Central Information Point for Telecom Investigation CIOT René Bladder

Similar documents
Lawful Interception in practise in the Netherlands

Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing.

Liability of Network Service Providers

Statistics on Requests for data under the Data Retention Directive

Lex Mundi Telecommunications Regulation Multi-Jurisdictional Survey

Basics of VoIP Termination

Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long for clients to benefit from the vast range of functionality.

Global Information Society Watch 2014

Concept. Central Monitoring and IP Address Administration

The National Cyber Security Strategy (NCSS) Success through cooperation

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Number 3 of 2011 COMMUNICATIONS (RETENTION OF DATA) ACT 2011 ARRANGEMENT OF SECTIONS

Lawrence Police Department Administrative Policy. August A. Access to CJIS sensitive data is only available to authorized users.

Ulster University Standard Cover Sheet

Protecting Saskatchewan data the USA Patriot Act

XDR. Big Data solution.

Taking VoIP Innovation to the Next Level

Managed Services Billing Platform For MVNOs

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

REPORT FROM THE COMMISSION TO THE COUNCIL AND THE EUROPEAN PARLIAMENT. Evaluation report on the Data Retention Directive (Directive 2006/24/EC)

Click here for Explanatory Memorandum

Summary Reporting System. National Incident-Based Reporting System

European Commission Directorate General for HOME AFFAIRS. Guide for applicants. Call for expression of interest HOME/2014/AMIH/001

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive

24/7 High Tech Crime Network

Employees monitoring of information and communication technologies private usage Guidelines updated in Portugal

Cookies and consent. The Article 29 Working Party has identified seven types of cookies that are not subject to the consent requirement.

Third party Web hosting services security Policy

An Overview of Cybersecurity and Cybercrime in Taiwan

WHITE PAPER. Gaining Total Visibility for Lawful Interception

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

Position Paper 4. Closer understanding of the term third party networks and service providers" in relation to its application in Directive 2006/24/EC

University of Liverpool

Fit and proper person form

TICSA. Telecommunications (Interception Capability and Security) Act Guidance for Network Operators.

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

A Framework for Secure and Verifiable Logging in Public Communication Networks

Cybercrime & Cybersecurity

Act on Background Checks

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

DOCUMATION S DOCUMENT MANAGEMENT

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

On-Line Privacy Statement

Review Report. CTIVD nr. 43. Review Committee on the Intelligence and Security Services. arising from the crash of flight MH17

Remote searches in the cloud

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

LAW ON MILITARY SECURITY AGENCY AND MILITARY INTELLIGENCE AGENCY I GENERAL PROVISIONS. Article 1

Security MWC Nokia Solutions and Networks. All rights reserved.

Samsung OfficeServ ACD Call Centre Interactive Voice Response (IVR) Samsung OfficeServ ACD/IVR

General Terms & Conditions

CLOUD COMPUTING READINESS CHECKLIST

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Network neutrality. Guidelines for Internet neutrality. Version February 2009

LCM IT Asset Management

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

7 August I. Introduction

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Vetting for a Security Clearance

DOCUMATION S SELF-SERVICE PORTAL

Hosted Exchange Opportunity in Cloud Computing Complete Turnkey Solution

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

The Electronic Transactions Law Chapter I Title and Definition

White Paper: Reach for the Sky. Master the Might of the Hybrid Cloud

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS Risk Assessment 357-7

1 Processing of personal data Information collected for use WHOIS search function Introduction Purpose...

Mailwall Remote Features Tour Datasheet

ACCESS CONTROL SOLUTIONS

Brocade Telemetry Solutions

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

Transcription:

Central Information Point for Telecom Investigation CIOT René Bladder RIPE 58 Meeting 4 th may 2009

Content of this presentation Why CIOT? Goal CIOT CIOT Information System Informatiebijeenkomst aanbieders 26 februari 2009

Why CIOT? (1996 1999) Increase of interest for Telecom data/users (LEA) Liberalisation of Telecom market; Existing communications: Not quick (days/weeks) Not cost efficient (manual fax procedure) Not complete (not all providers) No track records No standards

LEA's 25 Police regions 6 Units National Recherche 4 Special cid s from four ministries: FIOD, AID, IOD, SIOD 2 Intelligence (secret) Services: AIVD en MIVD Internal Affaires Police, KMAR, KLPD 112, Central Authority (LP-OM) 42 organisations with regulated, legal access.

Providers All Telecom Providers for fixed lines, mobile telephony (MVNE & MVNO), carrier (pre-) select services,... All Internet Service Providers for internet access and email services Telco's started in 2004 ISP's started in 2006 Total number of connected providers: ± 110

Central organisations OPTA for pricing, number distribution, etc... Telecom Agency of the Ministry of Economic affairs for the Telecom Law and Besluit-CIOT COIN (Telecom companies) for central storage of data for portering of telephone numbers Central Bureau for Privacy concerning Personal Data (privacy in general)

Goal CIOT Collect current customer data from providers on a daily basis; Deliver specific information to: (Special) Investigation Services Intelligence & Security Services Manage the CIOT Information system guarding careful storage and rightful use of the system; Be an intermediary between LEA and providers. CIOT is part of the Ministry of Justice.

Type of Data Customer data ==> CIOT Traffic data ==> Data retention act (soon...) Content data ==> Legal Interception

Service developed (1998 2009) Investigators BOIDs Public Prosecutors CIOT Providers

Legal embedding/agreements Telecom Act WIV Privacy Act Provider Decree CIOT BOID WvS Privacy agreement Audit agreement SLA with Provider SLA with BOID CIOT

CIOT model Automated request for information to providers Automated comparison of questions with data of providers Automated delivering of answers Request + question + answer is only visible by authorities Management of system is performed by CIOT Monitoring is clear and precise Use of the system is based on the law

Generic Question / Answer process Client Blackbox Applicant Submitting a request for data Question Question Daily update of data Provider Warrant Answer Answer Competent Authority Server Authorisation for using the system Central Authority Reports on the use of the CIOT-system Ministry of Justice Development, IT management and Security CIOT

Request Identification warrant Legal base for request Function competent authority Name investigation

Type of Question Telephone number Email address IP-address v4 IP-address v6 Account ID Hardware ID Postal code + house number

Answer Name + Address + City foreign address Type of address Type of Service Type of Network service Name Service provider Name Network provider Date creation database

Key results Increased efficiency Volume and location independent Generic application with standard equipment System is 24 hours / 7 days available Standard format for telecom and internet data Security of system approved by intelligence services and audited by KPMG and FOX-IT

Production highlights Hit-rate is 88% - 94% 250.000 questions per month 42 BOIDs send in requests for information 110 Providers give answers Roughly 50 million telephone numbers and 31 million internet identifying items are accessible using the CIOT-system

Questions Do not hesitate and ask questions now!...or contact CIOT via http://www.ciot.nl...or ask me later at the bar ;-) Informatiebijeenkomst aanbieders 26 februari 2009