Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-21 Thread Nils Ketelsen

On Fri, Jun 18, 2004 at 06:48:06PM +0530, Suresh Ramasubramanian wrote:

 WASHINGTON--The U.S. Department of Justice on Wednesday lashed out at
 Internet telephony, saying the fast-growing technology could foster
 drug trafficking, organized crime and terrorism.


But the change is real. I don't think anybody would argue now
that the Internet isn't becoming a major factor in our lives. However,
it's very new to us. Newsreaders still feel it is worth a special and
rather worrying mention if, for instance, a crime was planned by people
over the Internet. They don't bother to mention when criminals use the
telephone or the M4, or discuss their dastardly plans over a cup of tea,
though each of these was new and controversial in their day.

   --- Douglas Adams, 1999
   --- complete Article at http://www.douglasadams.com/dna/19990901-00-a.html



RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-21 Thread Curtis Maurand

It won't make any difference.  Anyone (barring complete idiots) will 
encrypt the traffic with long keys.

Curtis
--
Curtis Maurand
mailto:[EMAIL PROTECTED]
http://www.maurand.com
On Sun, 20 Jun 2004, Hannigan, Martin wrote:


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
Sean Donelan
Sent: Saturday, June 19, 2004 10:25 PM
To: Cade,Marilyn S - LGCRP
Cc: Steven M. Bellovin; Jim Dempsey (E-mail); North American Noise and
Off-topic Gripes
Subject: RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

On Sat, 19 Jun 2004, Cade,Marilyn S - LGCRP wrote:
[SNIP]

A SPAN port could satisfy an ISP's obligations under
TitleIII/ECPA, but
not satisfy CALEA.

What is required is TCAP information and bearer traffic. Typically
delivered off the switch back to the LEA collector via a DS0. The
TCAP information can be delivered in a multitude of ways.


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-20 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Sean Donelan 
writes:
On Sat, 19 Jun 2004, Steven M. Bellovin wrote:
 There's a lot more to it than that -- there's also access without
 involving telco personnel, and possibly the ability to do many more
 wiretaps (have you looked at the capacity requirements lately), but
 funding is certainly a large part of it.  From Section (e) of
 http://www4.law.cornell.edu/uscode/18/2518.html :

  Any provider of wire or electronic communication service,
  landlord, custodian or other person furnishing such facilities
  or technical assistance shall be compensated therefor by the
  applicant for reasonable expenses incurred in providing such
  facilities or assistance.

That is not part of CALEA.

I know; that's precisely my point.  (CALEA is 18 USC 2522, I believe.)  
The passage I quoted is from the older wiretap law -- and it requires 
the government to pick up the costs.  As you note below, that cost was 
shifted by CALEA.

Carriers found to be covered by CALEA must provide certain capabilities
to law enforcement.  For telecommunication equipment, facilities or
services deployed after January 1 1995 the carrier must pay all reasonable
costs to provide the capabilities.

The capacity requirements are interesting.  In some cases, the carrier is
required to have more law enforcement tapping capacity than customer
capacity.  The government sets the capacit requirements without any
regard for the cost of maintaining the capacity.  If there are multiple
competitive carriers in the same area, all of the carriers must have the
same capacity. If you have a single customer in Los Angeles, you must
provide the capacity for at least 1,360 simultaneous interceptions.  How
many SPAN ports do you have?

As I mentioned, the wiretap acts and CALEA are really independent.



--Steve Bellovin, http://www.research.att.com/~smb




RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-20 Thread Hannigan, Martin




 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
 Sean Donelan
 Sent: Saturday, June 19, 2004 10:25 PM
 To: Cade,Marilyn S - LGCRP
 Cc: Steven M. Bellovin; Jim Dempsey (E-mail); North American Noise and
 Off-topic Gripes
 Subject: RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists] 
 
 
 
 On Sat, 19 Jun 2004, Cade,Marilyn S - LGCRP wrote:

[SNIP]


 
 A SPAN port could satisfy an ISP's obligations under 
 TitleIII/ECPA, but
 not satisfy CALEA.


What is required is TCAP information and bearer traffic. Typically
delivered off the switch back to the LEA collector via a DS0. The
TCAP information can be delivered in a multitude of ways. 


Broadband? Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Stephen J. Wilcox

On Fri, 18 Jun 2004, Michael Painter wrote:

 A coupla' years ago, the FCC defined Broadband as 200Kbps and above.

Hmm different jurisdiction but Tiscali  NTL seems to think broadband is as low 
as 100Kbps

http://www.tiscali.co.uk/products/broadband/3xfaster.html?code=ZZ-NL-11MR
http://www.ntlhome.co.uk/ntl_internet/broadband.asp?cust=ntlcom_broadbandtextlink

Wrongful trading or say what you like if you make it up as you go along.. ?

Steve



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Sean Donela
n writes:

In reality, CALEA is a funding bill; it has very little to do with
technology. 

There's a lot more to it than that -- there's also access without 
involving telco personnel, and possibly the ability to do many more 
wiretaps (have you looked at the capacity requirements lately), but 
funding is certainly a large part of it.  From Section (e) of
http://www4.law.cornell.edu/uscode/18/2518.html :

Any provider of wire or electronic communication service,
landlord, custodian or other person furnishing such facilities
or technical assistance shall be compensated therefor by the
applicant for reasonable expenses incurred in providing such
facilities or assistance. 


