today’s challenges in lawful interception

47
1 Today’s challenges in Lawful Interception C. Rogialli, October 11°, 2005 RIPE MEETING 51 - Amsterdam

Upload: others

Post on 12-Sep-2021

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Today’s challenges in Lawful Interception

1

Today’s challengesin Lawful Interception

C. Rogialli, October 11°, 2005RIPE MEETING 51 - Amsterdam

Page 2: Today’s challenges in Lawful Interception

2

Lawful Interception – a Definition

Action (based on the law) performed by a network operator / access provider / service provider (NWO/AP/SvP), of making available certain information and providing that information to a law enforcement monitoring facility for investigation purposes.

Page 3: Today’s challenges in Lawful Interception

3

Lawful Interception concept (1)

Warrant

InterceptionProvisioning

LEMFAssignment

NWO/AP/SvP

PSTN

PLNM

Internet

Page 4: Today’s challenges in Lawful Interception

4

Lawful Interception concept (2)

NWO/AP/SvP

PSTN

PLNM Internet

Warrant

Page 5: Today’s challenges in Lawful Interception

5

Entities involved in Lawful Intercetion

Government

Operates in the interests of the nation;Sets the regulatory framework in which Lawful Interception is performed;Defines economical parameters for Lawful Interception activities.

Operators

Lawfully operate for the sake of their business and profit, almost totally driven by telecommunications;Withstand rules set by the government in terms of lawful interception as an unavoidable;Install proper devices to fulfil the relevant obligations;

Law Enforcement Agencies

Operate in the name of crime fighting and nation security;Request lawful interception and define the real targets;Receive the communication data extracted by the operators;Need proper devices to playback and decode the intercepted traffic.

Page 6: Today’s challenges in Lawful Interception

6

A triviality…

TELecom Companies and Government agenciesare NOT created equal !

They have:

Different Purposes

Different Structure

Different Knowledge

Different Liabilities

Different Activities

Different Constraints

So they need:

Different Systems

Different Approaches

…but LI requires cooperation !

Page 7: Today’s challenges in Lawful Interception

7

Different Key ValuesFor the government Agencies

Overall solution effectiveness

Return on investment (in investigative terms !)

Adherence to existing operating procedures

Low level of the technicalities to be handled

“Surgical precision”

For the Telecom operators

Reliability

Reduced maintenance and management hassles

Low installation and running expenses

Integration with the existing network

Use of proven COTS hardware

Possibility to document the obligation fulfilment

Page 8: Today’s challenges in Lawful Interception

8

Lawful Interception Application fields

Us e

r

“Voice” Recorders,Decoders,Storage,

Doc. production

TechnologyCircuit Switched

Packet Switched

“Voice”Mediation Devices,

SS7 probes

“Data” Recorders,Decoders,Storage,

Doc. production

Gover

nmen

t

Agenci

es

Telc

o“Voice”

Mediation Devices,IP probes

Page 9: Today’s challenges in Lawful Interception

9

LI in Circuit Switched and Packet Switched Networks

(that is, why do we face different issues in the two worlds)

Page 10: Today’s challenges in Lawful Interception

10

Once upon a time …

… the mass telecommunications were only bound to the fixed PSTN network;

no additional functionalities were provided by the handsets;

the transport Network was unique in type and technology, it was based upon Circuit Switching, and the only type of payload transported was VOICE.

In this “fairy tales” world, the interception:

operated over a single network, with good-to-excellent results;

had to deal with a single type of payload (typically ISDN voice over 64 kbps;

due to the circuit switching technology, may e operated in any point of the network between the end points.

PSTN/ISDNNetwork

Page 11: Today’s challenges in Lawful Interception

11

…then it was the turn of fax, modems and mobiles

Fax and Modems still use analog modulation over the CS network in order to transport images, data and internet services.

The mass interception was therefore still possible with CS methodologies, with the only complication of demodulation.

InternetPSTN/ISDN

network

GSM cell

PLMN

GSM cell

InternetServiceProvider

Page 12: Today’s challenges in Lawful Interception

12

…and, suddenly, the security nightmare !!!

Internet

A lot of mass telecommunication traffic today doesn’t traverse ANY part of the well-controlled Circuit Switched network !

IP multimedia traffic between GPRS/UMTS mobile phones;the traffic to and from Internet exchanged on high bandwitdhISPs (ADSL, FTTH, cable…);Telephone traffic between two REAL VoIP terminals, maybe connected to different VoIP operators.

