act (1994)  Standardized access to telecommunications systems using.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
Legal & Regulatory Classification of Broadband Demystifying Title II.
Implications of VoIP TC 310 May 28, Questions from Reviews Duty to Interconnect Reciprocal compensation Line of business v statutory line of business.
CALEA IMPLEMENTATION IN VoIP NETWORKS By Cemal Dikmen, Ph.D. General Manager Lawful Intercept Products SS8 Networks, Inc. Thursday - 02/24/05, 8:15-9:00am.
LAW OF COMPUTER TECHNOLOGY FALL 2015 © 2015 MICHAEL I. SHAMOS Regulatory Law Michael I. Shamos, Ph.D., J.D. Institute for Software Research School of.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY [1] VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY ROLL # EC
Internet telephony
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
An Overview of the Administrative Council for Terminal Attachments (ACTA) The Federal Communications Commission’s Privatization of 47 CFR Part 68 Presented.
SIP-H.323 Interworking Group RRR-1 IETF-48 SIP-H.323 Interworking Requirements draft-agrawal-sip-h323-interworking-reqs-00.txt Hemant.
To Rent or Buy the IP PBX? Maybe it’s Both…. Building a VoIP Solution That Enables Both.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Delivering high-quality SIP applications and services Jim Hourihan VP Marketing & Product Management.
Session border control: CONTROL for service providers to make money from IP IC services Kevin Klett VP, Product Management.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA) Public Law and Public Law Wireless RERC and CTIA Accessibility.
Telecommunications Essentials Chapter 9. Cost savings & revenue generation Logical rather than physical connections IPT – Telephony IPTV – Digital Television.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
Surveillance around the world
IP Telephony (VoIP).
Voice over internet protocol
Wyoming Statutes §§ through
CALEA Communications Assistance For Law Enforcement Act
Presentation transcript:

CALEA Communications Assistance For Law Enforcement Act PSHSB Public Safety and Homeland Security Bureau CALEA Communications Assistance For Law Enforcement Act David Ward, Senior Attorney Public Safety and Homeland Security Bureau, Policy Division March 20, 2008 Non-Public Information; For Internal Use Only

Part 1- CALEA Demystified Description, Compliance Requirements, Compliance Relief, and Enforcement Non-Public Information; For Internal Use Only

What Is CALEA? Legal and Regulatory Fundamentals Communications Assistance for Law Enforcement Act, Pub. L. No. 103-414, 108 Stat. 4279 (1994) (codified as amended in sections of 18 U.S.C. and 47 U.S.C.). The CALEA Preamble: “AN ACT To amend title 18, United States Code, to make clear a telecommunications carrier’s duty to cooperate in the interception of communications for law enforcement purposes, and for other purposes.” CALEA is an Enabling Statute Allows entities identified in other statutes to obtain lawful electronic surveillance, e.g., Federal (Titles 18 and 50), and State statutes. Why CALEA? Non-Public Information; For Internal Use Only

