Lawful Intercept

Download Report

Transcript Lawful Intercept

Lawful Intercept in VoIP Networks
Manohar Mahavadi
Vice President, Software Engineering
Centillium Communications Inc.
Fremont, California
January 23-26, 2007• Ft. Lauderdale, Florida
Lawful Interception – Introduction
• Omnibus Crime Prevention and Safe Streets Act of 1968
– Title III legalizes law enforcement wiretaps in criminal investigations
• Foreign Intelligence Surveillance Act of 1978 (FISA)
– Wiretapping in advance of a crime being perpetrated
• The Electronic Communications Privacy Act of 1986 (ECPA)
– Sets standards for access to cell phones, e-mail and other electronic
communications and transactional records (subscriber identifying
information, logs, toll records)
• Communications Assistance for Law Enforcement Act of 1994 (CALEA)
– Preserve law enforcement wiretapping capabilities by requiring
telephone companies to design their systems to ensure a basic level
of government access
• H.R.3162 (The PATRIOT Act of 2001)
– Post 9/11
– Expands the scope of Title III wiretaps and FISA to include computer
fraud, abuse, etc.
January 23-26, 2007• Ft. Lauderdale, Florida
Lawful Interception – CALEA (U.S.)
• What is CALEA?
– Defines the obligations of telecom carriers to assist law
enforcement agencies (LEAs) in electronic surveillance pursuant
to lawful authorization
– Requires carriers to design and modify their systems to ensure that
electronic surveillance can be performed
– Communications infrastructure should be made wiretap-ready –
call forwarding, caller ID, conferencing, etc.
• Progress
– The last decade has seen a lot of evolution of regulations backed
by the FBI, FCC, DOJ, DEA
– Broadened to cover many new technology solutions such as
push-to-talk, SMS messaging, chat sessions, etc.
• www.askcalea.net for a list of standards
• www.fcc.gov/calea
January 23-26, 2007• Ft. Lauderdale, Florida
Lawful Interception
• PSTN world wiretapping
– Dedicated connection – point-to-point
– Dedicated resources for the call duration
– Voice routed using mechanical switches or line
connectivity tables
– Wiretapping in local loop or at the local exchange
• Packet world wiretapping
– Shared transmission medium: Packets contain addresses
not tied to a location
– Routing is dynamic and can take multiple paths
– Many applications traverse the same transmission path
– Decentralized VOP (SBCs, gateways, proxies, routers,
switches, etc.) makes it difficult for wiretapping
– Requires cooperation from infrastructure device vendors
January 23-26, 2007• Ft. Lauderdale, Florida
Lawful Interception – Terminology
• LAES: Lawfully authorized electronic surveillance
• LEA: Law enforcement agency
– A government entity authorized to conduct LAES
(FBI, police, DEA, etc.)
• CC: Call content (payload of multi-media packets)
• CCC: Call content channel
• CII: Call-identifying information or call data (CD)
– Signaling or dialing information that identifies origin,
direction, destination or termination generated or received
by a subscriber
• CDC: Call data channel
January 23-26, 2007• Ft. Lauderdale, Florida
Lawful Interception – Terminology
• IAP: Intercept access point
– A point within a telecommunications system or VOP network
where some of the communications or CII of an intercept
subject’s equipment, facilities or services are accessed
• Intercept subject: Subscriber whose communications,
CII or both have been authorized by a court to be
intercepted, monitored and delivered to an LEA
• Associate: The called party in the conversation
• TSP: Telecommunications service provider
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Surveillance Model
TSP
Service Provider
Administration
Lawful
Authorization
Access
Function
VoP
Signaling
Delivery
Function
CII
CC
LEA
Law Enforcement
Administration
Collection
Function
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Surveillance Model
• Access function (AF)
– One or more IAPs
• Delivery function (DF)
– CCCs and CDCs
• Collection function (CF)
– Collecting and analyzing intercepted communications
• Service provider administration function (SPAF)
– Controlling the TSP access and delivery functions
• Law enforcement administration function (LEAF)
– Controlling the LEA collection function
• Mediation function (MF)
– Presentation of data (CC or CII) to DF
(VoIP→TDM or VoIP → VoIP)
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Functional Architecture
Subject’s
Domain
VoP
Signaling
IAP
CII AF
Network’s
Domain
VoP/Network Signaling
LEA’s
Domain
CII DF
LEA-CF
CII MF
Terminal
IAP
VoP
CC AF
VoP
CC MF VoP, TDM
VoP
CC DF
LEA-CF
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Functional Architecture
