1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Lawful Intercept Case Study Harvard Law School November 12, 2003.

Slides:



Advertisements
Similar presentations
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
The current System Landline caller The emergency call process starts with a caller dialing (highly simplified) © 2011 Colorado Resource.
1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
Connecting to Remote Networks © 2004 Cisco Systems, Inc. All rights reserved. Using Packet Switching in WANs INTRO v2.0—7-1.
Protection notice / Copyright notice HiPath MobileConnect Delivering on the Promise of Enterprise FMC February 2007.
Why Converged Networks Make Sense: VoIP a First Step July 26, 2006.
© 2010 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets and the Level 3 Communications logo are registered.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Lesson 1.1: The Evolution of Telephony in the Enterprise.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Voice over Internet Protocol (VoIP) Training and Development.
October 6 University Faculty of Information Systems & Computer Science.
Virtual Data Systems, Inc. Value Proposition of IP Telephony Voice over IP Technologies.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Presented by Zhi-Hong Guo Instructed by Assistant Professor Quincy Wu
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—1-1 MPLS Concepts Introducing Basic MPLS Concepts.
Saumil Shah IEOR 190G 3/19/08.  Vonage is a VoIP(voice over IP) company that provides telephone service via a broadband connection.  In order to use.
1 Leveraging SS7 to Deliver IP Services Carl Bergstrom Director – IN & IP Services VeriSign Telecommunication Services Internet Telephony Conference, February.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Hosted Communications and Services David Byrd Chief Marketing Officer.
VoIP Clearing & Peering Agenda  Definitions  Interconnect Models and Technologies  Traditional Telephone (The early days)  VoIP (What is the future?)
Appendix A Implementing Unified Messaging. Appendix Overview Overview of Telephony Introducing Unified Messaging Configuring Unified Messaging.
MAEDS 45 th Annual Conference October , 2009.
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
DUE Voice over IP (VoIP) Linksys Ernie Friend- FSCJ.
Telecom Terms and Concepts Introduction to terms.
Copyright  StarVox, Inc, - All Rights Reserved- Services Platform Requirements for for Next Generation Networks Next Generation.
1 Proprietary & Confidential December 9, 2008 Bandwidth.com Saving You Money Through Voice & Data.
Voice Over Internet Protocol (VoIP). Basic Components of a Telephony Network.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
Introduction to 21CN Resilience Tim Hubbard Head of 21CN Solutions Strategy.
VOICE OVER INTERNET PROTOCOL. INTRODUCTION SCENARIOS IN INTERNET TELEPHONY VOIP GATEWAYS IMPORTANCE OF VOICE OVER IP BENEFITS & APPLICATIONS ADVANTAGES.
WebEx Cloud Connected Audio Enterprise
TELEPHONE NETWORK Telephone networks use circuit switching. The telephone network had its beginnings in the late 1800s. The entire network, which is referred.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
CALEA IMPLEMENTATION IN VoIP NETWORKS By Cemal Dikmen, Ph.D. General Manager Lawful Intercept Products SS8 Networks, Inc. Thursday - 02/24/05, 8:15-9:00am.
October 10-13, 2006 San Diego Convention Center, San Diego California SIP Trunking… Why is it so important?
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
October 10-13, 2006 San Diego Convention Center, San Diego California Effective Deployment and Migration Strategies Leigh Fatzinger, VP.
Telephony System Public switched telephone network
Mario D’Silva National Technology Specialists Unified Communications UNC307.
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
Small Office / Home Office (SOHO) IP Telephony Who says You Can’t Run with the Big Dogs?
Introduction to Telecommunications, 2/e By M.A.Rosengrant Copyright (c) 2007 by Pearson Education, Inc. All rights reserved. Figure 28–1 A next generation.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
INTERCONNECTING CISCO NETWORKING DEVICES PART 1.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
 Inter exchange carrier networks  Local exchange carrier networks  Undersea networks  Enterprise links.
NTC 249 ASSIST Learning for leading/ntc249assistdotcom.
NTC 249 edu Experience Tradition/ntc249edudotcom FOR MORE CLASSES VISIT
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Cisco SP Voice solutions Review Ching-Ying Tong
NTC 249 EDU Education Expert/ntc249edu.com
Internet Telephony 2003, Miami
IT 242 PAPER Success Secrets/ it242paper.com
Chapter 1: WAN Concepts Connecting Networks
Voice over Internet Protocol for Small & Medium Sized Companies
The Business Value of SIP Trunking
Lecture 5: TELEPHONE NETWORK
Decisions, Decisions… Hosted vs. Premises-based VoIP Deployment
Lecture 5: TELEPHONE NETWORK.
Lecture 3: TELEPHONE NETWORK.
Presentation transcript:

1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Lawful Intercept Case Study Harvard Law School November 12, 2003

222 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Outline Brief Summary of the “Case” and Your Role Overview of Relevant Technologies Your Guidance to the Company

333 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Summary In-house counsel for an IP-based network equipment manufacturer Responsible for the company’s legal strategy on lawful intercept Company is looking for guidance (legal, PR, regulatory) regarding the best approach to LI in the post 9/11 world Need to respond to customer requests for information and contractual protection

444 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Traditional Local Exchange Carrier (LEC) Architecture SS7 ………… Central Office Switches Tandem Switches

555 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Voice over IP (VoIP) Voice is carried as a digital signal to an Aggregation Device over a common ‘pipe’ –Information is carried as packets –Resources are shared between data types and other subscribers. –Packets to same address may follow different routes –Eliminates the need for separate networks and infrastructure for different forms of communication (voice, data, video)  Convergence! Information is routed based on its final destination. –Voice and signaling follow separate paths

666 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Typical VoIP Architecture Internet Aggregation Router Customer Premise IAD SS7 Call Control Entity 911 Operator Services Local Exchange Carrier (LEC) IntereXchange Carrier (IXC) PBX Trunking Gateway Trunking Gateway Aggregation Router IAD PBX Core Router IP Switch Internet Gateway Router

777 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID General Questions—1/3 Do we see more similarities or differences among the three country’s approaches to lawful intercept? What might be some reasons for these differences and/or similarities? What are some of the ways that these differences and/or similarities might impact your company’s legal and technical approach?

888 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID General Questions—2/3 What are some of the risks for your company under these laws (e.g. fines, lawsuits)? What steps can and should you take to protect your company from them?

999 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID General Questions—3/3 How should your company engage with relevant government agencies? Actively and openly? Equally across all countries or just the most strident? Should you let your customers do it instead of you? What factors you should consider in making this determination?

10 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID “Managed Services” Scenario Your company has one product that can be used both by private enterprises for their corporate voice network and by public service providers to deliver managed voice services. In the latter case, the product can either sit on the customer’s premise or the on the service provider’s site in their central office. The team developing this product within your company wants to know whether they are “legally required” to build LI functionality into this product, and if not, whether there are some other (non-legal) reasons that they should. What advice do you give them?

11 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Managed Services Scenario Things to consider: 1. Does this qualify as a “public” or “private” network service? Or both? Is the answer the same for all countries? Is this a relevant question in all countries? 2. Is this functionality “legally required” in any country? Is that even a relevant question? If not, what are the risks, if any, of not building this functionality into the product? 3. How would you communicate with your customers on this issue?

12 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Contract Negotiations During negotiations on a sales contract with one of your global service provider customers they demand that you include a guarantee that all of your products are “LI-compliant” on a world-wide basis. They suggest that breach of this guarantee would result in liquidated damages. They also ask you to indemnify them for any penalties they might suffer for non-compliance with a particular country’s LI laws. How would you handle this?

13 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Contract Negotiations Things to Consider: 1. Do you have any legal obligation to make this promise? 2. How do you analyze their request for liquidated damages? What should the amount be, if any? Is money the customer’s “sole remedy”? 3. What about other vendors’ products in the network? Do you have complete control over the network design? 4. What is the “true” risk to your company of a breach? 5. Is there anything you should try to get in return for this promise?

14 © 2002, Cisco Systems, Inc. All rights reserved. Presentation_ID Questions? Feel free to me at: