CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.

Slides:



Advertisements
Similar presentations
1 TC LI ETSI Technical Committee Lawful Interception ETSI/TC LI Peter van der Arend (Royal KPN) Chairman ETSI/TC LI.
Advertisements

EduCause LI Overview February 2007
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fourteen Police Technology Wiretaps.
2 Language of Computer Crime Investigation
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
SS8 Lawful Intercept Briefing
PowerPoint® Slides to Accompany
Chapter 6 Telecommunications & Networks.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Lawful Intercept Case Study Harvard Law School November 12, 2003.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Federal Acquisition Service U.S. General Services Administration 2 nd Generation Information Technology (2GIT) Industry Day 2 nd Generation Information.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
A Guide to major network components
CALEA: The Communications Assistance for Law Enforcement Act Doug Carlson, Executive Director, Communications and Computing Services, NYU Mark Luker, Vice.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
Understanding Eligible Services I 2013 Schools and Libraries Fall Applicant Trainings 1 E-rate Program Understanding Eligible Services.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
VoIP Voice over Internet Protocol or “It is not Voice over IP; it is Everything over IP…” Bob Pepper, FCC.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
CALEA Discussion Network Policy Council February 4, 2007.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
Market Analysis Decision Group.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Comparing modem and other technologies
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies.
Common Devices Used In Computer Networks
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CALEA Communications Assistance for Law Enforcement Act October 20, 2005.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Securing and Monitoring 10GbE WAN Links Steven Carter Center for Computational Sciences Oak Ridge National Laboratory.
COMMUNICATION WITH CREDITORS AND DEBTORS IN ACCORDANCE WITH THE NEW CIVIL CODE OF PROCEDURE (NCCP) USING TECHNOLOGY INFORMATION AND COMMUNICATIONS André.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Computers Are Your Future Tenth Edition Spotlight 3: Home Network Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Communications Assistance for Law Enforcement Act & Higher Education: or How I Learned to Stop Worrying and Love Wiretaps Terry Hartle American Council.
CALEA IMPLEMENTATION IN VoIP NETWORKS By Cemal Dikmen, Ph.D. General Manager Lawful Intercept Products SS8 Networks, Inc. Thursday - 02/24/05, 8:15-9:00am.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Components of wireless LAN & Its connection to the Internet
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
Advanced Eligible Services Helping You Succeed Schools and Libraries Division Washington, DC Newark Atlanta Chicago Orlando Los Angeles Portland.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
IEEE & Expansion of 1994's Communications Assistance for Law Enforcement Act (CALEA) & Security Services Information Technology Department 2 December.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
Cellular Records Review and Analysis Part 2: Verizon.
Chapter 1: Computer Basics Instructor:. Chapter 1: Computer Basics Learning Objectives: Understand the purpose and elements of information systems Recognize.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
CYSM Business Diagrams Dr. Thanos Karantjias Dr. Spyros Papastergiou 1.
The Device Networking Company
Wiretapping Christopher Simpson.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Introduction to Networking & Telecommunications
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Software Defined Networking Market to grow at 54% CAGR from 2017 to 2024:
Intercepting Communications
CORPORATE PROFILE JUNE 2016
Update on Lawful Interception (LI) Directive for ISPs
©2018 Graphical Research. All rights reserved. North America Enterprise Networking Market to trace exponential gain of $30bn.
Presentation transcript:

CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007

The Communications Assistance for Law Enforcement (CALEA) was passed by Congress in It requires the assistance of telecommunication carriers and equipment providers in a) developing a standard for intercepting call data and b) providing that information to law enforcement agencies to carry out wiretap judgments. What is CALEA?

l CALEA applies to public, facilities-based broadband access and VoIP providers whose networks touch the Internet, (i.e.. gateways). l Monitoring Report Due – February 12, 2007 l System Security Reports – March 12, 2007 l Full CALEA Compliance – May 14, 2007 CALEA Compliance & Key Dates

1. Lawful Interception of Digital Communications of All Types 2. Capture of Identifying Information A. Origin B. Direction C. Destination D. Termination E. Date/Time Source: Frost & Sullivan, U.S. CALEA Market Insight , 2003 CALEA Intercept Legal Requirements

2005 Wiretaps by Type of Criminal Investigation Source: U.S. Courts Federal & State Wiretap Reports (1997 – 2005) Other*: Bribery, Kidnapping, Larceny & Theft, etc.

Categories of Surveillance Source: U.S. Courts Federal & State Wiretap Reports (1997 – 2005) Wire - land line, cellular, cordless & mobile Oral - microphone Electronic - incl. computer transmissions

Source: U.S. Courts Federal & State Wiretap Reports (1997 – 2005) Wiretap Growth Growth Accelerating

Source: U.S. Courts Federal & State Wiretap Reports (1997 – 2005) Cost of Compliance for Intercept Orders $57,186 Per Intercept Growing 5% to 7% per year Total Estimated Cost: $100+ Million/Year

1. Apply an Equipment Solution to Each Piece of Equipment (e.g. each switch) 2. Utilize a Mediation Solution that works with all network elements to provide lawful interception 3. Engage a Trusted Third Party (TTP) Solution Options to Achieve CALEA Compliance

1. Access Function 2. Delivery Function 3. Collection Function Primary Functions to Achieve CALEA Compliance

1. Access Function l defines intercept access points in the network l access points can either be: A. located at network equipment exits (routers, switches, gateways, etc.) or B. passive probes placed strategically in the network CALEA Functions

2. Delivery Function l warrant for the target is entered here l communicates with the access function l provides target identifying information A. phone number B. IP address C. address D. chat handle, etc. CALEA Functions

2. Delivery Function (continued) l Receives intercepted traffic from all access functions in the network l Processes intercepted traffic: A.formats it B.encapsulates it according to the interface standards C.delivers it to law enforcement l Acts as bridge to Law Enforcement Agency CALEA Functions

3. Collection Function (operated by LE Agency) l Application that receives intercepted traffic l Complies with delivery standards l Provides advanced tools for: A.analyzing data B.building relationships between targets C.creating link charts D.tracking target activities and compiling evidence for court CALEA Functions

Calculating the Cost Software Cost$$ Hardware Cost$$ FTE’s Administrative Cost $$ Tech Support $$ Maintenance $$ Legal $$ $$$ CALEA Costs

1.Fully Managed Service Providers (TTP) l VeriSign – public key solutions (verisign.com) l NeuStar – telecom directory services (neustar.biz) l APOGEE – dormitory network systems (apogeenet.net) 2. System Providers l Narus – software suite (used by VeriSign – narus.com) l SS8 – mediation box manufacturer (SS8.com) l AQSACOM – ALIS client/server platform (aqsacomna.com) l Endace – traffic monitoring and capture systems (preparing a service solution – endace.com) CALEA Providers

3. High Performance 10G NIC’s Chelsio 10Gb Intel Pro 10GbE S2I0 10GbE XFrame Myricom 10GbE CALEA Hardware

TTP Providers

Merit’s Products and Services 1. Open Source Solutions First Tool: An Open Source Program for Performing Access and Delivery Functions Available at Beginning of 2 nd Qtr CALEA Support Services Technical Advisory Services Hardware and Software Support Services Trusted Third Party (TTP) Services