CALEA Discussion Network Policy Council February 4, 2007.

Slides:



Advertisements
Similar presentations
1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.
Advertisements

EduCause LI Overview February 2007
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Analysis to support CALEA Standards Prepared by: Christie Goddard.
Data Security The Best Data Security In The Industry.
Fiducianet, inc. tm 1 Presented by H. Michael Warren, President fiducianet, inc. VoIP Technology Perspectives Law Enforcement Concerns & CALEA Compliance.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
CALEA Filings and Procedural Steps Mary Eileen McLaughlin Merit – Director Technical Operations January 31, 2006.
CALEA Panel Internet2 Member Meeting December 6, 2006.
1 © 2000, Cisco Systems, Inc. CALEA_NANOG_2000_0611.ppt Impact of CALEA on Network Operators What it is and what it ain’t Chip Sharp Cisco System, Inc.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
CALEA: The Communications Assistance for Law Enforcement Act Doug Carlson, Executive Director, Communications and Computing Services, NYU Mark Luker, Vice.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
GETTING WEB READY Introduction to Web Hosting. Table of Contents + Websites: The face of your business …………………………………………………………………………1 + Get your website.
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
CPS Acceptable Use Policy Day 2 – Technology Session.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
RI Telecommunications Education Access Fund (RITEAF) RI Department of Education June 12, 2015.
Assessing Assistive Technology Needs Understanding the AT Evaluation Process 1 ADA Trainer Network Module 7c Trainer’s Name Trainer’s Title Phone /Website.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
70-411: Administering Windows Server 2012
Agenda Welcome – Don Welch Introduction to CALEA – Mary McLaughlin Non-CALEA Assistance Obligations – Beth Cate CALEA Update – Matt Brill Making the Compliance.
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
7 th Continual Improvement & Innovation Symposium 2015 CASE STUDY COMPETITION: INNOVATION TEMPLATE [ Name of the Organization ] [ Innovation Title ]
SEC303 Assessing and Managing Privacy in the Enterprise JC Cannon Privacy Strategist.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
CALEA Communications Assistance for Law Enforcement Act October 20, 2005.
CALEA and J-STD-025 revisions. CALEA  Communications Assistance for Law Enforcement Act (1994)  Standardized access to telecommunications systems using.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
CALEA Status Overview Common Solutions Group September 20, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
CALEA Discussion Institute for Computer Policy and Law June 28, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Draft TIP for E-rate. What is E-rate? The E-rate provides discounts to assist schools and libraries in the United States to obtain affordable telecommunications.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Communications Assistance for Law Enforcement Act & Higher Education: or How I Learned to Stop Worrying and Love Wiretaps Terry Hartle American Council.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
Compliance August 18, Agenda Outline Status Draft of Answers.
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
CALEA General Session February 6, CALEA Communications Assistance for Law Enforcement Act Basic purpose: to provide an easier way for Law.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
COMPULSORY BRIEFING SESSION Enterprise Wireless Solution (Wi-Fi) RAF /2015/00022 Date: 18 January 2016 Time: 11:00.
FCC Ex Parte March 11, 2004 ATIS 1200 G St. N.W. Suite 500 Washington, DC ATIS Lawfully Authorized Electronic Surveillance Activity.
CALEA: The Big Picture for Higher Education ICPL June 28, 2006 Steve Worona EDUCAUSE
The Freedom of Information Act and UCL Compliance Rosamund Cummings UCL FOI Officer
Module 5: Network Policies and Access Protection
TIER IT Inventory CITI Meeting November 6,
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
CALEA TAMU ITEC Walt Magnussen, Ph.D. Director TAMU ITEC Joint Techs, February 2007.
Declaring Bankruptcy proceeding On-line * For the Softer Bankruptcy Procedure.
Facebook privacy policy
Update on Lawful Interception (LI) Directive for ISPs
Product Overview.
Secure Electronic Transactions (SET)
PPSO (GRSC) Update: Standards Work on Lawful Interception
Product Overview.
Presentation transcript:

CALEA Discussion Network Policy Council February 4, 2007

Status Highlights Based on discussions at Snowmass, the NPC published a statement on CALEA  Key message: Few higher-education institutions need to be concerned about CALEA  Positive feedback Due dates for filings were set by the FCC for institutions which need to comply with CALEA  February 12th - Monitoring Report  March 12th - System Security Report

Status Highlights FCC continues to strongly assert compliance required by May 14th Network equipment vendors and Trusted Third Parties still developing their offerings (somewhat surprising at this late date)

Status Highlights Many institutions continue to work to determine if they are covered by CALEA Note: Nice updates to the EDUCAUSE CALEA website

Exempt/Not Exempt Institutions first evaluating if there is any possible need to comply  Different interpretations of vague terms If yes, often doing risk analysis based on:  Possible fines  Possible bad PR

How might an Intercept work? LawfulAuthorization Law Enforcement Telecommunication Service Provider Service Provider Administration (Turn on Lawful Intercept feature of switch) Delivery Function Collection Function Access Function Law Enforcement Administration (Switch collects Lawful Intercept data) (Securely deliver information to LEA) (Order generated)

Compliance Options Purchase equipment  Intercept capability Upgrade existing network hardware, if Lawful Intercept (LI) features available, or Acquire network probes to install in network  ALSO NEED MEDIATION DEVICE TO FORMAT AND SEND DATA TO LAW ENFORCEMENT (vendors such as SS8 and Verint)

Compliance Options Trusted Third Parties (TTP)  Vendors can provide full suite of services including: Installing equipment to perform Lawful Intercept Receiving and validating an intercept request from Law Enforcement Performing the intercept and forwarding the data to Law Enforcement  Could be less costly option if need to comply

Compliance Options Trusted Third Parties (TTPs) (continued)  Mixed results in interacting with TTP vendors so far  Service offerings CALEA Tech Group has seen are very new (NeuStar, Apogee - soon to see VeriSign)

Compliance Options “Do it yourself” options  Example: Merit

Related Issues “Vacuum cleaner” approach utilized by LE “Call it the vacuum-cleaner approach. It's employed when police have obtained a court order and an Internet service provider can't "isolate the particular person or IP address" because of technical constraints, says Paul Ohm, a former trial attorney at the Justice Department's Computer Crime and Intellectual Property Section. (An Internet Protocol address is a series of digits that can identify an individual computer.)” From ZDNet News, 1/30/2007Paul Ohm

Related Issues Will CALEA be used on campuses?  Or just Title 18, etc., so that better data can be collected closer to the source? Potential for legislation related to Lawful Intercept  How likely?  What would we want it to say? Data Retention ATIS Draft Standard