PSTN/ISDNnetwork

InternetServiceProvider

GSM/UMTScell

IP Network

Circuit S.Network

VoIPoperator

2.5G / 3GMobile operator

Page 13: Today’s challenges in Lawful Interception

13

Lawful interception compulsory servicesDepending on the local legislation, the Operator may be requested to provide:

Interception based upon target identityIt is requested to replicate ALL the traffic generated by a single, identifiable target among the multitude of users of the Operatoritself.

Investigative interception based upon parametric searchIt is requested massive filtering of the transported traffic in order to spot UNKNOWN users showing suspect behaviours (in example, exchanging mails containing specific keywords).

Interception over Telecom operator’s servicesIt is requested to replicate IN CLEAR any transaction made by anuser towards a Service exercised by the telecom .

Free access to the networkIt is requested to guarantee proper network access to “black boxes” owned by the law enforcement agencies themselves.

Page 14: Today’s challenges in Lawful Interception

14

New issues connected with IP interception

User Identification

Whilst the correspondence between user credentials and user identity is rarely questioned in the “Voice” world, this is not necessarily true for the IP networks;

Traffic dispersion

The packet switching world poses new issues in terms of tapping points and capture efficiency;

Mass cryptography

In the IP world, cryptography is extensively used and at hand of everybody….

Page 15: Today’s challenges in Lawful Interception

15

User Identification Issues

Availability of reliable user information

No more anonymous access to the network will be provided by world’s telecom operators;

Trusted identity systems

Any mean shall be used to guarantee the correlation between user’s credentials and the physical person accessing the network;

Availability of the user parameters at the capture point

Any network feature hiding user’s identity at the capture point (e.g. NAT) shall be taken into account and suitable workarounds for the authority shall be provided.

Page 16: Today’s challenges in Lawful Interception

16

Traffic dispersion issues

Arpanet was originally conceived in order to deploy a military network able to survive huge, nation-level disasters…

As a result, IP routing follows BY DESIGN several different routes even towards the same target address.

As a consequence, the tapping point is not at all indifferent to the Lawful Interception Activities!

Page 17: Today’s challenges in Lawful Interception

17

Tappin’ around the net

Page 18: Today’s challenges in Lawful Interception

18

E-mail Probing in the access network

LE

Last Mile

ATM / IP WAN

PRA

PSTN

RAS/NAS

POPAggregation

Router

ATM/IPswitch

PSTN users ADSL users Corporate Users

DSLAMPSTN

IPBackbone

Mail Server1 Gb overall Traffic;

2% is e-mail;

=20 mb of packets tobe deeply inspected

Page 19: Today’s challenges in Lawful Interception

19

E-mail Probing in the Central Office

LE

Last Mile

ATM / IP WAN

PRA

PSTN

RAS/NAS

POPAggregation

Router

ATM/IPswitch

PSTN users ADSL users Corporate Users

DSLAMPSTN

IPBackbone

Mail Server1 Gb overall Traffic;

98% is e-mail;

=980 mb of packets tobe deeply inspected

(!!!)

Page 20: Today’s challenges in Lawful Interception

20

Mass Cryptography issues

Over the PSTN network, communication encryption was at disposal of few users; moreover, the few devices available offered backdoors for the agencies;

Over the internet, encryption is at disposal of EVERYBODY. Not in any case backdoors are available;

Whilst the operator may not be held responsible for user-level encryption, it may as well be obliged to provide in-clear interception of the services offered by itself.

Page 21: Today’s challenges in Lawful Interception

21

The ISP in front of the authority.Viable options for the IP LI.

Page 22: Today’s challenges in Lawful Interception

22

In-Band and Out-Band interception

In-band interception implies the use of IIF inplemented in the network devices; it can be succesfully used with any kind of interception based upon user identity:

Circuit based traffic;

Packet traffic over mobile networks (es. GPRS);

Packet traffic over carrier-grade modern switches in ISPs.

Out-band interception imples the use of network probes; it is the only key when:

Parametric (keyword) interception is requested;

The authority doesn’t trust the operator itself or the operator’s personnel in investigative matters.

