If I’m the VoIP provider, I can easily record conversations.  And I would 
expect LE to come with a phone number not an IP address.  If it’s OTT VoIP, how 
likely is it to be going over public WiFi at a park?  I guess that’s possible.  
But again, wouldn’t they start with a phone number and contact the VoIP 
provider not the WiFi provider?

 

If someone is using a cell extender or WiFi calling, those go over a VPN which 
I assume is encrypted.

 

I wonder what companies like Comcast do with their cable WiFi network where any 
Comcast customer can connect off any other Comcast customer’s WiFi.  Do you get 
a unique IPv6 or CGNAT IP address that traces to your Comcast userid and can be 
tracked to you?  Or do the police bust down the door of the person whose WiFi 
you were using?

 

From: AF <af-boun...@af.afmug.com> On Behalf Of Forrest Christian (List Account)
Sent: Tuesday, March 19, 2024 4:49 AM
To: AnimalFarm Microwave Users Group <af@af.afmug.com>
Subject: Re: [AFMUG] CALEA and WiFi

 

I see CALEA as a holdover from those days when most of the traffic on the 
internet was unecrypted.  Law enforcement wanted to be able to wiretap the 
internet just like they could wiretap POTS.

 

Nowadays,  I'm not sure what law enforcement could actually do with the 
captured data.   What an isp has access to is largely encrypted over the wire.  
 I guess some data might be useful but I'm guessing that law enforcement has 
learned that looking at a capture of customer data isn't as useful as they 
thought it would be. 

 

About the only thing I can think of right this second which might be at least 
frequently unencrypted anymore is VoIP and/or DNS depending on your 
configuration.   But if I was carrying on criminal activities across the net 
I'd probably be looking at ways to encrypt everything which isn't hard to do.  

 

On Mon, Mar 18, 2024, 4:17 PM Mark Radabaugh <m...@amplex.net 
<mailto:m...@amplex.net> > wrote:

While CALEA is still on the books it doesn’t seem to be of much interest to LEA.

 

No - you do not have to be able to identify the user.  If LEA can identify a 
specific end user for you out of the WiFi, then yes, they could ask for you to 
monitor it but keep in mind that CALEA isn’t meant for historical data.   It’s 
meant to be real-time capture once they have identified a particular person of 
interest (well, a specific phone number, IP address, etc.).   

 

Every year I get a phone call from the FBI verifying our contact information 
and how to get hold of us if they need something.  I point out that we file our 
CALEA documents and ask why they are calling - and they say ‘oh, we don’t use 
that’.   Uh,  got it.   But the FCC still thinks it’s important and you best 
follow the rules and file it anyway.  Local and State LEA has never heard of 
CALEA.   It’s just one more bureaucracy on autopilot that has outlived it’s 
usefulness.

 

Mark

 

 

On Mar 18, 2024, at 6:29 AM, dmmoff...@gmail.com <mailto:dmmoff...@gmail.com>  
wrote:

 

CALEA hasn’t been on my radar much, so this is probably an old topic, but it’s 
one I don’t know much about.

 

If you provide WiFi in a public space how do you handle compliance?  We have 
parks, airports, and other public spaces with managed WiFi.  There are also 
MDU’s with WiFi in a public area like a courtyard, lounge, lobby, etc.

 

My understanding is you have to be able to capture traffic if you’re ordered to 
do so.  Do you also have to be able to identify the individual?  

 

If they ever asked me to capture all traffic from the park WiFi….sure no 
problem.  If they gave me a particular IP, port, and time, and they wanted me 
to start capturing traffic AND identify who it was, then I would only be able 
to tell them it was someone at the park.  At best I could give them a MAC 
address and hostname.  If I have to identify the customer that’s easy: the 
municipal parks department, but I’m guessing that’s not what they will want to 
know.

 

Will this stuff get us in trouble?

 

-Adam

 

-- 
AF mailing list
AF@af.afmug.com <mailto:AF@af.afmug.com> 
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

 

-- 
AF mailing list
AF@af.afmug.com <mailto:AF@af.afmug.com> 
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to