--Steve Bellovin, http://www.research.att.com/~smb




Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread David Lesher

Speaking on Deep Background, the Press Secretary whispered:
 
 
   Any provider of wire or electronic communication service,
   landlord, custodian or other person furnishing such facilities
   or technical assistance shall be compensated therefor by the
   applicant for reasonable expenses incurred in providing such
   facilities or assistance. 
 
 
   --Steve Bellovin, http://www.research.att.com/~smb

The issue, I suspect, is, who defines reasonable here? Is it
like Blue Cross who decides that UCR is 50% of what every MD
charges, and refuses to justify their decision?

I suspect some here have already been there, done that...

Then there is the issue of getting paid in a timely manner,
Prompt Payment Act or not.


-- 
A host is a host from coast to [EMAIL PROTECTED]
 no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Sean Donelan

On Sat, 19 Jun 2004, Steven M. Bellovin wrote:
 There's a lot more to it than that -- there's also access without
 involving telco personnel, and possibly the ability to do many more
 wiretaps (have you looked at the capacity requirements lately), but
 funding is certainly a large part of it.  From Section (e) of
 http://www4.law.cornell.edu/uscode/18/2518.html :

   Any provider of wire or electronic communication service,
   landlord, custodian or other person furnishing such facilities
   or technical assistance shall be compensated therefor by the
   applicant for reasonable expenses incurred in providing such
   facilities or assistance.

That is not part of CALEA.

Carriers found to be covered by CALEA must provide certain capabilities
to law enforcement.  For telecommunication equipment, facilities or
services deployed after January 1 1995 the carrier must pay all reasonable
costs to provide the capabilities.

The capacity requirements are interesting.  In some cases, the carrier is
required to have more law enforcement tapping capacity than customer
capacity.  The government sets the capacit requirements without any
regard for the cost of maintaining the capacity.  If there are multiple
competitive carriers in the same area, all of the carriers must have the
same capacity. If you have a single customer in Los Angeles, you must
provide the capacity for at least 1,360 simultaneous interceptions.  How
many SPAN ports do you have?

As I mentioned, the wiretap acts and CALEA are really independent.


RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Hannigan, Martin



It's not just a funding bill. It provided $500MM for carrier network
upgrades and for switch software compliance. That fund has been exhausted
from what I have been told. It also clearly defined technical expectations
that carriers and manufacturers have to live up to.

All that being CALEA compliant means is that you are capable, as required, 
to provide service to a legal order i.e. pin register, trap, trace, DTMF
extration, flash hook operations ala three way calling, CALLER ID, and 
voice intercept. There's no secret sauce to CALEA. 

CALEA doesn't expand LEA's authority, it puts them on an even 
playing field with suspected criminals with regards to access.

-M


--
Martin Hannigan (c) 617-388-2663
VeriSign, Inc.  (w) 703-948-7018
Network Engineer IV   Operations  Infrastructure
[EMAIL PROTECTED]



 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
 Sean Donelan
 Sent: Saturday, June 19, 2004 1:49 AM
 To: Stephen Sprunk
 Cc: North American Noise and Off-topic Gripes
 Subject: Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]
 
 
 
 On Fri, 18 Jun 2004, Stephen Sprunk wrote:
  I'm told that most CALEA warrants only authorize a pen 
 register, not an
 
 CALEA and wiretaps are independent subjects.  You can have CALEA
 obligations even if you never, ever implement a single wiretap. On
 the other hand you may need to implement many wiretaps even though
 you have no CALEA obligations.
 
 For example, hotels and universities have traditionally been 
 considered
 not to have CALEA obligations.  However, both hotels and 
 universities must
 comply with court orders if law enforcement wants to wiretap 
 one of their
 phones.  Should CALEA be extended to hotels and universities? 
  Are hotels
 and universities broadband Internet providers when they offer Internet
 service in student dorm rooms or hotel rooms?
 
 In reality, CALEA is a funding bill; it has very little to do with
 technology.  Imagine if law enforcement thought DNA testing was too
 expensive, so Congress passes a law requiring all doctors to purchase
 DNA testing equipment and provide free DNA tests to law enforcement.
 DNA is a complicated subject.  Few police officers are qualified to
 analyze DNA. Instead law enforcement pays for professional DNA testing
 when it needs DNA testing.
 
 The FCC comment period has closed.  Everyone had an 
 opportunity to submit
 comments on the topic to the FCC.
 
 Consult your own attorney if you want real legal advice.
 


RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Hannigan, Martin



Sean, the capacity requirements aren't as straightforward as you
are interpreting them. 

If you are a CLEC and you cover a full five state
area in the Northeast, you probably are subject to a county aggregate
of a capacity requirement of 1500. You would then look at your
historicals, refer to the Federal Register for the actual maximum,
and adjust your capacity as required to meet your own historicals 
and averages -- that also should take into consideration other 
RBOCs/CLECs operating in the same five state region as the orders
will more than likely be broken out by access line % per carrier 
unless a single carrier dominates in a traditionally active area.

In New York City and Los Angeles, the two most active areas, there was
a mean average of .035 active electronic/oral intercepts per day.

It's complicated, but noone is subject to a straight 1200+ capacity
required. There were 1,442 NON FISA oral and electronic intercepts in
the entire United States last year.[2]

I have the Federal Register Notice if you want a copy. Let me know.


