Computer Science 199r. CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony
|
|
- Baldwin Price
- 8 years ago
- Views:
Transcription
1 Computer Science 199r CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony Pierce Tria May 14, 2007
2 Privacy Concerns with Next Generation Telephony I. CALEA and The USA PATRIOT Act In the early 1990 s, the Federal Bureau of Investigation (FBI) began to worry about their ability to employ effective wiretaps on telephone devices. With technology advancing so quickly, they feared that technology was outpacing their ability to effectively tap into conversations. Citing 183 cases where the FBI felt that could not effectively carry out a wiretap, FBI Director Louis Freeh asked that new legislation be enacted to protect law enforcement s ability to conduct court-ordered wiretaps. 1 In 1994, Freeh s request was heard and the Communications Assistance for Law Enforcement Act (CALEA) was passed to help ensure that law enforcement would never be hindered by technology. CALEA, in its most basic form, mandates that all telephony systems be designed so as to accommodate for wiretapping by law enforcement. In 2001, following the September 11 th terrorist attacks on the United States, Congress passed another crucial law to assist law enforcement in preventing future terrorist attacks. The act became known as the USA PATRIOT Act (Uniting and Strengthening American by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act). This act aimed to create more cooperation among law enforcement agencies and also sought to make surveillance of suspected terrorists much easier. Most notably, Section 505 of this act expands the use of National Security Letters (NSLs), which allow for wiretaps without a warrant as is typically necessary. This section has risen significant privacy concerns. II. Voice over Internet Protocol Vs. Conventional Telephony Systems Voice over internet protocol (VoIP) has emerged recently as a new and promising form of communication. Unlike current popular telephone systems, VoIP uses a packet-based system as opposed to circuit based one. This means that in conventional telephony systems there is a circuit formed between the caller and receiver. Thus, to tap into a circuit-based conversation, one must create a new loop in the already existing circuit (See Figure 1). Figure 1 Above is a simple wiretap on a circuit-based system. 1 Whitfield Diffie and Susan Landau, Privacy on the Line, Cambridge: MIT Press, 2007, pp. 218.
3 In a circuit based system all of the information is transported over two designated wires which makes tapping such a system quite straightforward. Figure 1 reflects the telephone system as it existed prior to the 1990 s. In the mid-1990 s as new technology emerged, telecommunications companies gained the ability to create wiretaps in a new, more effective way. With an increasingly digitized system, carriers decided that they could tap a conversation by merely creating an invisible, silent third caller in any conversation. 2 This is merely a modified conference call. A packet-based system, such as a VoIP system, uses a much different protocol for transmission and so the issue of tapping VoIP conversations becomes quite challenging technically and raises many new privacy concerns. In a VoIP system, the information transmitted, namely one s voice, is not sent as a constant stream of data over a pre-determined path. Instead, the information is broken up into discrete packets which are then sent over various unique paths. In terms of efficiency this is a far superior system since information can be transported more quickly and more cheaply since no designated circuit must be formed between the caller and receiver. A simplified VoIP call can be seen below. Figure 2 This is a simplified view of a VoIP conversation. Packets containing information travel over various paths in the network of routers. These paths are not predetermined. 2 Whitfield Diffie and Susan Landau, Privacy on the Line, Cambridge: MIT Press, 2007, pp
4 There exist several theories today regarding how one can tap into a VoIP conversation. These methods will be discussed, at length, in the subsequent sections. Chiefly of concern within this paper are the privacy concerns and other issues that arise when one wishes to tap a VoIP communication in the same manner he could a conventional phone conversation. CALEA mandates that law enforcement be able to tap VoIP communications and so in recent years this issue of building tapping avenues into the VoIP architecture has become more salient. III. Potential Privacy Concerns in Tapping VoIP Many have voiced concerns over what types of information law enforcement could gain by implementing VoIP tapping protocols. To address these concerns, let us recall how VoIP operates. The data being transported one s voice is split into packets, each of which is labeled with an IP address telling it where it is to be delivered. Bearing this in mind, it is easy to see why many fear that law enforcement could gain information regarding a person s exact whereabouts while they are making a phone call. A simple trace of the IP address could tell where the caller or receiver is physically. As we will see in the following section, however, ability to tap VoIP is still in its infancy. Given the current abilities of law enforcement, it will be years before VoIP will have to worry about such a privacy issue. Also, many worry that tapping of VoIP will give police and law enforcement access to all of the packets their computer sends upstream to their Internet service provider (ISP). The notion is that any law enforcement agency would be able to monitor one s s and webbrowsing habits without proper clearance to do so since they would be intercepting all incoming and outgoing packets from one s computer. This seems like a logical concern on its surface, however, when recording VoIP conversations, a switched port analyzer (SPAN) is typically used. A SPAN isolates only the VoIP packets for recording, allowing the rest of the packets containing other information to travel without being recorded. One less concrete privacy concern is with regards to the USA PATRIOT Act and how it may be applied to VoIP wiretaps. NSLs increase the freedom of law enforcement to conduct wiretaps. The question is, will the USA PATRIOT Act make it much easier to gain information such as a caller s location? Furthermore, if it is that much easier, who will be able to gain such information and how will it be used? IV. Methods for Tapping VoIP There have been many theories for how once could conduct a successful tap on a VoIP conversation. Following is a list of some of the most popular ideas and if they are in fact plausible methods. Method #1: Place Tapping Device on Client to Intercept All VoIP Packets The idea here is to place a listening device on a person s computer in order to listen in on their VoIP conversations. The device catches all of the outgoing and incoming packets that make up the conversation. In this manner, law enforcement can hear both sides of the conversation.
5 Placing a tapping device on the client computer is not a truly plausible idea because it is quite possible that such a device could be easily discovered and so, easily removed. 3 The tap itself would work and would yield the information necessary but it would be far too easy for a suspect to remove a listening device before law enforcement could use it. Additionally, gaining access to a suspect s home or office to plant a listening device could be problematic, especially in cases where a NSL is being used to allow for the tap. A NSL is not a warrant and a warrant would be necessary to place this type of listening device within someone s home. The legality of placing one of these taps, even with a warrant, is debated. 4 This approach is technically very plausible but there are legal issues, namely the need of a warrant, and also logistical issues, that such a tap would be easily removed. Method #2: Place a Tap on the Client s Access Router Here, law enforcement would tap one s ISP access router. The premise of this method is that all of a person s information must go through a single access router. In Figure 2, Alice and Bob are each connected to a single access router (R1 and R2 respectively) which then gives them access to the broader network of routers. Again, this idea seems quite plausible on paper since it makes intuitive sense. In practice, however, this method is not so reasonable. Tapping the access router would theoretically allow law enforcement agencies to hear any VoIP conversation. The trouble here is that neither of the access routers has any information that can distinguish who Bob or Alice is. There is no permanent identifier (like a phone number) for either Alice or Bob that would allow the router to determine what packets are coming from which specific user. This problem therefore, makes tapping by means of access routers, not suitable. 5 Method #3: Monitor a Group of Routers This method is less commonly advocated but still some maintain that it could be a plausible tapping method. In this case, law enforcement would monitor a large number of routers and hope to catch enough packets to piece together a conversation. This approach has more flaws than it has merits. Since VoIP is so dynamic, one has no way of knowing which routers will be used and which path each packet will choose to take to its destination. This is truly a shotgun approach which aims to simply monitor a large set of routers in hopes that some of the VoIP packets will be traveling over this segment of routers. This is another good theoretical approach, but not a terribly scalable or practical approach. There are simply too many paths for packets to take and so without monitoring a very large 3 Whitfield Diffie and Susan Landau, Privacy on the Line, Cambridge: MIT Press, 2007, pp Steven Bellovin, et al, Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP, ITAA, June 13, Whitfield Diffie and Susan Landau, Privacy on the Line, Cambridge: MIT Press, 2007, pp
6 segment of routers this is not a feasible approach. 6 All three methods have merits but each has flaws which severely inhibit its implementation. Currently, there exists no viable protocol to tap into VoIP conversations though slow progress is being made. One researcher at George Mason University believes he may have a viable method to determine at the very least which users are speaking to one another but he has yet to develop viable tapping technology. 7 Another large issue not raised specifically in any of these methods is the issue of jurisdiction. The United States may pass any number of laws dictating what telecommunications companies must do to assist law enforcement in this country. VoIP raises a new question since a VoIP provider could be a non-us company providing a service to American citizens. Thus, VoIP brings about a new level of compliance issues that previously have not manifested themselves. This is yet another obstacle to consider when creating viable tapping methods for VoIP systems. V. Indirect Privacy Issues Though the tapping of VoIP communications has some very direct privacy implications, perhaps more interesting and crucial are the implicit privacy concerns which come to light when applying CALEA and the USA PATRIOT Act to VoIP. One of the biggest issues is what will next fall under the scope of CALEA. Initially, according to Susan Crawford, CALEA did not apply to the internet or online applications. 8 Interestingly, the Federal Communications Commission (FCC) has expanded CALEA in recent years to include VoIP. In 2005 the FCC issued a CALEA Order. This order mandates that VoIP providers comply with CALEA by May 15, 2007 or suffer a $10,000 per day fine. 9 The question on the minds of many is what online applications will be subject to CALEA next. Will instant messaging need to be tapped? 10 Will any number of social networking sites require back doors so law enforcement can monitor what individuals are posting? In this respect there are some very serious, very credible privacy threats which may be created by expanding the scope of CALEA. The question becomes bigger than merely, what are the privacy concerns with tapping VoIP? and instead becomes a question of what applications the law require to comply with CALEA. 6 Whitfield Diffie and Susan Landau, Privacy on the Line, Cambridge: MIT Press, 2007, pp Xinyuan Wang et al., Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet, November 7, Susan P. Crawford, The Ambulance, The Squad Car, & The Internet, Berkeley Technology Law Journal, Susan P. Crawford, The Ambulance, The Squad Car, & The Internet, Berkeley Technology Law Journal, Steven Bellovin, et al, Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP, ITAA, June 13, 2006.
7 The expanding scope of CALEA is worrisome and presents some serious threats to privacy. Though currently it does not present any direct threats, the expansion on CALEA is a continuing worry. In some sense, the application of CALEA to VoIP could only be a preview of what is to come in the future. VI. The Future of CALEA, the USA PATRIOT Act and VoIP With the FCC s deadline for compliance only hours away, and no clear viable manner in which to tap VoIP communications, it seems unlikely that the VoIP providers will be able to meet the demands of the FCC s CALEA Order. Though several viable options have been introduced within this paper, each has issues which inhibit its ability to reliably provide law enforcement access to VoIP conversations. The application of CALEA to VoIP systems could have serious implications for the future architecture of the system. As Steven Bellovin, et al. remind us, A major advantage of VoIP is cost savings. CALEA is expensive. 11 If VoIP providers are forced to comply with CALEA many will likely be pushed out of business. If this is the case, America will likely cease to be the home of telecommunications innovation. On the contrary, the United States must balance innovation with security. If the United States were to be attacked and it was known that such an attack was organized using we might expect sweeping reforms on the part of the FCC. The FCC has vowed to stick by its $10,000 per day fine for CALEA non-compliance and if VoIP were found to be the cause of a major American terrorist attack, the FCC would likely step in to stipulate specific architecture that VoIP must follow so as to make it suitable to wiretaps. According to Diffie and Laundau there exist, two particular types of VoIP services [which] have architectures that fundamentally resemble the telephone network and thus their accommodation of CALEA is not particularly difficult. 12 It is likely that in the event of some tragedy planned by VoIP the government might mandate that all VoIP carriers adopt these architectures. VII. Conclusions Given current technology, it is the belief of this panel that there exist no credible threats currently to privacy because viable wiretapping technologies have yet to be fully developed. Once the tapping capabilities are developed, the privacy issues brought up within this paper may very well be credible and realistic. Under current conditions, this is not the case. Perhaps more important is the issue of the increasing scope of CALEA. This is a real worry since expansion of CALEA means there will be more and more threats to privacy. 11 Steven Bellovin, et al, Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP, ITAA, June 13, Whitfield Diffie and Susan Landau, Privacy on the Line, Cambridge: MIT Press, 2007, pp. 295.
8 Currently, CALEA and the USA PATRIOT Act as they apply to VoIP present very few, if any credible threats to privacy. In the future, we can expect this to change if VoIP becomes more vulnerable to taps and if CALEA continues to expand in scope.
Methods for Lawful Interception in IP Telephony Networks Based on H.323
Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering
More informationWHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
More informationU.S. Department of Justice. Federal Bureau of Investigation VIA ELECTRONIC SUBMISSION
U.S. Department of Justice Federal Bureau of Investigation Electronic Surveillance Technology Section 14800 Conference Center Drive, Suite 300 Chantilly, VA 20151 July 11, 2003 VIA ELECTRONIC SUBMISSION
More informationPrivacy Year in Review: Privacy and VoIP Technology
Privacy Year in Review: Privacy and VoIP Technology JOHN B. MORRIS, JR. ABSTRACT Voice over internet protocol ( VoIP ) technology is increasingly being used throughout the nation. VoIP technology provides
More informationLawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M. Bellovin https://www.cs.columbia.edu/ smb Join work with Matt Blaze, Sandy Clark, Susan Landau Steven M. Bellovin
More informationVoice over Internet Protocol. Kristie Prinz. The Prinz Law Office
Voice over Internet Protocol Kristie Prinz The Prinz Law Office I. What is Voice over Internet Protocol ( VoIP )? Voice over Internet Protocol ( VoIP ) is a technology, which facilitates the transmission
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION. Washington, DC 20006
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) Joint Petition for Rulemaking to Resolve ) RM-10865 Various Outstanding Issues Concerning the ) Implementation of
More informationCommittee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
More informationEnabling Business Class VoIP with A Carrier Class Network
Enabling Business Class VoIP with A Carrier Class Network David Clark Co-Founder & CEO CommPartners 1 CommPartners Date: 01/14/05 Voice over IP (VoIP) has emerged as one of the most exciting, potentially
More informationHamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents
Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP Table of Contents Section Page Definitions 2 Terms of Service and Network Management Practices 2 Devices & Software that may be
More informationPolitics and Cryptography in the United States. Outline. What are Your Rights? Syvale Lee April 11, 2006
Politics and Cryptography in the United States Syvale Lee April 11, 2006 Outline Bill of Rights Security versus Freedom Current Trends in Computer Security Export Control on Cryptography Pretty Good Privacy
More informationWiretapping the Internet --- (or How Not to Introduce Security Holes into a Communications Infrastructure)
Wiretapping the Internet --- (or How Not to Introduce Security Holes into a Communications Infrastructure) Susan Landau Distinguished Engineer Sun Microsystems Laboratories Frank DeMarco "Tidewater Muse"
More informationDigital Surveillance: The Communications Assistance for Law Enforcement Act
Order Code RL30677 Digital Surveillance: The Communications Assistance for Law Enforcement Act Updated June 8, 2007 Patricia Moloney Figliola Specialist in Telecommunications and Internet Policy Resources,
More informationScaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
More informationP2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com
More informationSimple Law Enforcement Monitoring
Simple Law Enforcement Monitoring Fred Baker draft-baker-slem-architecture-01.txt ftp://ftpeng.cisco.com/fred/ietf/slem.ppt ftp://ftpeng.cisco.com/fred/ietf/slem.pdf The message I wish had been found in
More information(202) 418-2468. FCC ADOPTS ORDER TO ENABLE LAW ENFORCEMENT TO ACCESS CERTAIN BROADBAND AND VoIP PROVIDERS
NEWS Federal Communications Commission 445 12 th Street, S.W. Washington, D. C. 20554 News Media Information 202 / 418-0500 Internet: http://www.fcc.gov TTY: 1-888-835-5322 This is an unofficial announcement
More informationDRAFT Second Circulation for Comments
1 DRAFT Second Circulation for Comments Barbados (VoIP) Voice Over Internet Protocol Policy Policy in accordance with sections 4 (2)(b) and 4 (2)(f) of the Telecommunications Act 2001-36. This policy describes
More informationSecurity and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all
More informationWritten Testimony of John L. Barnes Director of Product Development Verizon Business. Hearing on VoIP: Who Has Jurisdiction to Tax It?
Written Testimony of John L. Barnes Director of Product Development Verizon Business Hearing on VoIP: Who Has Jurisdiction to Tax It? House Committee on the Judiciary Subcommittee on Commercial and Administrative
More informationAdvantages of Broadband Phone Services
CHAPTER3 Advantages of Broadband Phone Services Why are so many people subscribing to broadband phone services, either as an additional phone line or as a complete replacement to their traditional phone
More informationTechnical Questions on Data Retention
Technical Questions on Data Retention 1) The list of data in the annex of the proposed Directive on Data retention is practically identical to the information required in the Council draft Framework Decision.
More informationBEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON D.C. 20554
BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON D.C. 20554 In the Matter of: ) ) Petition for Declaratory Ruling that pulver.com s ) Free World Dialup is neither Telecommunications ) WC Docket
More informationGood VoIP vs. Bad VoIP
Good VoIP vs. Bad VoIP The term Voice over IP, or VoIP has been thrown around in a lot of different cirlces around the telecom industry. There seems to be growing confusion about what it is, whether or
More informationVoice over IP: Forensic Computing Implications
Voice over IP: Forensic Computing Implications Matthew Simon and Jill Slay Enterprise Security Management Lab, Advanced Computing Research Centre University of South Australia, MAWSON LAKES, SA 5095 SIMMP002@students.unisa.edu.au
More informationSERIES A : GUIDANCE DOCUMENTS. Document Nr 3
DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
More information1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
More informationVOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
More informationT.38 fax transmission over Internet Security FAQ
August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes
More informationSecurity Alarm Systems
Security Alarm Systems Monitored alarm systems offer clients peace of mind as they activate on intrusion or tampering at the property and ensure any security alarm will have an appropriate response. However,
More informationCars, Broadband, Internet: And why the road to innovation may go through Washington DC
Cars, Broadband, Internet: And why the road to innovation may go through Washington DC Jon M. Peha Carnegie Mellon University www.ece.cmu.edu/~peha/bio.html Keynote for IEEE CCNC / Consumer Electronics
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed
More informationNetwork Neutrality Statement
Network Neutrality Statement CTC continues to comply with all applicable FCC requirements while providing the best possible customer experience for its Internet users. As such, CTC commits to the open
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationFDIC Division of Supervision and Consumer Protection
FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering
More informationTo activate Anonymous Call Rejection: 1. Lift the receiver and listen for dial tone. 2. Dial *77. 3. Listen for confirmation tone, hang up.
Anonymous Call Rejection Anonymous Call Rejection allows a customer to deny any calls from ringing the line if the calling party has blocked the identification number. The calling party receives a message
More informationco Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
More informationBarbara M. Jones, Ph.D. International Library Consultant, USA Former University Librarian Wesleyan University (Connecticut)
Date submitted: 14/08/2009 Librarians Shushed No More: The USA PATRIOT Act, The Connecticut Four, and Professional Ethics Barbara M. Jones, Ph.D. International Library Consultant, USA Former University
More informationConnecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
More informationVoice over IP Networks: Ensuring quality through proactive link management
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
More informationSecure IP Forwarding in the Security Industry - White Paper
Secure IP Forwarding in the Security Industry - White Paper This white paper addresses the issue of how an independent alarm company can maintain their independence and at the same time uses IP (Internet
More informationHow to Buy a Business Phone System
How to Buy a Business Phone System An Inside Guide to What You Need to Know When Choosing a Business Phone System Digitcom Canada Rimrock Road, Toronto, Ontario, M J A T:. - or... E: sales@digitcom.ca
More informationINTERCONNECTED VOIP REGULATORY COMPLIANCE MANUAL
INTERCONNECTED VOIP REGULATORY COMPLIANCE MANUAL Prepared and maintained by: The CommLaw Group www.commlawgroup.com 1420 Spring Hill Road, Suite 205 McLean, VA 22102 Regulatory Compliance Guide for Telecommunications
More informationVATM Position Paper: Voice over IP
The German telecommunications market is currently in intensive discussions concerning Voice over IP (VoIP) or Internet telephony. A number of companies already offer VoIP products for the mass market.
More informationTelephone Service: A Natural Monopoly?
Box 6-2 continued By June 2003, this had grown to 88 percent. A recent study indicates that the introduction of satellite TV led to substantial gains for consumers. However, ongoing antitrust oversight
More informationTerms VON. VoIP LAN WAN CODEC
VON Voice Over the Net. Voice transmitted over the Internet. That is the technical definition. Prescient Worldwide s product, called VON, means Voice Over Network as in ANY network, whether a client s
More informationHow the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and
More informationOverview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
More informationHow Operating Systems Create Network Efficiency
White Paper How Operating Systems Create Network Efficiency Lake Partners Strategy Consultants, Inc. 1000 Second Avenue, Suite 3600 Seattle, WA 98104 USA 206.428.0300 888.240.6898 www.lakepartners.com
More informationMigrating from Circuit to Packet: The Business Case for IP Telephony. Or What s In it for Me?
Migrating from Circuit to Packet: The Business Case for IP Telephony Or What s In it for Me? Even amidst the turmoil the telecommunications industry finds itself in, industry pundits are still expounding
More informationSUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.
. SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote
More informationNETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
More informationNetwork Structure or Topology
Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik
More informationInternet: Telephone Calls for Free with Vo I P I 19/1. Your PC can Make Telephone Calls to Anywhere in the World for Free!
Internet: Telephone Calls for Free with Vo I P I 19/1 Your PC can Make Telephone Calls to Anywhere in the World for Free! With the information in this article you can: Try out a selection of the best free
More informationReject calls from callers who block their Caller ID information so their calls don't even ring on your line.
Anonymous Call Rejection Reject calls from callers who block their Caller ID information so their calls don't even ring on your line. TO ACTIVATE ANONYMOUS CALL REJECTION 1. 2. Press *77 (on a rotary phone,
More informationBEFORE THE PENNSYLVANIA HOUSE CONSUMER AFFAIRS COMMITTEE. Testimony of. Regarding. Senate Bill 1000. Harrisburg, PA March 10, 2008
BEFORE THE PENNSYLVANIA HOUSE CONSUMER AFFAIRS COMMITTEE Testimony of SONNY POPOWSKY CONSUMER ADVOCATE Regarding Senate Bill 1000 Harrisburg, PA March 10, 2008 Office of Consumer Advocate 555 Walnut Street
More informationSection II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY
Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,
More informationVoIP Solutions Guide Everything You Need to Know
VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,
More informationIP Network Control: Turning an Art into a Science. Case Study: Global Crossing
Case Study: Global Crossing IP Network Control: Turning an Art into a Science Company: Industry: Global Crossing Holdings Ltd. Telecommunications Challenge(s): Global Crossing want the visibility and control
More informationMPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
More informationVOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
More informationSecurity Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP
Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Steven Bellovin, Columbia University Matt Blaze, University of Pennsylvania Ernest Brickell, Intel
More informationSIP, Security and Session Border Controllers
SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers Executive Summary Rolling out a public SIP service brings with it several security issues. Both users and Service
More informationVoice over Internet Protocol (VoIP) Core-Edge Working Group Meeting, September 28-29, 2004 Chintan Vaishnav Research Assistant, MIT CFP
Voice over Internet Protocol (VoIP) Core-Edge Working Group Meeting, September 28-29, 2004 Chintan Vaishnav Research Assistant, MIT CFP chintanv@mit.edu 1 Outline Part I Regulatory Issues Part II The Core-Edge
More informationYOUR HOME PHONE. Horry Telephone Cooperative, Inc.
YOUR HOME PHONE Horry Telephone Cooperative, Inc. CONTENTS Calling Features Anonymous Call Rejection page 4 Automatic Busy Redial page 4 Automatic Call Return page 5 Call Forwarding page 6 Call Forwarding
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationWhy VoIP Peer to Peer and Social Networking providers cannot ignore Legacy Telecoms! Or why Peer to Peer VoIP needs Voip-Pal IP to succeed!
Why VoIP Peer to Peer and Social Networking providers cannot ignore Legacy Telecoms! Or why Peer to Peer VoIP needs Voip-Pal IP to succeed! Professor Ed Candy Senior Life Member IEEE, Fellow of the IET
More information4G LTE Wireless Local Loop:
4G LTE Wireless Local Loop: Meeting the Challenges of a Changing Rural Marketplace NetAmerica Alliance Background Remarkable changes are taking place throughout the rural telecommunications industry. A
More informationCE 817 - Advanced Network Security VoIP Security
CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially
More information18. Encryption and Wiretapping
18. Encryption and Wiretapping Congress should lift all technical review requirements for encryption software and hardware; reject attempts to foist key escrow, or key recovery, on the market; reject a
More informationVoice Over IP is it hype or can it work for me? By American Business Communication Inc.
Voice Over IP is it hype or can it work for me? By American Business Communication Inc. In the world of telecom, it seems like everywhere you turn there is a buzz about Voice over IP (VoIP). Hardly a day
More informationDeaf access to 911 via new technologies
RIT NTID 911 Briefing John Combs January 2011 1 Deaf access to 911 via new technologies Problem Statement As the deaf community moves away from legacy TTY to modern text communications technologies such
More informationADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationRural Internet Service Provider Liability An Overview of Liability Issues Faced by ISPs Now and in the Future
Rural Internet Service Provider Liability An Overview of Liability Issues Faced by ISPs Now and in the Future Charlotte, North Carolina May 5, 2005 Joshua Zeldis 1 Presentation Agenda General Overview
More informationPrepared by the Commission on E-Business, IT and Telecoms
International Chamber of Commerce The world business organization Policy Statement Voice over Internet Protocol (VoIP) Prepared by the Commission on E-Business, IT and Telecoms Introduction The emerging
More informationPreventing Texting-while-Driving Reduces Distracted Driving
Preventing Texting-while-Driving Reduces Distracted Driving The dangers of multi-tasking while driving are well known. The risks, however, will depend on the attempted tasks. For an example, texting while
More informationWhite Paper. 7 Business Benefits of Moving From an On-Premise PBX to a Cloud Phone System
White Paper 7 Business Benefits of Moving From an On-Premise PBX to a Cloud Phone System 7 Business Benefits of Moving From an On-Premise PBX to a Cloud Phone System Tipping Points: Factors typically driving
More informationHow Cisco IT Migrated High-Volume Linksys Contact Center to IP Network
How Cisco IT Migrated High-Volume Linksys Contact Center to IP Network Cisco Unified Contact Center solution receives and routes 40,000 calls per day while providing greater flexibility and availability.
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC GN Docket No. 14-28 In the Matter of Protecting and Promoting the Open Internet Appropriate Rules for Managed or Specialized Services Jon M.
More informationBefore the Federal Communications Commission
Before the Federal Communications Commission In the Matter of ) ) ET Docket No. 04-295 Communications Assistance for Law ) Enforcement Act and Broadband Access ) and Services ) ) Pursuant to the Commission's
More informationThe treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework
The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework Response from the UK s Internet Telephony Service Providers Association (ITSPA) About ITSPA This response is on behalf
More informationThe Challenge of Implementing Interoperable Electronic Medical Records
Annals of Health Law Volume 19 Issue 1 Special Edition 2010 Article 37 2010 The Challenge of Implementing Interoperable Electronic Medical Records James C. Dechene Follow this and additional works at:
More informationCalling All Countries: The VoIP Revolution is Here!
Calling All Countries: The VoIP Revolution is Here! Panel: Sheba Chacko BT Global Services Tony Oliver Microsoft Corporation Andrew Powell Leap Wireless International, Inc. Agenda What is VoIP? Regulating
More informationBefore the Federal Communications Commission Washington, D.C. 20554 COMMENTS OF THE AMERICAN LIBRARY ASSOCIATION
Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Preserving the Open Internet ) GN Docket No. 09-191 ) Broadband Industry Practices ) WC Docket No. 07-52 COMMENTS
More informationRouting & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
More informationNETWORK MANAGEMENT DISCLOSURE
NETWORK MANAGEMENT DISCLOSURE Rules issued by the Federal Communications Commission ( FCC ) require broadband Internet access providers, such as Vyve Broadband, LLC (together with its subsidiaries, Vyve
More informationVoIP Implementation in the Contact Center: Market Drivers and Challenges
VoIP Implementation in the Contact Center: Market Drivers and Challenges > > > > W H I T E P A P E R 0 9. 1 5. 0 3 VoIP Implementation in the Contact Center: Market Drivers and Challenges INTRODUCTION
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
More informationExtending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
More informationEmbrace the future with A Dodo s guide to;
Embrace the future with A Dodo s guide to; Buying a Telephone System As functionality of telephone systems has increased, the buying process has inevitably become more involved. By providing an introduction
More informationVocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights
A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.
More informationNetwork Monitoring White Paper
Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com info@imagestream.com Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488
More informationWHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
More informationA Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
More information6 Steps to SIP trunking security. How securing your network secures your phone lines.
6 Steps to SIP trunking security How securing your network secures your phone lines. The myths about SIP trunking can be misleading. There are stories that SIP has set off a cyber crime wave of corporate
More informationS T A T E O F M I C H I G A N BEFORE THE MICHIGAN PUBLIC SERVICE COMMISSION * * * * *
S T A T E O F M I C H I G A N BEFORE THE MICHIGAN PUBLIC SERVICE COMMISSION * * * * * In the matter, on the Commission s own motion, ) to commence an investigation into voice over ) Case No. internet protocol
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) Jurisdictional Separations Reform ) and Referral to the Federal-State ) CC Docket No. 80-286 Joint Board ) ) Communications
More informationI. Introduction. II. What is ALEC?
Testimony of John Stephenson American Legislative Exchange Council Before the Kansas House Committee on Commerce, Labor, and Economic Development Regarding House Bill 2326 February 18, 2013 I. Introduction
More informationIP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
More information