It's not about logic or feasibility, it's about the government needing to
feel important.  Bureaucracy on autopilot.

I had the FBI office call me asking about an IP and they simply didn't
understand NAT or SSL.

On Tue, Mar 19, 2024 at 5:50 AM Forrest Christian (List Account) <
li...@packetflux.com> wrote:

> I see CALEA as a holdover from those days when most of the traffic on the
> internet was unecrypted.  Law enforcement wanted to be able to wiretap the
> internet just like they could wiretap POTS.
>
> Nowadays,  I'm not sure what law enforcement could actually do with the
> captured data.   What an isp has access to is largely encrypted over the
> wire.   I guess some data might be useful but I'm guessing that law
> enforcement has learned that looking at a capture of customer data isn't as
> useful as they thought it would be.
>
> About the only thing I can think of right this second which might be at
> least frequently unencrypted anymore is VoIP and/or DNS depending on your
> configuration.   But if I was carrying on criminal activities across the
> net I'd probably be looking at ways to encrypt everything which isn't hard
> to do.
>
> On Mon, Mar 18, 2024, 4:17 PM Mark Radabaugh <m...@amplex.net> wrote:
>
>> While CALEA is still on the books it doesn’t seem to be of much interest
>> to LEA.
>>
>> No - you do not have to be able to identify the user.  If LEA can
>> identify a specific end user for you out of the WiFi, then yes, they could
>> ask for you to monitor it but keep in mind that CALEA isn’t meant for
>> historical data.   It’s meant to be real-time capture once they have
>> identified a particular person of interest (well, a specific phone number,
>> IP address, etc.).
>>
>> Every year I get a phone call from the FBI verifying our contact
>> information and how to get hold of us if they need something.  I point out
>> that we file our CALEA documents and ask why they are calling - and they
>> say ‘oh, we don’t use that’.   Uh,  got it.   But the FCC still thinks it’s
>> important and you best follow the rules and file it anyway.  Local and
>> State LEA has never heard of CALEA.   It’s just one more bureaucracy on
>> autopilot that has outlived it’s usefulness.
>>
>> Mark
>>
>>
>> On Mar 18, 2024, at 6:29 AM, dmmoff...@gmail.com wrote:
>>
>> CALEA hasn’t been on my radar much, so this is probably an old topic, but
>> it’s one I don’t know much about.
>>
>> If you provide WiFi in a public space how do you handle compliance?  We
>> have parks, airports, and other public spaces with managed WiFi.  There are
>> also MDU’s with WiFi in a public area like a courtyard, lounge, lobby, etc.
>>
>> My understanding is you have to be able to capture traffic if you’re
>> ordered to do so.  Do you also have to be able to identify the individual?
>>
>> If they ever asked me to capture all traffic from the park WiFi….sure no
>> problem.  If they gave me a particular IP, port, and time, and they wanted
>> me to start capturing traffic AND identify who it was, then I would only be
>> able to tell them it was someone at the park.  At *best* I could give
>> them a MAC address and hostname.  If I have to identify the *customer*
>> that’s easy: the municipal parks department, but I’m guessing that’s not
>> what they will want to know.
>>
>> Will this stuff get us in trouble?
>>
>> -Adam
>>
>> --
>> AF mailing list
>> AF@af.afmug.com
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>
>>
>> --
>> AF mailing list
>> AF@af.afmug.com
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to