[1] Federal Register Volume 63, No. 48 - March 12, 1998 NOTICE 12231
[2] 30 APR 2004 Press Release, Admin office of US Courts 

-M







--
Martin Hannigan (c) 617-388-2663
VeriSign, Inc.  (w) 703-948-7018
Network Engineer IV   Operations  Infrastructure
[EMAIL PROTECTED]



 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
 Sean Donelan
 Sent: Saturday, June 19, 2004 4:24 PM
 To: Steven M. Bellovin
 Cc: North American Noise and Off-topic Gripes
 Subject: Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists] 
 
 
 
 On Sat, 19 Jun 2004, Steven M. Bellovin wrote:
  There's a lot more to it than that -- there's also access without
  involving telco personnel, and possibly the ability to do many more
  wiretaps (have you looked at the capacity requirements lately), but
  funding is certainly a large part of it.  From Section (e) of
  http://www4.law.cornell.edu/uscode/18/2518.html :
 
  Any provider of wire or electronic communication service,
  landlord, custodian or other person furnishing such facilities
  or technical assistance shall be compensated therefor by the
  applicant for reasonable expenses incurred in providing such
  facilities or assistance.
 
 That is not part of CALEA.
 
 Carriers found to be covered by CALEA must provide certain 
 capabilities
 to law enforcement.  For telecommunication equipment, facilities or
 services deployed after January 1 1995 the carrier must pay 
 all reasonable
 costs to provide the capabilities.
 
 The capacity requirements are interesting.  In some cases, 
 the carrier is
 required to have more law enforcement tapping capacity than customer
 capacity.  The government sets the capacit requirements without any
 regard for the cost of maintaining the capacity.  If there 
 are multiple
 competitive carriers in the same area, all of the carriers 
 must have the
 same capacity. If you have a single customer in Los Angeles, you must
 provide the capacity for at least 1,360 simultaneous 
 interceptions.  How
 many SPAN ports do you have?
 
 As I mentioned, the wiretap acts and CALEA are really independent.
 


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Niels Bakker

* [EMAIL PROTECTED] (Jeff Shultz) [Fri 18 Jun 2004, 21:42 CEST]:
 Pay for it? If I remember from CALEA, the providers pay for it
 (and eventually their customers), and as for broadband Internet
 providers... I'm guessing anyone who offers end user customers
 a circuit bigger than 53.333k. 

Pet peeve: broadband isn't a synonym for faster than a modem.
Cable and DSL are broadband due to those technologies using a wide range
of frequencies.  Ethernet is not broadband (but baseband).


-- Niels.


Re: Broadband? Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Suresh Ramasubramanian

Stephen J. Wilcox [19/06/04 16:38 +0100]:
 
 On Fri, 18 Jun 2004, Michael Painter wrote:
 
  A coupla' years ago, the FCC defined Broadband as 200Kbps and above.
 
 Hmm different jurisdiction but Tiscali  NTL seems to think broadband is as
 low  as 100Kbps

In India, it is anywhere over 64 Kbps, and the maximum offered over cable /
dsl is currently 512 Kbps.

And of course, anything below several Mbps (or 100 Mbps in the case of FTTH)
is definitely not broadband in Japan :)

srs


RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Sean Donelan

On Sat, 19 Jun 2004, Hannigan, Martin wrote:
 Sean, the capacity requirements aren't as straightforward as you
 are interpreting them.

You are absolutely correct, they are not that straightforward.  You
should consult a telecommunications attorney with expertise in this area
for legal advice.

 If you are a CLEC and you cover a full five state
 area in the Northeast, you probably are subject to a county aggregate
 of a capacity requirement of 1500.

No.  The FBI is very clear, if you are a CLEC and cover a full five state
area in the Northeast, you are subject to the CUMULATIVE capacity require
for every county in those five states.

See the www.askcalea.com web site for full details.

 You would then look at your
 historicals, refer to the Federal Register for the actual maximum,
 and adjust your capacity as required to meet your own historicals
 and averages -- that also should take into consideration other
 RBOCs/CLECs operating in the same five state region as the orders
 will more than likely be broken out by access line % per carrier
 unless a single carrier dominates in a traditionally active area.

Although this was suggested by commentators, the FBI explicitely rejected
that.  The theory was the Mafia would then buy phone service from some
smaller carrier without enough capacity to monitor all their calls.

   Individual carriers must provide sufficient capacity so that law
   enforcement has the ability to simultaneously conduct any number of
   call content interceptions, pen registers, and trap and trace devices,
   not to exceed the estimated actual and maximum requirements (which are
   based on historical interception activity) at any location within a
   county.
Appendix A of the Final Notice of Capacity (63 Fed Reg 12217,
12238)

However, there is an exception, no single switch is required to support
more than 386 simultaneous pen registers and trap and trace devices or
75 simultaneous call content interceptions.  What is a switch?

http://www.askcalea.com/docs/capsecg.pdf

Individual carriers can take the legal gamble and use other network
deployment strtegies, such as making assumptions of how many pen
registers, trap and trace and intercepts will occur on their network
versus a competitors network.  Assume 95% of the court orders will go
to your competitors, so you only need to provide 5% of the capacity
in the county. But you can't escape the penalties by depending on your
competitor's capacity.

   The obligation to satisfy the capacity requirements in a
   cost-effective andreasonable manner is the responsibility
   of all carriers that operate within a given geographic area.

