[EMAIL PROTECTED] wrote:

<SNIP>

I ask you guys and gals this...
The traffic of interest. What are its characteristics?
If it is someone trafficking illegal content to the world at large via encrypted p2p, then obviously that traffic will route and terminate via a core facility at some point. I have toured Broadwing's photonic backbone facilities and there are tap points in place for diagnostic / maintenance / LEA access purposes. That said, it's a moot point to capture traffic off your network if it such that it will ride to any of the core routers.
For my current network setup over 95% of all traffic external to my network appears to come from a single IP address, so this would be unusable with my customers.
So the focus of the traffic request must be of a more local nature in order for there to be a need to involve you as a network operator. Well, if the LEA has established that 'suspect x' (yes suspect, not guilty till proven guilty remember?) is gaining connectivity via your network, they have either determined this via financial or data capture investigatory methodology. If their concern is to tap the packets of said suspect, why not deploy a team with wireless intercept?

It is not outside of their technical capacity, after all, America is the master if sigint/comint. It would NOT be very expensive in equipment nor training to present each LEA with this capacity. Then they could go intercept and sift the materials themselves.

The forces at play are much more sinister I think. By placing the onus upon us as business owners, they are shirking both their financial and civil liabilities. Rest assured that the current posture of applying calea to our networks is really pretty much bunk. The very need for the tap to be local to my network means that they are interested in traffic which is both originating and terminating on my network. As such, I say that if they want the data, go park a van and intercept the frames, and do what you need to, but do so with your finances paying for it and put the legal burden and liability of such activity where it belongs... with the LEA themselves.

This brings up an interesting point. If it is traffic between two customers on your network, aren't you really providing a private network and if so, doesn't this fall outside of CALEA? If that is not the case then doesn't every private network need to be CALEA compliant?

For instance, in my area there are 5 wifi network operators. Rather than each of us operators going to the expense, why net let the 2 or 3 local LEAs purchase and train personnel to handle the intercept? Why create a regulatory burden / liability upon myself as a small operator? The LEAs should be responsible for carrying out their investigations and dealing with the determination of what information is applicable to warrant, not me.

As a citizen I'm not sure I would like this. Sounds to me like asking the fox to guard the hen house. If the warrant is for a specific type of traffic that is all they should have access to. Again, this is my citizen view, by no means construe this as support for CALEA regulation of data networks.

   Sam Tetherow
   Sandhills Wireless

Operating as a CLEC we actually have a regulatory affairs department which handles reviewing subpoena, making determination of application, and then (after information specifics are approved) it is handed off to tech department for CDR collection, and/or tap activation and portal access activation.

Its really sad to see people bashed for standing up for their rights. I am especially proud of our veterans whom have undertaken the ultimate responsibility of maintaining these rights.

Civil disobedience is completely appropriate with regard to this.

carry on, be proud, be free!
XXX
--
Click here to find single Christians that want to meet you today
http://tagline.hushmail.com/fc/CAaCXv1VY4cGXTnqMSKvrVGRVaGCmc8R/


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to