[71614] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

daemon@ATHENA.MIT.EDU (David Lesher)
Sat Jun 19 01:21:20 2004

From: David Lesher <wb8foz@nrk.com>
To: nanog@merit.edu (nanog list)
Date: Sat, 19 Jun 2004 01:28:38 -0400 (EDT)
In-Reply-To: <02d701c4557c$ab720ae0$6401a8c0@stephen> from "Stephen Sprunk" at Jun 18, 2004 04:32:34 PM
Reply-To: wb8foz@nrk.com
Errors-To: owner-nanog-outgoing@merit.edu


Speaking on Deep Background, the Press Secretary whispered:
> 
> 
> I'm told that most CALEA warrants only authorize a pen register, not an
> actual tap.  Pen registers are trivial to implement, since the provider's
> software undoubtedly has an option to produce CDRs for billing or planning
> purposes.  Unfortunately this doesn't cover the case of purely P2P calls
> which don't have a VoIP provider; if the suspect is using such software, the
> only way to produce a pen register is with a tap.

Note that the requirements for a trap/trace aka pen register are
a fraction of those for a Title III intercept.

See http://www.usenix.org/events/sec01/eckenwiler/index.htm for
at least an introduction..







-- 
A host is a host from coast to coast.................wb8foz@nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433

home help back first fref pref prev next nref lref last post