North American Network Operators Group
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Historical
Re: ISP CALEA compliance
- From: Jason Frisvold
- Date: Thu May 10 14:08:34 2007
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=tcSBzhF4czlBkgz8Pm0XVr6fpG1YColaKVG1YrHz+du6yMxQsYy30tHO0R44PfCFMBP7lOIJdlg/S4Kkuw/HVm1NdV0cGPD8zLOuMQ2UX5A7Zmn0NvP3HwDUSJMJksKCfAfjzQ2SiVzaoS2MQvemtXNE3JG2fTQU58SN21Ii9kw=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=c+hEjCVANhZ2s9eQsBs5ZvPkhTqbAujo2jtU0NdSKAZaIXI2HPKTzgyDIn5ybsfu9iX+QIhrY+1vrcI/D2XssTHuaUTqE88/sFYXCjNg23fgyDMb9jUYaJ7YgP58w5bM+c905oly+zvSUB+bFjGxBpLqiRFpAnmU3pnpwM1bzps=
On 5/10/07, Jared Mauch <[email protected]> wrote:
If you're not offering VoIP services, your life may be easier as
you will only need to intercept the data. Depending on your environment
you could do this with something like port-mirroring, or something
more advanced. There are a number of folks that offer TTP (Trusted
third-provider) services. Verisign comes to mind. But using a TTP
doesn't mean you can hide behind them. Compliance is ultimately your
(the company that gets the subponea) responsibility.
Here's a question that's come up around here. Does a CALEA intercept
include "hairpining" or is it *only* traffic leaving your network?
I'm of the opinion that a CALEA intercept request includes every bit
of traffic being sent or received by the targeted individual, but
there is strong opposition here that thinks only internet-related
traffic counts.
- Jared (IANAL!)
--
Jason 'XenoPhage' Frisvold
[email protected]
http://blog.godshell.com
|