How often do you see all the competitors in an industry sit down in a
room and decide how they will divide up the costs and establish pricing?


 It's complicated, but noone is subject to a straight 1200+ capacity
 required. There were 1,442 NON FISA oral and electronic intercepts in
 the entire United States last year.[2]

Actually, they are expected to provide far more than that.  As you know,
the Wiretap report does not include pen registers.  There is no public
source for the number of pen registers in the US, but some industry
sources estimate it at 70,000 to 75,000 per year.



RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Hannigan, Martin




 -Original Message-
 From: Sean Donelan [mailto:[EMAIL PROTECTED]
 Sent: Saturday, June 19, 2004 8:39 PM
 To: Hannigan, Martin
 Cc: North American Noise and Off-topic Gripes
 Subject: RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists] 
 
 
 On Sat, 19 Jun 2004, Hannigan, Martin wrote:
  Sean, the capacity requirements aren't as straightforward as you
  are interpreting them.
 
 You are absolutely correct, they are not that straightforward.  You
 should consult a telecommunications attorney with expertise 
 in this area
 for legal advice.


It's a law that has technical requirements co mingled so 
you need both lawyers and engineers. 


  If you are a CLEC and you cover a full five state
  area in the Northeast, you probably are subject to a county 
 aggregate
  of a capacity requirement of 1500.
 
 No.  The FBI is very clear, if you are a CLEC and cover a 
 full five state
 area in the Northeast, you are subject to the CUMULATIVE 
 capacity require
 for every county in those five states.
 
 See the www.askcalea.com web site for full details.

I have. And I continue to disagree. 

[snip] 

Individual carriers must provide sufficient capacity so that law
enforcement has the ability to simultaneously conduct any number of
call content interceptions, pen registers, and trap and 
 trace devices,
not to exceed the estimated actual and maximum 
 requirements (which are
based on historical interception activity) at any location within a
county.
   Appendix A of the Final Notice of Capacity (63 Fed Reg 12217,
   12238)


Which is what I defined. Sufficient capacity with capability to increase
if needed.

 
 However, there is an exception, no single switch is required 
 to support
 more than 386 simultaneous pen registers and trap and trace devices or
 75 simultaneous call content interceptions.  What is a switch?

That's what the federal register notice I pointed you at said. And in 
come cases, a single switch can carry a five state area. Softswitch 
comes to mind.

 
 http://www.askcalea.com/docs/capsecg.pdf
 
 Individual carriers can take the legal gamble and use other network
 deployment strtegies, such as making assumptions of how many pen
 registers, trap and trace and intercepts will occur on their network
 versus a competitors network.  Assume 95% of the court orders will go
 to your competitors, so you only need to provide 5% of the capacity
 in the county. But you can't escape the penalties by depending on your
 competitor's capacity.

You can't service a competitors legal orders so I'm not sure
what you're getting at.

You're almost saying every carrier should have one DS0 for every 
single dialup user.

 
The obligation to satisfy the capacity requirements in a
cost-effective andreasonable manner is the responsibility
of all carriers that operate within a given geographic area.
 
 How often do you see all the competitors in an industry sit down in a
 room and decide how they will divide up the costs and 
 establish pricing?

What has pricing intercepts have to do with concurrent intercepts? CLECS
are not going to make money servicing legal orders. I doubt RBOCS make
money doing it either. 

  It's complicated, but noone is subject to a straight 1200+ capacity
  required. There were 1,442 NON FISA oral and electronic 
 intercepts in
  the entire United States last year.[2]
 
 Actually, they are expected to provide far more than that.  

They're expected to have the capability. So let me rephrase. They
are subject. The actual and historic are relevant.

 As you know,
 the Wiretap report does not include pen registers.  There is no public
 source for the number of pen registers in the US, but some industry
 sources estimate it at 70,000 to 75,000 per year.

I'll check on the pen-register comment. 

You keep saying talk to a lawyer, but quoting legalese. Are you an attorney?
Not being smarmy. Just curious.

Hypothetical.

How many bankrupt CLEC's do you expect to see this year complying
with CALEA and providing, as an example, a fully loaded 1200 concurrent
session infrastructure in a  100 a year historically survielled area? 


N0TE: I am speaking from experience on the LEC side, nowhere else.



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Stephen Sprunk

Thus spake Niels Bakker [EMAIL PROTECTED]
 * [EMAIL PROTECTED] (Jeff Shultz) [Fri 18 Jun 2004, 21:42 CEST]:
  Pay for it? If I remember from CALEA, the providers pay for it
  (and eventually their customers), and as for broadband Internet
  providers... I'm guessing anyone who offers end user customers
  a circuit bigger than 53.333k.

 Pet peeve: broadband isn't a synonym for faster than a modem.
 Cable and DSL are broadband due to those technologies using a wide range
 of frequencies.  Ethernet is not broadband (but baseband).

Congress can define a word (in the US legal context) to mean anything they
want; whether such has any relation to its technical definition is
irrelevant.  I doubt they care about the technology used to deliver IP
service, only the capabilities and typical users; defining broadband as
any circuit 56kbps or above would likely suffice for their intent,
regardless of how incorrect it is.

However, I fail to see how broadband or link speeds in general even matter
in this context; what matters is whether the link is of sufficient speed for
VoIP to be feasible, in which case anything from 9.6kbps cellular to WiFi,
from ARCnet to OC192/10GE might qualify -- or might not, if IP isn't running
over it.