What Is CALEA? Legal and Regulatory Fundamentals CALEA “Newspeak:” Electronic surveillance: generic term for electronic eavesdropping. Interception: generic term for electronic eavesdropping. Wiretap: physical connection to a target’s service, “pliers and wires.” Content interception: intercepting the conversation. Two types of wiretaps: Content, or “Title III:” a lawfully-authorized content interception obtained by a law enforcement agency (LEA). Call identification information: 47 USC § 1001(2), formerly known as “trap, trace and pen register” wiretaps. Call-related records: Available to LEAs via other statutes but not covered by CALEA. Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What Entities must comply with CALEA? Statute: “Telecommunications Carriers, “ as they are defined by 47 USC § 1001(8). Regulations: CALEA Second Report and Order; in general, telecommunications carrier = common carrier Included: Common Carriers, Resellers, CMRS, VoIP Service Providers, and Broadband Internet Access Providers Not included: PMRS not connected to PSTN as a common carrier, Pay Telephone Providers, and Internet Services Providers (ISPs) that do not provide VoIP or broadband Internet access services. Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What Entities must comply with CALEA? (cont’d) 47 CFR § 102(8)(B)(ii): [CALEA includes] “a person or entity engaged in providing wire or electronic communication switching or transmission service to the extent that the Commission finds that such service is a replacement for a substantial portion of the local telephone exchange service and that it is in the public interest to deem such a person or entity to be a telecommunications carrier for purposes of this title; but (c) does not include -- (i) persons or entities insofar as they are engaged in providing information services; and (ii) any class or category of telecommunications carriers that the Commission exempts by rule after consultation with the AG” Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What Entities must comply with CALEA? (cont’d) Second Report and Order: ¶ 29: “We do not believe it necessary at this time to identify by rule additional classes of entities within CALEA’s definition of telecommunications carrier, pursuant to section 102(8)(B)(ii), or to exempt in our rules any classes pursuant to section 102(8)(C)(ii). Moreover, we agree with the FBI that codification in our rules of a list of examples would run the risk of being considered definitive rather than merely illustrative. We therefore have decided not to adopt such a list, as we had proposed in the NPRM.” Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals “System Security and Integrity” (SSI) requirements: Two statutory provisions: 47 USC §§ 1004 (CALEA section 105), and 229 (CALEA section 301). CALEA section 105: Big change over pre-CALEA electronic surveillance “A telecommunications carrier shall ensure that any interception of communications access to call-identifying information effected within its switching premises can be activated only in accordance with a court order or other lawful authorization and with the affirmative intervention of an individual officer or employee of the carrier acting in accordance with regulations prescribed by the Commission.” Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals SSI requirements: (continued) 47 USC § 229: Requires the Commission to make rules to ensure SSI compliance, so that carriers: require appropriate authorization to activate interception of communications or access to call identifying information Prevent unauthorized interception Maintain secure and accurate records of interceptions, with or without authorization Submit to Commission SSI policies and procedures Commission must review each carrier’s SSI plans First Report and Order contains SSI filing requirements Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What constitutes capability compliance? Statute: 47 U.S.C. § 1002, CALEA section 103 “Assistance Capability Requirements” Prescribes content interception requirements “concurrently to or from the subscriber’s equipment, facility, or service “or at such later time as may be acceptable to the government Prescribes call-identifying information requirements “before, during, or immediately after the transmission. . .or at a later time as may be acceptable to the government “in a manner that allows it to be associated with the communications to which it pertains The government determines the information format Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What constitutes capability compliance? (continued) Statutory Limitations: Law enforcement agencies (LEAs) cannot require any specific design of equipment, facilities, services, features, or system configurations. Excludes information services and decrypting services Excludes physical location info., except from telephone number Intercept must protect: Subscriber privacy Existence of surveillance Carriers may permit monitoring at carrier premises in emergencies Mobile carriers must provide the means for seamless taps. Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What constitutes capability compliance? (continued) “Safe Harbor” provided by standards: Statute: 47 USC § 1006: technical requirements and standards; extension of compliance date Compliance with an established CALEA standard will protect a carrier from an enforcement action. 47 USC § 1006(a): Industry standards organizations must consult with FBI, who must consult with state, local, and other federal LEAs, to guide the standards development process. 47 USC § 1006(a)(3): Absence of standards no safe harbor. 47 USC § 1006(b): LEAs may petition the FCC for a standards ruling. 47 USC § 1006(c) (section 107(c)): Individual carriers may petition the FCC for an extension of up to two years, if compliance “is not reasonably achievable through application of technology.” Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What constitutes capability compliance? (continued) CALEA Third Report and Order Adopted TIA J-STD-025 as the CALEA standard Ordered that TIA include an additional six capabilities, from the nine “punch list” capabilities demanded of the FBI. FCC role in the CALEA standards process - TIA J-STD-025 (“J” Standard) Safe harbor for carriers that use switching equipment built to comply with J standard Third Report and Order, Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals What constitutes capability compliance? (continued) 47 USC § 1006(c), CALEA section 107(c): “Not reasonably achievable” due to “availability of technology” 47 USC § 1008(b), CALEA section 109(b): “Not reasonably achievable,” due to 11 statutory reasons. Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals How much intercept capacity must a carrier provide? 47 USC § 1003, CALEA section 104 “capacity requirements” The statute requires the Attorney General, who delegated CALEA responsibility to the FBI, to develop “actual” and “maximum” CALEA capacity requirements. Carriers must expand to the actual within three years of enactment. Carriers must expand to the maximum within four years of enactment. Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals Who pays? Statutory schema: Capability requirements - carriers without “significant upgrades or major modifications” before 1/1/95, will have CALEA capabilities paid by the FBI. If the FBI refuses to pay, the carrier is deemed compliant by operation of statute (47 USC § 1008(d)). Costs for CALEA capability compliance for equipment and software purchases after 1/1/95, that constitute “major modification and significant upgrade” must be borne by carriers. Bottom line: CALEA has been around for 14 years, so all new network equipment for sale is CALEA-compliant and has been for quite some time. Second CALEA R&O: Capitol costs for CALEA compliance accrue to the carrier. Non-Public Information; For Internal Use Only