OSI Stack
CC/CII
DF
App
A-PDU
OSI Stack
7
7
1
1
Delivery
Method
Delivery Function
A-PDU CF
CC/CII
App
Delivery
Method
Collection Function
CCC and CDC should be separate channels
CCC and CDC can share same medium
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Intercept Access Points
• Physical locations on the network from where the
CC or CII is delivered to delivery function
– Can be in multiple locations
– CII and CC IAPs can be co-located
• Call identifying information IAP
– CII directly associated with the call
• Management of an existing call between intercept subject and
associate(s) (establishing, managing and releasing)
– CII indirectly associated with the call
• ServingSystem message: Register or deregister
addressing info
• Call content IAP
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Intercept Access Points
Bob’s VOIP SP
Alice’s VOIP SP
Transport
ISP A
- Access Router
- Border Router
Transport
ISP B
Call Setup
• VoIP SPs first enable setup
VOIP
Conversation
Transport
ISP C
Transport
ISP D
R1
VOIP Phone
Alice
• VoIP calls directly take place
• Preferred wiretaps – R1 and R2
• R1/R2 should be configured to tap
• Single SP makes life easier
R2
VOIP Phone
Bob
Courtesy: Ref[1]
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Intercept Access Points
• Media gateways
• Session border controllers
• Access routers
• Signaling proxies
• CII and CC are typically delivered over secure
channels to LEA
January 23-26, 2007• Ft. Lauderdale, Florida
LI on TDM_PKT_CHANNEL
TAP TRAFFIC COMING TO
PKT
NP Packetizer
Legacy
DSP TDM_PKT _CHANNEL
Phone
Enc/Dec
EC
A
NP Packetizer
LI - TDM
NP IP Phone
Enc/Dec
UnPacketizer
NP Packetizer
B
LI - PKT
TAP TRAFFIC COMING FROM PKT
January 23-26, 2007• Ft. Lauderdale, Florida
LI on PKT_PKT_CHNL
DSP
DSP
NP
Encoder
Packetizer
Decoder
UnPacketizer
Encoder
Packetizer
Decoder
UnPacketizer
Encoder
Packetizer
NP
LI-A
Encoder
Packetizer
NP
LI-B
NP
A
IP Phone
B
IP Phone
DSP
DSP
January 23-26, 2007• Ft. Lauderdale, Florida
LI – TDM_PKT_CONF_CHNL
LI Model with Conferencing
Courtesy: [4]
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Surveillance Events
• Information events
– Call-control related events
•
•
•
•
Answer: Call accepted
Origination: Subject initiated a VoP session
Release: Session released along with resources
Termination attempt: Session termination requested
– Signaling events
• Dialed digit extraction: Digits dialed after a call is connected
• Direct signal reporting: Signaling from and to intercept subject
• Network signal: Tone or message indicating CII
(busy, ringing, etc.)
• Subject signal: Call waiting, forwarding, etc.
January 23-26, 2007• Ft. Lauderdale, Florida
LI – Surveillance Events
• Information events
– Feature use events
•
•
•
•
Change
Connection
Connection break
Redirection
– Registration events
• Address registration
• Content events
–
–
–
–
CCChange: Media characteristics established or modified
CCClose: CC delivery is disabled
CCOpen: CC delivery is enabled
CCUnavailable: Network loses access for the call
under interception
January 23-26, 2007• Ft. Lauderdale, Florida
LI Challenges
• Security vs. CALEA requirements
– Security ensures privacy, packet integrity, authenticity
and non-repudiation
– CALEA requires intercepted packets are not secured
– SRTP and secured SIP with end-to-end security
poses challenge
– Peer-to-peer VoIP communication with security enabled
prevents interception
– Secured traffic needs to be decrypted and re-encrypted
for interception
• Security Association termination and re-initiation
– Key distribution or sharing with LEA
January 23-26, 2007• Ft. Lauderdale, Florida
LI Challenges
• Channel capacity affected if channel
duplication is required
• Design should consider requirements
for extra performance
• Should support all call models like Forking,
Handoff, etc.
• Should support all codecs in use
• Requires additional interface support
January 23-26, 2007• Ft. Lauderdale, Florida
References
[1] Security Implications of Applying the Communications
Assistance to Law Enforcement Act to Voice over IP,
Steve Bellovin, et al, June 13, 2006
[2] Electronics Surveillance Needs for Carrier-Grade Voice Over
Packet (CGVoP) Service, FBI Document for CALEA
[3] Lawfully Authorized Electronic Surveillance (LAES) for voice
over Packet Technologies in Wireline Telecommunications
Networks ANSI T1.678.xxxx
[4] 05/2000, TIA/EIA/J-STD-025 Lawfully Authorized Electronic
Surveillance, revision A: updated
[5] 09/200, TIA/EIA/J-STD-025 Lawfully Authorized Electronic
Surveillance, updated
[6] www.askcalea.net
[7] www.fcc.gov/calea
January 23-26, 2007• Ft. Lauderdale, Florida