On Tue, 13 Feb 2007, Rick Smith wrote:
OK, Don't point me to some confusing URL I don't have time (or
patience) to read about how to comply with CALEA.
The most difficult thing about the CALEA compliance issue is that
the format of the data has not, yet, been finalized. This makes it
impossible (IMNSHO) to determine exactly how compliance is gonna
look. Here is what IS known:
1. You must be able to send the data (in a yet to be determined
format) via a secure connection to the requesting LEA (law
enforcement agency)
2. The LEA will supply you with a subpoena requesting information on
a specific customer.
3. You must be able to capture (and forward) ALL traffic to and from
that customer. This means even traffic between that customer and
another of your customers, so a sniffer at the border is NOT enough.
4. The "target" cannot know his data is being logged.
I don't think I missed any of the "major points". I have heard that
PCAP (tcpdump or MT packet sniffer) format is possibly going to be
an approved format, but it CANNOT be a "store and forward". In
other words, it MUST be streamed to the LEA.
I have heard, but I can't confirm (since, I am only an associate
member) that the principle member's list has better insight into
what WISPA is doing on behalf of the membership. (This was gleaned
from various posts on the mailing list here, and is just an
assumption.) Either way, membership is a good idea. ;-)
If I missed anything, perhaps someone here can point it out.
--
Butch Evans
Network Engineering and Security Consulting
573-276-2879
http://www.butchevans.com/
My calendar: http://tinyurl.com/y24ad6
Training Partners: http://tinyurl.com/smfkf
Mikrotik Certified Consultant
http://www.mikrotik.com/consultants.html
--
WISPA Wireless List: [email protected]
Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless
Archives: http://lists.wispa.org/pipermail/wireless/