1 Carrier concerns and issues: VoIP Anthony M Rutkowski Vice President, NetDiscovery Service VeriSign President, Global LI Industry.

Slides:



Advertisements
Similar presentations
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Advertisements

Implementing Telephone Numbers for VoIP Tony Rutkowski Vice-President of Regulatory Affairs Tom Kershaw Vice-President of.
Migration Considerations and Techniques to MPLS-TP based Networks and Services Nurit Sprecher / Nokia Siemens Networks Yaacov Weingarten / Nokia Siemens.
1 TC LI ETSI Technical Committee Lawful Interception ETSI/TC LI Peter van der Arend (Royal KPN) Chairman ETSI/TC LI.
1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.
EduCause LI Overview February 2007
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Michael Fargano, Standards Program Manager, CenturyLink ATIS Lawful Intercept (LI/LAES) Standards.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ETSI Standardization Activities on M2M communications Joachim Koss, ETSI Board Member Document No:
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
1 Carrier concerns and issues Satellite based VoIP Anthony M Rutkowski Vice President, NetDiscovery Service VeriSign President,
Jeju, 13 – 16 May 2013Standards for Shared ICT Mark Lipford Director, Global Standards and Ecosystem Development Sprint Nextel ATIS Lawful Intercept (LI)
Lawful Access/Interception: Global Cooperation and Collaboration Anthony M Rutkowski.
8.
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Protocols and the TCP/IP Suite
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Health Informatics Series
TIPHON IP Telephony Implementation Association TIPIA Overview Ayse Dilber, Michael Blaschitz TIPIA Vice-Chair, TIPIA Chair
Broadband Forum Machine-to-Machine (M2M) Solutions Robin Mersh, CEO The information in this presentation is public.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
Security and LI; ETSI’s role in standards
DOCUMENT #:GSC15-PLEN-48 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.10 CONTACT(S): James McEachern
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
11/09/2015 State of Lawfully Authorized Electronic Surveillance (LAES), also called Lawful Access (LA), and Legal Interception (LI) Input to.
Planning an Audit The Audit Process consists of the following phases:
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Protocols and the TCP/IP Suite
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
Network Resource Gateway (NRG) Application DevelopmentDSLD Unit Florin van Slingerland Rev A Slide 1 Application Development Presentation/Course Teaser.
Doc.: IEEE /462r0 IEEE / San Francisco / July 2003 July 2003 Jean-Michel Lauriol, AlcatelSlide 1 TIA TR-41 VoIP over WLAN projects.
Ben-Gurion University of the Negev Analyzing the Integration of Innovative Telecommunication Technologies Project Number P Yossi Twizer Supervisor:
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
February 24, 2004 TR-45 Lawfully Authorized Electronic Surveillance (LAES) Activity FCC/TIA Status Meeting on LAES Terri L. Brooks Chair TR-45 LAES Ad.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
Doc.: IEEE /296r0 Submission May 2003 Stephen R Whitesell, Chair TIA TR-41Slide 1 TIA TR-41 VoIP Activities Stephen R Whitesell Chair TIA TR-41.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
WebEx Cloud Connected Audio Enterprise
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
CALEA IMPLEMENTATION IN VoIP NETWORKS By Cemal Dikmen, Ph.D. General Manager Lawful Intercept Products SS8 Networks, Inc. Thursday - 02/24/05, 8:15-9:00am.
GSC Global Standards Collaboration GSC August – 2 September 2005 Sophia Antipolis, France August 28 – September 2, ISACC Opening Plenary Presentation.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
IMS developments in 3GPP
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
OneM2M Partnership Project. Contents Introduction Founding Partners Participation Scope & Objectives Structure Deliverables Contacts © 2013 oneM2M Partners.
FCC Ex Parte March 11, 2004 ATIS 1200 G St. N.W. Suite 500 Washington, DC ATIS Lawfully Authorized Electronic Surveillance Activity.
BY Mohd. MUJEEB ULLAH.  The demand for making air traveling more 'pleasant, secure and productive for passengers is one of the winning factors for airlines.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
SMS Implementation Lessons Learned. 2 Sources ICAO Regional Workshop on Safety Management Systems (SMS) and State Safety Programme (SSP) Implementation.
Jim McEachern Senior Technology Consultant ATIS July 8, 2015.
Physical Architecture Layer Design
By Joseph Carnevale, CIP Partner & Director of Sales
PPSO (GRSC) Update: Standards Work on Lawful Interception
Chapter-6 Access Network Design.
Global One Communications
Presentation transcript:

1 Carrier concerns and issues: VoIP Anthony M Rutkowski Vice President, NetDiscovery Service VeriSign President, Global LI Industry Forum

2 Adverse Impacts on Carriers Intercept solutions costly Intercept solutions costly Hardware and software expenditures Hardware and software expenditures Mediation devices Mediation devices Large on-going operational expenses Large on-going operational expenses Dedicated Security Office Personnel Dedicated Security Office Personnel Compliance to Legal/Regulatory Procedures for System Security & Integrity Compliance to Legal/Regulatory Procedures for System Security & Integrity Network Operations Staff for supporting network connectivity for each LEA Network Operations Staff for supporting network connectivity for each LEA Assistance to LEAs in initial connectivity or on-going surveillance support Assistance to LEAs in initial connectivity or on-going surveillance support Legal liabilities for non-compliant Security Policies and unauthorized disclosure of legal order information Legal liabilities for non-compliant Security Policies and unauthorized disclosure of legal order information LI preliminary investigative support requirements can be equally significant LI preliminary investigative support requirements can be equally significant Directories and identifier discovery Directories and identifier discovery Communications detail records searches Communications detail records searches LEAs often reluctant to use lower cost secure VPN technology LEAs often reluctant to use lower cost secure VPN technology

3 New requirements for carriers with a global footprint and LEAs New laws coming into force will significantly affect some carriers (and LEAs) New laws coming into force will significantly affect some carriers (and LEAs) Convention on Cybercrime Convention on Cybercrime Mutual Assistance Multilateral and Bilateral Agreements, especially the 2000 European MLAT 2nd Protocol Mutual Assistance Multilateral and Bilateral Agreements, especially the 2000 European MLAT 2nd Protocol Homeland Security Information Sharing Act Homeland Security Information Sharing Act Transnational interceptions and handovers likely to be commonplace Transnational interceptions and handovers likely to be commonplace Multiple independent Lawful Interception provisions and standards substantially drive up costs of compliance and implementation Multiple independent Lawful Interception provisions and standards substantially drive up costs of compliance and implementation Raises many issues, including discovery phase obligations Raises many issues, including discovery phase obligations VoIP will be a major focus of transnational LI VoIP will be a major focus of transnational LI

4 Multiple VoIP Lawful Interception solutions for carriers are emerging Cisco has just announced a new, highly effective, standards- based, service independent LI architecture for worldwide use Cisco has just announced a new, highly effective, standards- based, service independent LI architecture for worldwide use Initial implementation will support VoIP network elements Initial implementation will support VoIP network elements Other vendors are following Cisco lead Other vendors are following Cisco lead All mediation and collection system vendors are implementing All mediation and collection system vendors are implementing VeriSign NetDiscovery Service™ has already implemented and tested as a cost-effective service bureau architecture VeriSign NetDiscovery Service™ has already implemented and tested as a cost-effective service bureau architecture What is not intercepted from built-in VoIP network elements can be extracted from traffic streams using special access devices and probes offered by existing vendors (e.g., TopLayer- Verint/SS8, ECtel, Aqsacom) What is not intercepted from built-in VoIP network elements can be extracted from traffic streams using special access devices and probes offered by existing vendors (e.g., TopLayer- Verint/SS8, ECtel, Aqsacom) More difficult issues involve the interception of third party signalling information and availability of identifier information More difficult issues involve the interception of third party signalling information and availability of identifier information