Page 23: Today’s challenges in Lawful Interception

23

Typical Out-band Interception

IPP

IPP

Access NW

killer

Delivery NW IP-V

MDPMS

Delivery Router

IPP

RP10/100 Ethernet

PoP

Transitpeer

Core Network

10/100 Ethernet

PoP

Server Farm

WebServer

RADIUSServer

FTPServer

EmailServer

Warrant

LIIDProtocol No.Reference LEAInterception DurationInterception Criteria

(username killer)

(1)

(2)

(2)

(3)

Interception of assigned

IP Address

POI

Page 24: Today’s challenges in Lawful Interception

24

Typical Out-band Interception

IPP

IPP

Access NW

killer

IP-V

MDPMS

Delivery Router

IPP

RP10/100 Ethernet

PoP

Transitpeer

Core Network

10/100 Ethernet

PoP

Server Farm

WebServer

RADIUSServer

FTPServer

EmailServer

Warrant

LIIDProtocol No.Reference LEAInterception DurationInterception Criteria

(username = killer)

POI

Delivery NW

IPP

Page 25: Today’s challenges in Lawful Interception

25

Parametric Out-band Interception

(1)

IPP

IPP

Access NW

IP-V

MDPMS

Delivery Router

IPP

RP10/100 Ethernet

PoP

Transitpeer

Core Network

10/100 Ethernet

PoP

Server Farm

WebServer

RADIUSServer

FTPServer

EmailServer

Warrant

LIIDProtocol No.Reference LEAInterception DurationInterception Criteria

(keyword = bomb)

(2)

(2)

(2)

(2)

Delivery NW

Page 26: Today’s challenges in Lawful Interception

26

Parametric Interception (Interception)

IPP

IPP

PSTN / ISDN

VIP

MDPMS

Delivery Router

IPP

RP10/100 Ethernet

PoP

Transitpeer

Core Network

10/100 Ethernet

PoP

Server Farm

WebServer

RADIUSServer

FTPServer

EmailServer

Warrant

LIIDProtocol No.Reference LEAInterception DurationInterception Criteria

(keyword = bomb)Username: tomIP: 212.127.0.5

..I will place a bomb …

IP: 212.127.0.5write bomb

POI

ISDN/VPN

IPP

Page 27: Today’s challenges in Lawful Interception

27

Tactical probing vs. strategic interception (1)

Tactical probes – a definition:

devices that are installed at operator’s premises on a “per need” basis.

Some “common sense” assertions about Tactical probing devices:

small

stealthy

easily movable

typically operated by agencies personnel

dedicated to a few specific interception tasks at a time

totally extraneous respect to the hosting network by definition

Page 28: Today’s challenges in Lawful Interception

28

Tactical probing vs. strategic interception (2)

Strategic Interception – a definition:

An interception network permanently deployed at operator’s premises to serve any present or future interception request.

Some “common sense” assertions about Strategic probing devices:

solid

integrated

permanently connected to the network

typically maintained by telco personnel

dedicated to a huge spread of interception tasks at a time

may be integrated with the hosting network

Page 29: Today’s challenges in Lawful Interception

29

A duofold option for the ISP

1. Open the door to Agencies for Tactical Activities

as a pro, some responsibilities and costs are charged over the Agency rather than over the operator;

as a drawback, the operator will need to support (eventually upon network reconfiguration) the agency’s activities, on a per need basis !

2. Make Room for Strategic interception systems

The operator will face some not recurring costs, only eventually covered by the governement;

However, the impact over the network will be minimized.

Page 30: Today’s challenges in Lawful Interception

30

An only thing is important…

…JUST PUT THE RIGHT PROBE IN

THE RIGHT ENVIRONMENT !

Page 31: Today’s challenges in Lawful Interception

31

A Mixed Approach to LI

Page 32: Today’s challenges in Lawful Interception

32

Classic approach – general principles

Rad

ius

SGU

LastMile

ATM / IP WAN

PRA

PSTN

POP Aggregation Router

PSTN users ADSL users Corporate users

DSLAM

PSTN

IPBackbone

POP boundary

Radius Pb IP Probe

C.O

. boundary

IP overxxx

MediationDevice

(32x)

(1x)

POP boundary

Page 33: Today’s challenges in Lawful Interception

33

Classic Approach

PROsExtensive capture allows many forms of parametric interception (e.g. Keyword search or e-mail addresses);

The solution is totally unobtrusive and is completely impactless on the network architecture;

The solution functionalities may be extended to effective network traffic monitoring as an added value.

Page 34: Today’s challenges in Lawful Interception

34

Classic Approach

CONsmany probes to be placed;

large investment needed;

a lot of space (with access control requirements) to be reserved in the POP;

tapping may be a NIGHTMARE, but the use of span ports may impact network performance;

distributed and secure network connectivity between system elements to be provided;

Some peering traffic is lost (i.e., the peering traffic closing on the same BRAS).

