ETSI & Lawful Interception of IP Traffic



Similar documents
Lawful Interception of IP Traffic: The European Context

Simple Law Enforcement Monitoring

WHITE PAPER. Gaining Total Visibility for Lawful Interception

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

Introducing STAR-GATE Enhancements for Packet Cable Networks

Chapter 9. IP Secure

IP-based Delivery Network via OpenVPN Provider Handbook

Today s challenges in Lawful Interception. C. Rogialli, October 11, 2005 RIPE MEETING 51 - Amsterdam

Brocade Telemetry Solutions

EAGLE EYE IP TAP. 1. Introduction

Lawful Interception in German VoIP Networks

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Technical papers Virtual private networks

Cisco Which VPN Solution is Right for You?

EAGLE EYE Wi-Fi. 1. Introduction

Remote Forensic Software. Dr. Michael Thomas DigiTask GmbH, Germany

VPN. Date: 4/15/2004 By: Heena Patel

Chapter 5. Data Communication And Internet Technology

Multi-Homing Security Gateway

Lawful Interception in practise in the Netherlands

How To Pass A Credit Course At Florida State College At Jacksonville

Chapter 2 - The TCP/IP and OSI Networking Models

Ranch Networks for Hosted Data Centers

we secure YOUR network we secure network security English network security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

ICTTEN8195B Evaluate and apply network security

Chapter 7 Transport-Level Security

Wholesale IP Bitstream on a Cable HFC infrastructure

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

Seamless Roaming in a Remote Access VPN Environment

Lawful Interception of VoIP. Rudolf Winschuh Business Development Transaction Security / Telecommunications

Lawful Interception in P2Pbased

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

utimaco a member of the Sophos Group

Understanding the Cisco VPN Client

UIP1868P User Interface Guide

Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

CTS2134 Introduction to Networking. Module Network Security

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Voice over IP Security

Gigabit SSL VPN Security Router

Authentication, Authorization and Accounting (AAA) Protocols

In this Profile. USA Tel: Fax:

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

For the protocol access paths listed in the following table, the Sentry firmware actively listens on server ports to provide security for the CDU.

DrayTek Vigor High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports

Executive Summary and Purpose

How To Understand And Understand The Security Of A Key Infrastructure

UPPER LAYER SWITCHING

Ethernet. Ethernet. Network Devices

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

inet Enterprise Features Fact Sheet

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Data Communication Networks and Converged Networks

Chapter 32 Internet Security

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Deploying Media Probes in Evolving VoIP Networks

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Applications that Benefit from IPv6

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

Scenario: IPsec Remote-Access VPN Configuration

Intrusion Detection, Packet Sniffing

Network Services Internet VPN

Advanced Computer Networks IN Dec 2015

Local Area Networks (LANs) Blueprint (May 2012 Release)

Network Service, Systems and Data Communications Monitoring Policy

ETSI TS V2.1.1 ( )

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Broadband Phone Gateway BPG510 Technical Users Guide

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Cornerstones of Security

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Chapter 1 The Principles of Auditing 1

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Using MIS 3e Chapter 6A Appendix

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Configure A VoIP Network

Securing IP Networks with Implementation of IPv6

Regulation of Investigatory Powers Act 2000

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Proxy Server, Network Address Translator, Firewall. Proxy Server

Introduction. Technology background

Bandwidth Aggregation, Teaming and Bonding

Transcription:

ETSI & Lawful Interception of IP Traffic Jaya Baloo RIPE 48 May 3 Netherlands Amsterdam, The

Contents Introduction Introduction to Lawful Interception Interception Interception of Internet services Origins Origins in The European Community The The European Interception Legislation in Brief ETSI ETSI Standards 101 232, 101 233, 101 234 Interception Interception Suppliers & Discussion of Techniques Future Future Developments & Issues

Introduction to Lawful Interception ETSI definition of (lawful) interception: interception: action (based on the law), performed by an network operator/access provider/service provider (NWO/AP/SvP SvP), of making available certain information and providing that information to a law enforcement monitoring facility. Network Operator, Access Provider or Service Provider LI order Deliver requested information Law Enforcement Agency (LEA) Law Enforcement Monitoring Facility

Why intercept? LI s Raison D etre Terrorism Pedophilia rings Cyber stalking Data theft Industrial espionage Drug dealers on the internet Why not? Privacy Security

Legal Issues in LI Judge: "Am I not to hear the truth?" Objecting Counsel: "No, Your Lordship is to hear the evidence." Some characteristics of evidence- relevance to LI Admissible can evidence be considered in court *differs per country Authentic explicitly link data to individuals Accurate reliability of surveillance process over content of intercept Complete tells a complete story of a particular circumstance Convincing to juries probative value, and subjective practical test of presentation

Admissibility of Surveillance Evidence Virtual Locus Delecti Hard to actually find criminals in delicto flagrante How to handle expert evidence? Juries are not composed of network specialists. Legal not scientific decision making. Case for treating Intercepted evidence as secondary and not primary evidence Primary is the best possible evidence e.g. in the case of a document its original. Secondary is clearly not the primary source e.g. in the case of a document a copy.

Interception of Internet services

Interception of Internet services What are defined as Internet services? access to the Internet the services that go over the Internet, such as: surfing the World Wide Web (e.g. html), e-mail, chat and icq, VoIP, FoIP ftp, telnet

What about encrypted traffic? Secure e-mail e (e.g. PGP, S/MIME) Secure surfing with HTTPS (e.g. SSL, TLS) VPNs (e.g. IPSec) Encrypted IP Telephony (e.g. pgp -phone and Nautilus) etc. If applied by NWO/AP/SvP then encryption should be stripped before sending to LEMF or key(s) should be made available to LEA else a challenge for the LEA

Logical Overview

Technical Challenges Req. Maintain Transparency & Standard of Communication Identify Target - Monitoring Radius misses disconnect Capture Intercept information Effective Filtering Switch Packet Reassembly Software complexity increases bugginess Peering with LEMF monitoring multiple XDSL ccts.

Origins in The European Community

What is LI based on in the EU? Legal Basis EU directive Convention on Cybercrime Council of Europe- Article 20- Real time collection of traffic data Article 21- Interception of content data National laws & regulations Technically Not Carnivore Not Calea Standards, Best Practices based approach IETF s standpoint (RFC 2804 IETF Policy on Wiretapping )

The European Interception Legislation in Brief

Solution Requirements

European Interception Legislation France Commission Nationale de Contrôle des Interceptions de Sécurité -- La loi 91-636 Loi sur la Securite Quotidienne November 2001 Germany G-10 2001- Gesetz zur Beschränkung des Brief-,, Post- und Fernmeldegeheimnisses The Counter terrorism Act January 2002

UK Interception Legislation UK Regulation of Investigatory Powers Act 2000 Anti-terrorism, terrorism, Crime and Security Act 2001 The tragic events in the United States on 11 September 2001 underline the importance of the Service s s work on national security and, in particular, counter-terrorism. terrorism. Those terrible events significantly raised the stakes in what was a prime area of the Service s s work. It is of the utmost importance that our Security Service is able to maintain its capability against this very real threat, both in terms of staff s and in terms of other resources. Part of that falls to legislation and since this website was last updated we have seen the advent of the Regulation of Investigatory Powers Act 2000, Terrorism Act 2000 and the Anti- Terrorism Crime and Security Act 2001. Taken together these Acts provide the Security Service, amongst others, with preventative and investigative capabilities, relevant to the technology of today and matched to the threat from those who would seek to harm or undermine our society. The UK Home Secretary s s Foreword on

The Case in Holland At the forefront of LI : both legally & technically The Dutch Telecommunications Act 1998 Operator Responsibilities The Dutch Code of Criminal Proceedings Initiation and handling of interception request The Special Investigation Powers Act -streamlines criminal investigation methods WETVOORSTEL 20859 backdoor decree to start fishing expeditions for NAW info Provider to supply info not normally available TIIT STANDARD predecessor to current ETSI standards LIO National Interception Office in operation since end of 2002

European Telecommunications Standards Institute

ETSI TR 101 944 Responsibility- Lawful Interception requirements must be addressed separately to Access Provider and Service Provider. 5 layer model - Network Level & Service Level division Implementation Architecture Telephone cct.. (PSTN/ISDN) Digital Subscriber Line (xdsl( xdsl) Local Area Network (LAN) Permanent IP Address Security Aspects HI3 Delivery

The ETSI model NOW / AP / SvP s domain LEA domain Network Internal Functions intercept related information (IRI) content of communication (CC) NWO/AP/SvP s administration function IRI mediation function HI1 HI2 IIF CC mediation function HI3 INI LEMF LI handover interface HI IIF: internal interception function INI: internal network interface HI1: administrative information HI2: intercept related information HI3: content of communication

Sample Architecture for HI2 and HI3 S1 interception S1 interception S1 interception S2 gathering & transport S3 management HI2 & HI3 box Mediation Function Internet Law Enforcement Monitoring Facility (LEMF) T1 T1 T1 T2 (LEA1) T2 (LEA2) ISP LI Warrant Admin Desk LI order HI1 Law Enforcement Agency (LEA)

ETSI 101 232 IP Delivery Specifies: modular approach used for specifying IP based handover interfaces header(s) to be added to IRI & CC sent over HI2 & HI3 (R4 LIID) (R5 & R7 Communication Identifier) (R37 & R38 Timestamp) (R15 & R19 Sequence Number) (R10 Direction) (R9 Payload Type) (R8 Interception Type) protocols for the transfer of IRI & CC protocol profiles for the handover interface

ETSI 101 232 Protocol Stack LAYER NAME Handover OSI Layer 6 & 7 Clause 6.2 Responsibilities Create & maintain one or more delivery functions. Error Reporting. Aggregate PDUs; Associate header info; Create padding PDUs; Assign PDUs to delivery functions Session 5 6.3 Create & maintain a single transport connection and monitor its status. Run keepalive mech.; Encode/ decode PDU elements; integrity mech, Buffer data Transport Network 4 3 6.4 6.5 Create & maintain a network cct. Network Protocol

ETSI 101 233 EMAIL Stage 1 description 1 of interception info. in process of sending & receiving email Stage 2 2 description of when IRI & CC shall be sent and what info it shall contain Email Send Event Email Recieve Event Email download event distinction client Content intercept or complete session Webmail

ETSI 101 234- Internet Access Services Stage 1 1 description of the interception information in relation to the process of binding a target identity to an IP address when providing IAS Stage 2 2 description of when IRI & CC shall be sent and what info. it shall contain LI Requirements -administrative as well as capturing of traffic Preventing over and under collection of intercept data Reference Topologies & Scenarios Further Radius & DHCP IP IRI intercepts & TCP,UDP IRI intercepts

ETSI 101 234- Internet Access Services contd. 2 Target Identity- Username or Network Access Identifier IP address (Ipv4 or Ipv6) Ethernet address Dial-in in Number calling line identity Cable Modem Identifier Other unique identifier agreed beteween AP & LEA Result of interception- provided when Attempt to access the access network When access to access network permitted /not On change of status/ location

ETSI 101 234- Internet Access Services contd. 3 IRI contains- Identities used by or associated with the target identity ( dial in calling line number and called line number, access server identity, ethernet addresses, access device identifier Details of services used and their associated parameters Info. relating to status Timestamps CC shall be provided for every IP datagram that: Has the target's IP address as the IP source address Has the target's IP address as the IP destination address

Interception Suppliers & Discussion of Techniques

LI Implementations Verint formerly known as Comverse Infosys ADC formerly known as SS8 Accuris Pine Nice Aqsacom Digivox Telco/ ISP hardware vendors Siemens Alcatel Cisco Nortel

Implementation techniques Active- direct local interception i.e. Bcc: Semi-Active Active- interaction with Radius to capture and filter traffic per IP address Passive- no interaction with ISP required only interception point for LEA device Most of the following are active or a combination of active and semi-active implementations

Verint = Comverse - Infosys Based in Israel Re : Phrack 58-13 Used by Dutch LEMF Used extensively internationally supports CALEA & ETSI Use of Top Layer switch Response

NICE Used in BE as t1 Proprietary implemented for ETSI Feat., topic extraction, Keyword Spotting, Remote Send of CC Auto Lang. detection and translation Runs on Windows NT &2000 Svr. Stand alone internet/ telephony solution

ADC = SS8 Use of proprietary hardware Used for large bandwidth ccts. Known to be used in Satellite Traffic centers Supports CALEA ETSI Use of Top Layer switch

Accuris Max. of 50 concurrent taps Solution not dependant on switch type Can use single s2 as concentrator Offer Gigabit Solution but depends on selected switch capability and integration with filter setting Supports Calea & ETSI

It s s all about the M$ney Solutions can cost anywhere from 100,000 Euro to 700,000 Euro for the ISP UK Govt. expected to spend 46 billion over the next 5 years- subsequently reduced to 27 billion Division of costs Cap Ex = ISP Op Ex = Govt. Penalties for non-compliance Fines up to 250,000 euros Civil Charges House Arrest of CEO of ISP Cooperation between ISPs to choose single LI tool

Conclusions for Law Enforcement If you re going to do it do it right Disclosure of tools and methods Adherence to warrant submission requirements Completeness of logs and supporting info. Proof of non- contamination of target data Maintaining relationship with the private sector Law Enforcement personnel Training Defining role of police investigators Defining role of civilian technicians Handling Multi Focal investigations

Future Developments & Issues EU Expansion Europol stipulations Data Retention Decisions ENFOPOL organization Borderless LI ISP Role EU wide agreements on Intercept Initiation Quantum Cryptography WLAN challenges The Future of Privacy Legislation?

Web Sites www.opentap opentap.org http://www.quintessenz quintessenz.at/.at/cgi- bin/index?funktion funktion=doquments www.phrack phrack.com www.cryptome cryptome.org www.statewatch statewatch.org www.privacy.org www.iwar iwar.org..org.uk www.cipherwar cipherwar.com www.cyber-rights.org/interception rights.org/interception

Q&A / Discussion Does LI deliver added value to Law Enforcement s s ability to protect the public? What about open source Interception tools? Will there be a return of the Clipper Chip? Should there be mandated Key Escrow of ISP s s encryption keys? What types of oversight need to be built into the system to prevent abuse?

Thank You. Jaya Baloo jaya@baloos baloos.org +31-6-51569107