5 VoIP LI Specifications (by scope) Generic Handover Generic Handover Cisco TapMIB et seq. Cisco TapMIB et seq. ETSI ES v2.1.1 ( )*[also known as GLIC or ULIC]; TS V2.4.1 ( )** ETSI ES v2.1.1 ( )*[also known as GLIC or ULIC]; TS V2.4.1 ( )** Germany REGTP TR FÜV V3.0 ( )* [modified ETSI specification] Germany REGTP TR FÜV V3.0 ( )* [modified ETSI specification] TIA J-STD-025A*; PN-4465-RV1.12 (14 Jan 2003)** TIA J-STD-025A*; PN-4465-RV1.12 (14 Jan 2003)** UK HO NHIS V1.0 ( )* [replaces GHIS, modified ETSI specification] UK HO NHIS V1.0 ( )* [replaces GHIS, modified ETSI specification] IP Handover IP Handover ETSI DES/SEC V0.3.0 ( )** ETSI DES/SEC V0.3.0 ( )** Netherlands EZ TIIT V1.0.0 ( )* Netherlands EZ TIIT V1.0.0 ( )* Wireless IP Handover Wireless IP Handover 3G/UMTS 3G/UMTS 3GPP TS v5.1.0 ( )* 3GPP TS v5.1.0 ( )* Cable IP Handover Cable IP Handover Cable Labs PKT-SP-ESP-I * Cable Labs PKT-SP-ESP-I * SCTE ** SCTE ** Cable IP Handover for Voice & Multimedia Cable IP Handover for Voice & Multimedia ETSI ES_ V ( )** ETSI ES_ V ( )** Softswitch Based Networks Softswitch Based Networks ISC [unknown] (27 Nov 2002)** ISC [unknown] (27 Nov 2002)** VoIP VoIP DTS/TIPHON-03020v1.0.1( )** DTS/TIPHON-03020v1.0.1( )** Wireline VoP (includes VoIP, VoMPLS, and VoATM) Wireline VoP (includes VoIP, VoMPLS, and VoATM) ANSI T1.XXX-XXXX (T1S1 Doc. 3s100030)** ANSI T1.XXX-XXXX (T1S1 Doc. 3s100030)** *Adopted and **most current draft versions listed

6 The VoIP meta-architecture significantly affects carriers From An Internet Ecosystem LI Reference Model and its elements, Figure 1, VeriSign Switzerland SA, Doc. ETSI/LI-Rap#05TD012, Sophia Antipolis, Jan 2003

7 LI meta-architecture effects on carriers Referencing diagram - at most provider premises sites, there are four interception options emerging - based on different standards Referencing diagram - at most provider premises sites, there are four interception options emerging - based on different standards There are no “one option fits all” solutions; so they will co-exist There are no “one option fits all” solutions; so they will co-exist Different standards are also emerging for each VoIP medium Different standards are also emerging for each VoIP medium VoIP network elements can also be spread across multiple independent providers and premises VoIP network elements can also be spread across multiple independent providers and premises A 10,000+ provider by 5,000+ LEA Lawful Interception matrix already exists A 10,000+ provider by 5,000+ LEA Lawful Interception matrix already exists Obligations of providers to support LEAs VoIP orders concurrently among multiple providers becomes highly complex, difficult, and potentially costly Obligations of providers to support LEAs VoIP orders concurrently among multiple providers becomes highly complex, difficult, and potentially costly Intermediary service bureaus may become crucial to effective intercept integration of all the VoIP options and achieving cost reductions Intermediary service bureaus may become crucial to effective intercept integration of all the VoIP options and achieving cost reductions

8 LI investigative support costs significantly affects carriers LI investigative support costs can be very substantial LI investigative support costs can be very substantial Explicitly raised in Canadian consultative and other national proceedings Explicitly raised in Canadian consultative and other national proceedings Typically the occurrence of these requests significantly exceed the number of for actual interceptions Typically the occurrence of these requests significantly exceed the number of for actual interceptions Needed common VoIP LI related capabilities include Needed common VoIP LI related capabilities include Requests for VoIP account identifiers Requests for VoIP account identifiers Requests for VoIP communication detail records Requests for VoIP communication detail records Service of LI orders, subpoenas, and warrants Service of LI orders, subpoenas, and warrants Interactions between Law Enforcement Monitoring Facility (LEMF) and access mediation equipment Interactions between Law Enforcement Monitoring Facility (LEMF) and access mediation equipment Multiple, non-interoperable ASN.1 VoIP Handover Interface information syntax specifications Multiple, non-interoperable ASN.1 VoIP Handover Interface information syntax specifications Interoperable global LI parties and objects registries Interoperable global LI parties and objects registries Certificate-based authentication for parties, documents, and carrier-agent-LEA transactions Certificate-based authentication for parties, documents, and carrier-agent-LEA transactions Solutions must be based on standard global schemas that allow for national and regional variations and XML-ASN.1 interoperability Solutions must be based on standard global schemas that allow for national and regional variations and XML-ASN.1 interoperability Significant benefits would accrue to providers, intermediate agents, and LEAs Significant benefits would accrue to providers, intermediate agents, and LEAs