Page 35: Today’s challenges in Lawful Interception

35

Hijack approach – general principles

IP overxxx

Mediation Device

(1x)

Radius Pb

IP Probe

PSTNLast

mile

ATM / IP WAN

POP boundary

RAS/NAS

POPAggregation

Router

ATM/IPswitch

PSTN users ADSL users Corporate Users

DSLAMPSTN

TT

LI POP

Rad

ius

PPP tunnel

L2TP tunnel

IPBackbone

C.O

. bou

ndar

yLI Config

Page 36: Today’s challenges in Lawful Interception

36

Hijack Approach

PROsfew probes to be placed;

low investment needed;

Few space with access control requirements may be reserved anywhere in the network;

tapping is quite simple;

Reduced need of secure network connectivity between system elements;

No peering traffic is lost.

Page 37: Today’s challenges in Lawful Interception

37

Hijack Approach

CONsThe possibility of parametric interception are limited;

The solution needs a slight network re-design;

Not suitable for extensive traffic monitoring.

Page 38: Today’s challenges in Lawful Interception

38

A Service Approach to LI

Page 39: Today’s challenges in Lawful Interception

39

Service interception approach

Any time the telco operator offers some services on its own, it may be obliged to intercept them. Examples are:

VoIP services;

FTP/mail/webmail services;

Videocall over PSTN line;

In ALL those cases, the operator will be asked to get rid of any interception aspect, including traffic encription !

So the solution may lay in Service interception rather than transport interception.

Page 40: Today’s challenges in Lawful Interception

40

Service interception – an example

RAS Service Network

E-mail

MMS

FTP

Autentication

AccessNetwork

Firewall

Internet

Page 41: Today’s challenges in Lawful Interception

41

LI – A flexible approach

Page 42: Today’s challenges in Lawful Interception

42

A flexible LI architecture is the key

The answer to operators interception needs cannot be a “spot” solution for a specific interception issue or a specific service…

… but rather an extensive approach covering – at least in perspective - all interception needs at a time.

Page 43: Today’s challenges in Lawful Interception

43

• Different probing devices are atdisposal of the Network Engineer,granting overall coverage of anyIP LI needs:• General-purpose IP Probes:

• IP probes performing parametric interception may be placed in front of a network server (e.g. e-mail);

• The interception is triggered basing upon service access, regardless the location of the network site accessing the “batch” service.

• IP probes performing typical interception may be used to capture generic IP transactions basing upon IP address, CLI, or keyword;

• A specific access probe may be needed to trigger the interception;

• Access (RADIUS) Probes:• access probes are able to detect a “known” user

accessing the network;• they provide trigger to IP probes as well as access

logging capabilities.

IP Network Probing

Page 44: Today’s challenges in Lawful Interception

44

Mediation Device

It is the central server performing LI information handover from the provider’s domain to the LEA’s domain.

It allows for a simpler and centralised LI network management, whilst optimising network resources usage.

It grants a superior level of control in IP LI activities.

It may be extended to support further capture methodologies, both out-band and in-band.

Page 45: Today’s challenges in Lawful Interception

45

Mediation Device flexible architecture

GSMPSTN

Voice IIFs

VoIPIIFs

GPRS/IPSwitching

IIFs

IPProbes

SwitchingTelephony

Probes

IngressInterface

Ix

IngressInterface

Iy

IngressInterface

Iz

IngressInterface

In

IngressInterface

Ik

Ingre

ss A

dap

tation L

ayer

IRI(HI2)

MEDIATIONFUNCTION

LIID / LEMFand

Config.Database

CC(HI3)

MEDIATION Egre

ss N

orm

aliz

ation a

nd S

ynch

riniz

atio

n L

ayer

EgressInterface

Ex

EgressInterface

Ey

EgressInterface

Ez

EgressInterface

En

EgressInterface

Ek

LeasedPSTNLEMF

LeasedISDNLEMF

IP overISDN/PSTN

LEMF

BroadBandIP

LEMF

LongTerm

Storage

Page 46: Today’s challenges in Lawful Interception

46

Provisioning and Maintenance System

It is the central configuration device for the entire LI network.

It allows the operation of the LI system using minimum personnel.

By supporting different privilege levels, it is the “natural” Man-Machine Interface for:

Maintenance Operators (alarms and devices mgmt);

LEA Operators (Warrants mgmt);

Billing Opertors (where applicable).

Page 47: Today’s challenges in Lawful Interception

47

THANK YOUFor any further info:

Carlo Rogialli

[email protected]