S

Stephen Sprunk  Those people who think they know everything
CCIE #3723 are a great annoyance to those of us who do.
K5SSS --Isaac Asimov



RE: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Sean Donelan

On Sat, 19 Jun 2004, Cade,Marilyn S - LGCRP wrote:
 Jim  Dempsey's testimony at Senator Sununu's hearing is very
 interesting, and very educational on these issues.

 CALEA was not written for the IP world.

When CALEA was being written, the Internet, IP and information services
were all debated.

 But, the facts are that IP service providers comply with law
 enforcement's requests. IF more legal vehicles are needed, beyond what
 law enforcement has today, then Congress should make that determination.

CALEA doesn't reduce law enforcement's wiretap authority or the
obligation for carriers to provide technical assistance under Title
III or ECPA or other statutes. Law enforcement has been conducting
wiretaps for decades prior to the passage of CALEA.  Law enforcement
has been using Title III and ECPA to tap e-mail, internet communications,
pagers, etc for years.  The FBI even demostrated its Canivore DSC1000
box at NANOG in Washington DC a few years ago.

A SPAN port could satisfy an ISP's obligations under TitleIII/ECPA, but
not satisfy CALEA.


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread wrolf . courtney





I wish I wish I wish that the murdering $*#1! would spend their time
messing with @#*@###! VoIP rather than anything else.



   
 Suresh
 Ramasubramanian   
 [EMAIL PROTECTED]  To 
 com  nanog [EMAIL PROTECTED] 
 Sent by:   cc 
 [EMAIL PROTECTED] 
 .edu  Subject 
   [Fwd: [IP] Feds: VoIP a potential   
   haven for terrorists]   
 06/18/2004 09:18  
 AM
   
   
   
   





 Original Message 
Subject: [IP] Feds: VoIP a potential haven for terrorists
Date: Fri, 18 Jun 2004 09:10:19 -0400
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: Ip [EMAIL PROTECTED]


 --
 This story was printed from ZDNN,
 located at http://www.zdnn.com.
 --



Feds: VoIP a potential haven for terrorists
By  Declan McCullagh
CNET News.com
June 16, 2004, 10:54 AM PT
URL: http://zdnet.com.com/2100-1105-5236233.html

WASHINGTON--The U.S. Department of Justice on Wednesday lashed out at
Internet telephony, saying the fast-growing technology could foster
drug trafficking, organized crime and terrorism.

Laura Parsky, a deputy assistant attorney general in the Justice
Department, told a Senate panel that law enforcement bodies are deeply
worried about their ability to wiretap conversations that use voice
over Internet Protocol (VoIP) services.


I am here to underscore how very important it is that this type of
telephone service not become a haven for criminals, terrorists and
spies, Parsky said. Access to telephone service, regardless of how it
is transmitted, is a highly valuable law enforcement tool.


Police been able to conduct Internet wiretaps for at least a decade,
and the FBI's controversial Carnivore (also called DCS1000) system was
designed to facilitate online surveillance. But Parsky said that
discerning what the specific (VoIP) protocols are and how law
enforcement can extract just the specific information are difficult
problems that could be solved by Congress requiring all VoIP providers
to build in backdoors for police surveillance.


The Bush administration's request was met with some skepticism from
members of the Senate Commerce committee, who suggested that it was too
soon to impose such weighty regulations on the fledgling VoIP industry.
Such rules already apply to old-fashioned telephone networks, thanks to
a 1994 law called the Communications Assistance for Law Enforcement Act
(CALEA).


What you need to do is convince us first on a bipartisan basis that
there's a problem here, said Sen. Ron Wyden, D-Ore. I would like to
hear specific examples of what you can't do now and where the law falls
short. You're looking now for a remedy for a problem that has not been
documented.


Wednesday's hearing was the first to focus on a bill called the VoIP
Regulatory Freedom Act, sponsored by Sen. John Sununu, R-N.H. It would
ban state governments from regulating or taxing VoIP connections. It
also says that VoIP companies that connect to the public telephone
network may be required to follow CALEA rules, which would make it
easier for agencies to wiretap such phone calls.


The Justice Department's objection to the bill is twofold: Its wording
leaves too much discretion with the Federal Communications Commission,
Parsky argued, and it does not impose wiretapping requirements on
Internet-only VoIP networks that do not touch the existing phone
network, such as Pulver.com's Free World Dialup.


It is even more critical today than (when CALEA was enacted in 1994)
that advances in communications technology not provide a haven for
criminal activity and an undetectable means of death and destruction,
Parsky said.


Sen. Frank Lautenberg, D-N.J., wondered if it was too early to order
VoIP firms to be wiretap-friendly by extending CALEA's rules. Are we
premature in trying to tie all of this down? he asked. The technology
shift is so rapid and so vast.


The Senate's action comes as the FCC 

Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Jeff Shultz

** Reply to message from Scott Weeks [EMAIL PROTECTED] on Fri,
18 Jun 2004 09:30:03 -1000 (HST)

 On Fri, 18 Jun 2004, Suresh Ramasubramanian wrote:
 
 : Feds: VoIP a potential haven for terrorists
 : By  Declan McCullagh
 
 : The Senate's action comes as the FCC considers a request submitted in
 : March by the FBI. If the request is approved, all broadband Internet
 : providers--including companies using cable and digital subscriber line
 : technology--will be required to rewire their networks to support easy
 : wiretapping by police.
 
