North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: ISP CALEA compliance

  • From: Mike Hammett
  • Date: Thu May 10 16:44:53 2007


I believe its everything.



----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com


----- Original Message ----- From: "Jason Frisvold" <[email protected]>
To: "Jared Mauch" <[email protected]>
Cc: "Nikos Mouat" <[email protected]>; <[email protected]>
Sent: Thursday, May 10, 2007 1:03 PM
Subject: Re: ISP CALEA compliance




On 5/10/07, Jared Mauch <[email protected]> wrote:
        If you're not offering VoIP services, your life may be easier as
you will only need to intercept the data.  Depending on your environment
you could do this with something like port-mirroring, or something
more advanced.  There are a number of folks that offer TTP (Trusted
third-provider) services.  Verisign comes to mind.  But using a TTP
doesn't mean you can hide behind them.  Compliance is ultimately your
(the company that gets the subponea) responsibility.

Here's a question that's come up around here. Does a CALEA intercept include "hairpining" or is it *only* traffic leaving your network? I'm of the opinion that a CALEA intercept request includes every bit of traffic being sent or received by the targeted individual, but there is strong opposition here that thinks only internet-related traffic counts.

- Jared (IANAL!)

-- Jason 'XenoPhage' Frisvold [email protected] http://blog.godshell.com