CALEA Compliance Legal and Regulatory Fundamentals By when? The original deadline was four years from the date of CALEA’s enactment, or October 25, 1998. The FCC extended the original compliance date until June 30, 2000, on CALEA section 107(c) grounds; not reasonably achievable due to the unavailability of compliant technology. FCC ordered an additional extension to 9/30/2000 for the six punch list items approved by the Third Report and Order, and for packet mode communications. Additional extensions were ordered to allow time for carriers and manufacturers to field compliance solutions for VoIP and Broadband Internet Access services providers. The deadline for all compliance was 14 May 07. Non-Public Information; For Internal Use Only

CALEA Enforcement Legal and Regulatory Fundamentals Who enforces? 47 USC § 229 requirements: FCC Full panoply of Title V enforcement mechanisms. Civil damages under 47 USC § 206- What if the entity is not a common carrier? All other CALEA: FBI, pursuant to 47 USC § 1007, and 18 USC § 2522. FCC, for violations of Commission Rules Non-Public Information; For Internal Use Only

Part II- How Does CALEA Work? Circuit Switched, Voice over Internet Protocol (VoIP), Broadband Access, and Industry-Specific Solutions Non-Public Information; For Internal Use Only

How Does CALEA Work? The Concept of Mechanized Wiretapping Telecommunications Carrier CALEA Services Call Data Channel (CDC) for Call Identifying Information Call Content Channel (CCC) for Content Information No More “Pliers and Wires” Cooperation Among all Interested Parties Telecommunications Carriers- purchase and use only CALEA-compliant service providing equipment Telecommunications Equipment Manufacturers- design and build into all telecommunications equipment CALEA compliance Law Enforcement Agencies (LEAs) Non-Public Information; For Internal Use Only

How Does CALEA Work? Lawful intercept functions & ownership Law Enforcement Administrative Function (LEAF) Collection Function (CF) Law enforcement agency Legal Order Voice service provider or Trusted third party Service Provider Administrative Function (SPAF) Delivery Function (DF) Intercept Access Function or Point (AF/IAP) Network service provider Target subscriber

How Does CALEA Work? Service provider lawful intercept functions in detail Service Provider Administration Function (SPAF) ADMF: Administration Function Provisions Target’s ID in AF Intercept Access Function/ Point (AF/IAP) Intercepts Target’s communication unobtrusively Mirrors & forwards call content (media) to DF Collects & forwards call data (signaling related information) to DF Delivery Function (DF) Collects & delivers call content & data from AF to Law Enforcement CF Prevents unauthorized access, manipulation and disclosure of call content & data LEA Law Enforcement Administrative Function (LEAF) Collection Function (CF) Legal Order VSP/TTP Service Provider Administrative Function (SPAF) Delivery Function (DF) NSP Intercept Access Function or Point (AF/IAP) Target subscriber

How Does CALEA Work?- Lawful intercept interfaces “a” interface: SPAF-AF- provisioning Target number INI-1, X1 “d” interface: AF-DF – call identifying information Signaling related information Call data events - Call Data Connection (CDC), INI-2 Encapsulated SIP - Intercept Related Information (IRI) X2 “d” interface: AF-DF - call content Media Call Content Connection (CCC), INI-3, X3 e interfaces: handover to/from LEA HI-1: LEAF-ADMF- legal order provisioning CDC, HI-2: DF-CF – call data CCC, HI-3: DF-CF – call content Law Enforcement Administrative Function (LEAF) Collection Function (CF) b Legal Order e Service Provider Administrative Function (SPAF) c Delivery Function (DF) a d Intercept Access Function or Point (AF/IAP) Target subscriber

Voice and video over IP – how it works Signaling messages SIP in UDP, TCP or SCTP INVITE + SDP(media options) OK + SDP(media selection) RTCP in UDP RTP in UDP Voice media flows Video media flows Non-Public Information; For Internal Use Only

ITSP/VoIP provider responsible for intercept Types of interactive communications - voice, video, and messaging - over IP ITSP/VoIP provider responsible for intercept One tier (centralized) services Vonage, AT&T Callvantage, Primus Lingo, Pulver FWD Registration (authentication & authorization), presence & routing centralized Two-tier service Skype Registration – centralized Presence & routing distributed to subscriber endpoints – “supernode” with public IP address Peer-to-peer Users with global IP addresses No VoIP provider/ITSP Set up session peer-peer Tap the service vs the line Broadband ISP responsible for intercept

Intercept requires right level of intelligence and active participation Media gateway Media server Softswitch Router SBC Signaling messages Voice media flows Video media flows

Media gateway + softswitch LEA A AN1 AN2 B Session border controller Media gateway + softswitch LEA PSTN AN1 AN2 A B LEA A AN1 AN2 B Router + softswitch Signaling Media B LEA A AN1 AN2 Media server + softswitch

Solution: Internet Telephony Service Provider Regulatory compliance – lawful intercept & emergency service (E911) Security – SBC DoS protection, access control, topology hiding & privacy, VPN separation, service infrastructure DoS prevention, fraud prevention Service reach – adaptive NAT traversal; SIP, SIP-H.323 IWF; OLIP/VPN bridging; interworking: transport & encryption protocols SLA assurance – admission control: session agent load, bandwidth; peer-peer media release; app/media server load balancing QoS reporting Revenue & profit protection – routing, accounting Data Center Database(s) Accounting SIP Internet Managed net SIP SIP/H.323 PSTN Signaling Media

Solution: Facilities-based HIP IC services – business & residential Regulatory compliance – lawful intercept & emergency service Security – SBC DoS protection, access control, topology hiding & privacy, VPN separation, service infrastructure DoS prevention, fraud prevention Service reach – SIP, MGCP/NCS, H.248, SIP-H.323 PBX IWF; adaptive NAT traversal; OLIP/VPN bridging; interworking: transport & encryption protocols; surrogate registration IP PBX & IAD endpoints SLA assurance – admission control: session agent load, bandwidth, policy server, QoS metrics; peer-peer media release; QoS marking/mapping; QoS reporting Revenue & profit protection – bandwidth policing, QoS theft protection, accounting, session timers SIP H.248 MGCP DSL MPLS VPN Cable Frame/LL H.248 SIP MGCP H.323 Signaling Media

Solution: Universities Regulatory compliance – lawful intercept Security – access control (FW), topology hiding (NAPT), privacy, VPN separation, IP PBX/endpoint DoS prevention, SBC DoS protection SLA assurance – admission control: IP PBX/SIP server constraints, bandwidth; QoS marking/VLAN mapping – voice vs. video; QoS reporting, bandwidth policing, accounting Service reach - VPN/OLIP bridging, SIP-H.323 interworking, adaptive NAT traversal University network H.323 or SIP PBX SIP endpoints /server SIP SRTP pass-thru SIP/TLS Internet Managed SIP services SOHO IP access to PSTN, hosted services, IP extranet, other IP subscribers

Non-Public Information; For Internal Use Only Part III What’s Next? Non-Public Information; For Internal Use Only

Pending CALEA Activity Records Management Mechanized System to Support the FBI with Accurate and Complete SSI Plan 7X24 Contact Information FBI/DOJ/DEA CDMA 2000 Standards Deficiency Petition Draft NPRM Adjudicate Section 107(b) and 109(b) Relief Petitions Non-Public Information; For Internal Use Only

Non-Public Information; For Internal Use Only