 
 Anyone know yet if they've they said who would have to pay for it, and
 what they specifically mean by broadband Internet providers?
 
 scott

Pay for it? If I remember from CALEA, the providers pay for it (and
eventually their customers), and as for broadband Internet
providers... I'm guessing anyone who offers end user customers a
circuit bigger than 53.333k. 

I admit to having some sympathy for the FBI... they're in the middle of
getting ripped up, down and sideways over failures over Sept 11 and
other things, and yet when they ask for more surveilance capabilities,
they get ripped up, down and sideways for asking...

-- 
Jeff Shultz
A railfan pulls up to a RR crossing hoping that
there will be a train. 



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Daniel Golding

On 6/18/04 3:30 PM, Scott Weeks [EMAIL PROTECTED] wrote:

 
 
{snip}
 
 
 Anyone know yet if they've they said who would have to pay for it, and
 what they specifically mean by broadband Internet providers?
 
 scott
 
 

Well, that's the issue, now isn't it. It all comes down to money and
control.

There are three schools of thought here.

One is that the VoIP should not be wiretapped at all. This seems a little
unrealistic considering that we allow other calls to be tapped. The second
school is that VoIP calls should be made no easier or harder to tap than the
technology itself warrants through its natural evolution. The FBI or
whomever would just have to learn how to work with it as it evolves. The
third school of thought is that all VoIP boxes should come with a red rj45
that says FBI use only and a big red button to start the data flowing to
said jack. 

Pickering and the FBI are asking for the third option. Some technologists
and civil libertarians seem to be advocating the first option. These might
be negotiating tactics rather than honest positions - welcome to Washington.

The amount of money the FBI would need to spend to tap a VoIP call is
highest with the first option, intermediate with the second, and lowest with
the last. Some services companies are really salivating for the chance to
add CALEA hardware to VoIP networks. I won't mention any particular
companies here, as they have taken a recent beating on this list. Piling on
seems rather cruel.

The second option is probably the most sensible. We'll see how far sensible
gets in the halls of Congress. I suggest crossing fingers, now.
 
-- 
Daniel Golding
Network and Telecommunications Strategies
Burton Group




Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Daniel Golding

On 6/18/04 3:41 PM, Jeff Shultz [EMAIL PROTECTED] wrote:

 
 
 I admit to having some sympathy for the FBI... they're in the middle of
 getting ripped up, down and sideways over failures over Sept 11 and
 other things, and yet when they ask for more surveilance capabilities,
 they get ripped up, down and sideways for asking...

Not to get too off-topic here, but the FBI may be better served by investing
in Human Intelligence. Plugging wires into operational networks is pretty
cool, but turning a guy on one end of that VoIP call is more useful.

We now return to our regularly scheduled comparisons of Best Effort Internet
Services to Boxes of Chocolate or whatever today's lively conversation
happens to be.

-- 
Daniel Golding
Network and Telecommunications Strategies
Burton Group




Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread John Curran

At 3:44 PM -0400 6/18/04, Daniel Golding wrote:

There are three schools of thought here.

One is that the VoIP should not be wiretapped at all. This seems a little
unrealistic considering that we allow other calls to be tapped. The second
school is that VoIP calls should be made no easier or harder to tap than the
technology itself warrants through its natural evolution. The FBI or
whomever would just have to learn how to work with it as it evolves. The
third school of thought is that all VoIP boxes should come with a red rj45
that says FBI use only and a big red button to start the data flowing to
said jack.

There another axis of the conversation going on, and that is with
respect to the scope of voice technologies that require support...
One camp believes that all voice communication must provide
CALEA and the other believes that just those voice services which
provide interconnection to/from the PSTN should need compliance.
The latter position is far easier to implement and corresponds to
today's capabilities.  Under the more generous definition of any
voice communication, there's a huge realm of possible applications
that might need to be intercepted including IM services, Skype,
web chat support protocols, and even audio-enabled chats that
are embedded in games.

Someone's going to make a killing in stateful packet detection at
the metro POP level...

/John


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Randy Bush

 I admit to having some sympathy for the FBI... they're in the middle of
 getting ripped up, down and sideways over failures over Sept 11 and
 other things,

yep.  try http://www.caedefensefund.org/overview.html



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Stephen Sprunk

Thus spake Daniel Golding [EMAIL PROTECTED]
 The amount of money the FBI would need to spend to tap a VoIP call is
 highest with the first option, intermediate with the second, and lowest
with
 the last. Some services companies are really salivating for the chance to
 add CALEA hardware to VoIP networks. I won't mention any particular
 companies here, as they have taken a recent beating on this list. Piling
on
 seems rather cruel.

I'm told that most CALEA warrants only authorize a pen register, not an
actual tap.  Pen registers are trivial to implement, since the provider's
software undoubtedly has an option to produce CDRs for billing or planning
purposes.  Unfortunately this doesn't cover the case of purely P2P calls
which don't have a VoIP provider; if the suspect is using such software, the
only way to produce a pen register is with a tap.

AFAIK, one of the provisions of CALEA warrants is that the provider can't
tell the customer their line is being tapped.  The most straightforward VoIP
intercept method requires routing the call through an intercept device or
bridging unit, which is detectable and hus probably counts as disclosure.
Since VoIP packets are routed just like any others, the only workable
solution I see is to provide for tapping of all IP links and (by law)
require the FBI drop all traffic except what they've got a warrant for.

