CALEA Filings and Procedural Steps

Download Report

Transcript CALEA Filings and Procedural Steps

CALEA Filings
and Procedural Steps
Mary Eileen McLaughlin
Merit – Director Technical Operations
January 31, 2006
Agenda





Key dates
Requirements
Review of forms to be filed
Resources for forms, explanations, examples,
cover letters
Other recommended internal policies
DISCLAIMER
This presentation in no way should be
considered legal advice. It is a review of
Merit’s understanding of and plans for CALEA
filings.
Three Key Dates

February 12, 2007
– Entities that the FCC believes need to be CALEA
compliant must file the FCC form 445
– File with FCC and with FBI

March 12, 2007
– Entities filing form 445 file a Systems Security and
Integrity Plan
– File with FCC and Homeland Security Bureau

May 14, 2007
– Entities must have network compliance,
– Unless on form 445 another date, and rationale
was noted
Form 445 due February 12th
Pretty Simple


Name, state, contact info, parent company
(e.g.,R&E net that is part of a university)
FCC Registration number (FRN)
– Must get one at www.fcc.gov, CORES link which is
COmmission REgistration System
– FCC Registration is required to conduct business
with the FCC
– Merit has FRN because of USF work
– This number will be used to uniquely identify you
in all transactions with the FCC
cont.
Form 445, cont.

Filer’s 499 ID
– Form 499 is only required if a network
pays into Universal Service,
Telecommunications Relay Service,
Number Administration, Local Number
Portability Support Mechanisms
– Merit doesn’t, and likely no R&E nets do;
universities, libraries certainly don’t

Filer checks whether it will be compliant
by 5/14/07 or not
cont.
Form 445, cont.

Compliance method is identified by a
checkbox
– Proprietary/Custom or 3rd party


Write the standard used (Draft Standard
PTSC-LAES-2006-084R6)
Proprietary/custom solution
– Merit will get legal advice, but the assumption is
that our solution is neither
– Check if DOJ has been consulted -- Merit has not

Check if Filer is using a Trusted Third Party,
and if so, who;
Form 445, cont.
Trusted Third Parties (TTPs) Can:


Assist in meeting filer’s CALEA obligations
Provide LEAs the electronic surveillance
information those agencies require
– In an acceptable format


Services include: processing requests for
intercepts, conducting electronic surveillance,
and delivering relevant information to LEAs.
The entity (not the TTP) remains responsible
for,
– Ensuring the timely delivery of call-identifying
information and call content
– And for protecting subscriber privacy, as required
by CALEA.
cont.
Form 445, cont.

If filer won’t be compliant by 5/14, state
why:
– Equipment – identify equipment by model
type/manufacturer that is responsible for
the delay
– Network installation – brief description of
circumstances contributing to delay
– Manufacturer support -- brief description of
circumstances contributing to delay
– Other – any other circumstances

Also describe Mediation actions – what
steps being taken to resolve the
circumstances causing delay
cont.
Form 445, cont.

Note: “Lack of final standard” isn’t on the list of
reasons for delay in compliance
– FBI quote: “Their [telecom standards organizations]
previous foot-dragging was one of the complaints of
the Joint Law Enforcement Petition for Expedited
Rulemaking that resulted in the FCC's Second Report
and Order.”
– “An entity does not need to know the exact specifics of
a standard to comply with the FCC's SS&I and
Monitoring Report requirement. Solutions vendors
know which standard they will build to and only minor
Software changes will be required.” (!)

Finally, a company officer of the Filer signs FCC
Form 445 and it’s filed
System Security and Integrity Plan
Purpose
 Ensure that interception can be
activated only in accordance with
appropriate legal authorization
 With affirmative intervention of an
individual officer of the entity
 In accordance with regulations
prescribed by FCC
 And to ensure LEAs get the information
 Also, apparently not onerous
Very Different SSI Examples
Printouts in workshop binder
 Blank “templates” at Educause website

– Highly recommended because they take
2nd R&O and incorporate terms into plan
2-page plan by U.S. LEC
 4-page plan by Honeybee Networks
 15-page plan by MetroPCS
 Merit plans to be brief

– Will draft a plan by end of February and
circulate to the community for
comment/reference
SSI Components - General

Appoint a senior officer or employee to
ensure that activation only in accordance with
lawful authorization
– Name and job function
– 24/7 contact information


Merit plans to identify our CEO and an
alternate, and have our NOC be the 24/7
contact point
Process to report any act of compromise of
lawful intercept or unlawful surveillance
SSI Components – Record Retention



Must maintain secure and accurate record of
interception of communications
– Legal or not
– In the form of a “Certification”
Certification includes:
– Identifying number/address
– Start date
– Identify of LEA officer
– Name of person signing the legal authorization
– Type of interception
– Name of employee overseeing
– Signed by employee overseeing
Must maintain records for a reasonable period of time
as determined by entity
So…Required Forms Not Onerous

What may be more difficult is to actually act
on a subpoena
– Few and far between
– People change jobs
– CALEA and other laws differ

Merit recommends that every network
organization have a network “abuse” policy
– Recommend that it be reviewed annually, e.g., at
budget time
– Or pick a time – like changing batteries in the
home smoke detector with daylight savings time
changes
Merit’s Network Abuse Policy
Example Topics Included
 Triaging abuse complaints – Serious is:
– Life or physical well being is threatened
– Data could be destroyed, or confidential
data exposed
– DDOS attack

Actions
– Refer complainant to his ISP if not serious
(e.g., spam)
– Open incident report
– Open NOC trouble ticket, escalate
– Management approval for some action
Network Abuse Policy Being Revised


CALEA requires new procedures
Today, we “only release information about
individuals to the organization with which they
are associated, not to third parties”
– Today, LEAs are always 3rd parties
– If there is a CALEA request, this doesn’t fit
– In fact, we can’t let the organization know

Today we have a management approval
chain, and no one employee makes a
decision or takes action
– If there is a CALEA request, this doesn’t fit

We will revise our internal network abuse
policies and share with the community
– Perhaps in parallel with the SSI draft
References – www.fcc.gov

Public Notice - Compliance Monitoring Report
– DA 06-2512, December 14, 2006
– OMB Control Number 3060-0809

Public Notice - Systems Security and Integrity
Filing Requirement
– DA 06-2512, December 14, 2006
– OMB Control Number 3060-0809

Systems Security and Integrity Plans
components
– CALEA of 1994 – Pub.L. No. 103-414, 108 Stat.
4279
– FCC 64 FR 51469, Sept. 23, 1999
– FCC 2nd Report and Order, May 12, 2006,
Appendix B, page 44, for SSI (useful definitions)
References, cont.

Easiest source: Educause CALEA
resource page
– http://www.educause.edu/Browse/645?PARE
NT_ID=698
– Includes FCC public notices, forms, example
cover letter for SSI, other background

www.askcalea.gov (FBI site)