Tapping a SONET or Ethernet link isn't tough, and real-time decoding of
packets up to OC12 speeds was doable on COTS PCs several years ago.  One US
telco built such software specifically to comply with CALEA when the FBI
inevitably woke up; it could reassemble selected RTP streams (in real time)
and even play them on a POTS line running to an FBI monitoring post.  I'd
assume that OC48/GE isn't much of a stretch today and that OC192/10GE is
feasible with the FBI's funding levels.  It'd certainly be easier to tap the
customer's access line, but typical DSL/Cable gear may not have such
provisions...

One thing is very clear, however; if the industry doesn't come up with a
working solution first, we will certainly have something unworkable shoved
down our throats by Congress, the FCC, and the FBI.

S

Stephen Sprunk  Those people who think they know everything
CCIE #3723 are a great annoyance to those of us who do.
K5SSS --Isaac Asimov



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Jeff Shultz

** Reply to message from Randy Bush [EMAIL PROTECTED] on Fri, 18 Jun 2004
14:30:13 -0700

  I admit to having some sympathy for the FBI... they're in the middle of
  getting ripped up, down and sideways over failures over Sept 11 and
  other things,
 
 yep.  try http://www.caedefensefund.org/overview.html

Hmmm, but they aren't biased, are they? Any cites that aren't from the
defendants? I'm not saying they aren't right, but that does appear a
bit one-sided.

-- 
Jeff Shultz
A railfan pulls up to a RR crossing hoping that
there will be a train. 



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Randy Bush

 try http://www.caedefensefund.org/overview.html
 Hmmm, but they aren't biased, are they?

everything is biased one way or the other in this world.
i also searched the ny times.  not a pretty looking state
of affairs.

randy



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Christopher L. Morrow


On Fri, 18 Jun 2004, Stephen Sprunk wrote:

 Tapping a SONET or Ethernet link isn't tough, and real-time decoding of
 packets up to OC12 speeds was doable on COTS PCs several years ago.  One US
 telco built such software specifically to comply with CALEA when the FBI
 inevitably woke up; it could reassemble selected RTP streams (in real time)
 and even play them on a POTS line running to an FBI monitoring post.  I'd
 assume that OC48/GE isn't much of a stretch today and that OC192/10GE is
 feasible with the FBI's funding levels.  It'd certainly be easier to tap the
 customer's access line, but typical DSL/Cable gear may not have such
 provisions...

The real trouble with this scenario is the required truck roll and outage
on the link toward the customer... This gets expensive if you have to roll
to 10-20/month all over your domestic network. Today that is accomplished
on the phone side with builtin 'stuff' on the phone switches (as I recall
being told by some phone people) without a truck roll and without much
hassle. :(

Figuring out the difference between all the forms of 'VOIP' communications
will be a headache for the govies and lawyers... just look at the minor
inconveniences of CARNIVORE, eh?


 One thing is very clear, however; if the industry doesn't come up with a
 working solution first, we will certainly have something unworkable shoved
 down our throats by Congress, the FCC, and the FBI.


Sure, but to date we are still awaiting good/complete requirements from
the gov't so it's a little tough to determine what is 'required' in a
solution such that data can be tapped and then appear in court in some
form which is unimpeachable.

-Chris


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Rob Nelson
 One thing is very clear, however; if the industry doesn't come up with a
 working solution first, we will certainly have something unworkable shoved
 down our throats by Congress, the FCC, and the FBI.
On the other hand, since you'll have to wait for 10 years in line behind 
all the other broadband service providers that the FBI would be arresting 
for non-compliance, you might not have to worry about it. Or you could wait 
for all the court cases that go first claiming that Voice Chat on IM is not 
related to VoIP. Perhaps we'll even get to see a court case where a 
President has phone sex on a VoIP line ;)

Rob Nelson
[EMAIL PROTECTED]


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Stephen Sprunk

Thus spake Christopher L. Morrow [EMAIL PROTECTED]
 On Fri, 18 Jun 2004, Stephen Sprunk wrote:
  Tapping a SONET or Ethernet link isn't tough, and real-time decoding of
  packets up to OC12 speeds was doable on COTS PCs several years ago.  One
US
  telco built such software specifically to comply with CALEA when the FBI
  inevitably woke up; it could reassemble selected RTP streams (in real
time)
  and even play them on a POTS line running to an FBI monitoring post.
I'd
  assume that OC48/GE isn't much of a stretch today and that OC192/10GE is
  feasible with the FBI's funding levels.  It'd certainly be easier to tap
the
  customer's access line, but typical DSL/Cable gear may not have such
  provisions...

 The real trouble with this scenario is the required truck roll and outage
 on the link toward the customer... This gets expensive if you have to roll
 to 10-20/month all over your domestic network. Today that is accomplished
 on the phone side with builtin 'stuff' on the phone switches (as I recall
 being told by some phone people) without a truck roll and without much
 hassle. :(

That built-in stuff is possible with IP gear as well; the switches in your
remote POP should support port mirroring, and many sniffers have the ability
to filter and forward collected data in real time to another site for
analysis.  It's a pretty crude way of doing it, but it eliminates a truck
roll if that's your priority, and there's no outage.

Tapping entire SONET or Tx circuits is also possible without an outage, but
you need to have a couple loops (of the correct size) somewhere to point the
tap at and specialized software to extract the packets.

 Figuring out the difference between all the forms of 'VOIP' communications
 will be a headache for the govies and lawyers... just look at the minor
 inconveniences of CARNIVORE, eh?

It'll get even more interesting when VoIP carriers roll out encryption for
signalling and media; pen registers will still be possible, but a tap will
be completely useless.

  One thing is very clear, however; if the industry doesn't come up with a
  working solution first, we will certainly have something unworkable
shoved
  down our throats by Congress, the FCC, and the FBI.

 Sure, but to date we are still awaiting good/complete requirements from
 the gov't so it's a little tough to determine what is 'required' in a
 solution such that data can be tapped and then appear in court in some
 form which is unimpeachable.

Congress is going down the route of legislating implementation instead of
legislating the requirements and leaving it to the FCC or industry to find
possible implementations.  Unfortunately the industry is collectively
sticking their heads in the sand, and the FCC is loathe to comment on
anything they don't have the authority to regulate.  Without input to
counter the FBI, how is Congress supposed to pass anything reasonable?  As
they say, the road to hell is paved with good intentions.

S

Stephen Sprunk  Those people who think they know everything
CCIE #3723 are a great annoyance to those of us who do.
K5SSS --Isaac Asimov



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Scott Francis
On Fri, Jun 18, 2004 at 12:41:45PM -0700, [EMAIL PROTECTED] said:
 
 ** Reply to message from Scott Weeks [EMAIL PROTECTED] on Fri,
 18 Jun 2004 09:30:03 -1000 (HST)
 
  On Fri, 18 Jun 2004, Suresh Ramasubramanian wrote:
  
  : Feds: VoIP a potential haven for terrorists
  : By  Declan McCullagh
  
  : The Senate's action comes as the FCC considers a request submitted in
  : March by the FBI. If the request is approved, all broadband Internet
  : providers--including companies using cable and digital subscriber line
  : technology--will be required to rewire their networks to support easy
  : wiretapping by police.
  
  
  Anyone know yet if they've they said who would have to pay for it, and
  what they specifically mean by broadband Internet providers?
  
  scott
 
 Pay for it? If I remember from CALEA, the providers pay for it (and
 eventually their customers), and as for broadband Internet
 providers... I'm guessing anyone who offers end user customers a
 circuit bigger than 53.333k. 
 
 I admit to having some sympathy for the FBI... they're in the middle of
 getting ripped up, down and sideways over failures over Sept 11 and
 other things, and yet when they ask for more surveilance capabilities,
 they get ripped up, down and sideways for asking...

they don't need more surveillance capabilities as much as they need to better
utilize what they've already got. More laws aren't the answer to lack of
success enforcing what's already on the books.
-- 
   Scott Francis | darkuncle(at)darkuncle(dot)net | 0x5537F527
The ultimate result of shielding men from the effects of folly is to fill
the world with fools. -- Herbert Spencer


pgpZmINqGkGnz.pgp
Description: PGP signature


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Randy Bush

 they don't need more surveillance capabilities as much as they need to
 better utilize what they've already got. More laws aren't the answer to
 lack of success enforcing what's already on the books.

We should not be building surveillance technology into standards.  Law
enforcement was not supposed to be easy.  Where it is easy, it's called
a police state.  -- Jeff Schiller



Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread David Lesher

Speaking on Deep Background, the Press Secretary whispered:
 
 
 I'm told that most CALEA warrants only authorize a pen register, not an
 actual tap.  Pen registers are trivial to implement, since the provider's
 software undoubtedly has an option to produce CDRs for billing or planning
 purposes.  Unfortunately this doesn't cover the case of purely P2P calls
 which don't have a VoIP provider; if the suspect is using such software, the
 only way to produce a pen register is with a tap.

Note that the requirements for a trap/trace aka pen register are
a fraction of those for a Title III intercept.

See http://www.usenix.org/events/sec01/eckenwiler/index.htm for
at least an introduction..







-- 
A host is a host from coast to [EMAIL PROTECTED]
 no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433


Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-18 Thread Sean Donelan

On Fri, 18 Jun 2004, Stephen Sprunk wrote:
 I'm told that most CALEA warrants only authorize a pen register, not an

CALEA and wiretaps are independent subjects.  You can have CALEA
obligations even if you never, ever implement a single wiretap. On
the other hand you may need to implement many wiretaps even though
you have no CALEA obligations.

For example, hotels and universities have traditionally been considered
not to have CALEA obligations.  However, both hotels and universities must
comply with court orders if law enforcement wants to wiretap one of their
phones.  Should CALEA be extended to hotels and universities?  Are hotels
and universities broadband Internet providers when they offer Internet
service in student dorm rooms or hotel rooms?

In reality, CALEA is a funding bill; it has very little to do with
technology.  Imagine if law enforcement thought DNA testing was too
expensive, so Congress passes a law requiring all doctors to purchase
DNA testing equipment and provide free DNA tests to law enforcement.
DNA is a complicated subject.  Few police officers are qualified to
analyze DNA. Instead law enforcement pays for professional DNA testing
when it needs DNA testing.

The FCC comment period has closed.  Everyone had an opportunity to submit
comments on the topic to the FCC.

Consult your own attorney if you want real legal advice.