Top Banner
À!I IIFOR}TÀTION CONTÀTIi'ED IIEREIN I5 lJNCLÀssIFIED DÀTE tr-24-2008 BE 6032Z|VCLRP.iP,I,/EHL NATIONAL LAWFUL INTERCEPT STRATEGY Current and Future Challenges Operational Technology Division
82

national lawful intercept strategy - Electronic Frontier Foundation

Feb 09, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: national lawful intercept strategy - Electronic Frontier Foundation

À!I IIFOR}TÀTION CONTÀTIi'ED

IIEREIN I5 lJNCLÀssIFIEDDÀTE tr-24-2008 BE 6032Z|VCLRP.iP,I,/EHL

NATIONAL LAWFUL INTERCEPT STRATEGYCurrent and Future Challenges

Operational Technology Division

Page 2: national lawful intercept strategy - Electronic Frontier Foundation

LAWFUL INTERCEPT CAPABILITIES ARE ERODINGAND AT RISK OF GOING DARK

Existing trends indicate the FBI will (spread electronic surveiffance d¡fficü

ave substantial and widetlss i,n 2 to 3 years

b:Þ rL

stabfe communication env_ironment from time terephoneinvented in 1876 until t gec --Áiä;ä;äer craham Betl

Page 3: national lawful intercept strategy - Electronic Frontier Foundation

MULTIPLE ACCESS METHODS TO A VARIETY OF SERVICES

Page 4: national lawful intercept strategy - Electronic Frontier Foundation

ALWAYS ON, ALWAYS CONNECTED, ALWAYS MOVINGWIRELESS SERVICES / CAPABILITIES

Cingular 8525 Blackberry Curve

- !!F

-E.' :

Samsung Blackjack

H¡Phone

g

Ëatat

2.sG (GPRS)

3G (UMrS)

Wi.F¡Bluetooth

GPS

3rd Party Appl¡catjonsCameraKeyboard

Touch ScreenPrice (w¡th contract)

''T- .Ihrbile.

Page 5: national lawful intercept strategy - Electronic Frontier Foundation

WI-FI OVERVIEW

san Francisco coverage (from wigre.net)t;- ---\-

lE¡;i.i;+l,ii¡.ri:ir{,fi

'::it:'ií-;,i :

#ffi

Page 6: national lawful intercept strategy - Electronic Frontier Foundation

A BLETCHLEY PARK APPROACH TO THE PROBLEM

Page 7: national lawful intercept strategy - Electronic Frontier Foundation

ELECTRONIC SURVEILLANCE IS A FOUNDATION OFTHE FBI'S STRATEGIC FRAMEWORK

T6 - Align technology and science to ourstrategic objectives Lover¡ge Tochnology ¡nd Sc,lence .

T7 - Deploy fechnology and science to

--

,# maKeour wo¡kforcemoreeffectiveandeficient

Page 8: national lawful intercept strategy - Electronic Frontier Foundation

BACKUP MATERIAL

Page 9: national lawful intercept strategy - Electronic Frontier Foundation

NATIONAL LAWFUL INTERCEPT STRATEGY

Enhanced cooperation between faw enforcement andindustry

Enhanced cooperation and coordination across the lawenforcement

lomTu.nity (Nationat Lawful InterceptCoordination Center)

updated authorities (protection of sensitive/proprietaryinformation from industry etc.)

Update legal mandates (CALEA etc.)

Adequate resources and infrastructure for the lawenforcement community

Page 10: national lawful intercept strategy - Electronic Frontier Foundation

NATIONAL LAWFUL INTERCEPT STRATEGYcurrent and Future challenges

Operational Technology Division

Ð;fÞÞT¡IF..{ F t¡.FT

HHFttl- E,I HO

r.J Lñ 'dtqÞ

I'J t Fl|ff-)H|fFOÕ0Þ4uÈlLc(l'r¡ Fl tf11crìHH,r!1FL.JÞHr.J 4rù rq\tJf'1ts{F¡É

c{

H

tr{

Page 11: national lawful intercept strategy - Electronic Frontier Foundation
Page 12: national lawful intercept strategy - Electronic Frontier Foundation
Page 13: national lawful intercept strategy - Electronic Frontier Foundation
Page 14: national lawful intercept strategy - Electronic Frontier Foundation
Page 15: national lawful intercept strategy - Electronic Frontier Foundation
Page 16: national lawful intercept strategy - Electronic Frontier Foundation
Page 17: national lawful intercept strategy - Electronic Frontier Foundation
Page 18: national lawful intercept strategy - Electronic Frontier Foundation
Page 19: national lawful intercept strategy - Electronic Frontier Foundation
Page 20: national lawful intercept strategy - Electronic Frontier Foundation
Page 21: national lawful intercept strategy - Electronic Frontier Foundation
Page 22: national lawful intercept strategy - Electronic Frontier Foundation
Page 23: national lawful intercept strategy - Electronic Frontier Foundation

13

Page 24: national lawful intercept strategy - Electronic Frontier Foundation
Page 25: national lawful intercept strategy - Electronic Frontier Foundation
Page 26: national lawful intercept strategy - Electronic Frontier Foundation
Page 27: national lawful intercept strategy - Electronic Frontier Foundation

t7

Page 28: national lawful intercept strategy - Electronic Frontier Foundation
Page 29: national lawful intercept strategy - Electronic Frontier Foundation
Page 30: national lawful intercept strategy - Electronic Frontier Foundation
Page 31: national lawful intercept strategy - Electronic Frontier Foundation

2t

Page 32: national lawful intercept strategy - Electronic Frontier Foundation
Page 33: national lawful intercept strategy - Electronic Frontier Foundation
Page 34: national lawful intercept strategy - Electronic Frontier Foundation
Page 35: national lawful intercept strategy - Electronic Frontier Foundation
Page 36: national lawful intercept strategy - Electronic Frontier Foundation

26

Page 37: national lawful intercept strategy - Electronic Frontier Foundation
Page 38: national lawful intercept strategy - Electronic Frontier Foundation
Page 39: national lawful intercept strategy - Electronic Frontier Foundation
Page 40: national lawful intercept strategy - Electronic Frontier Foundation
Page 41: national lawful intercept strategy - Electronic Frontier Foundation
Page 42: national lawful intercept strategy - Electronic Frontier Foundation
Page 43: national lawful intercept strategy - Electronic Frontier Foundation
Page 44: national lawful intercept strategy - Electronic Frontier Foundation
Page 45: national lawful intercept strategy - Electronic Frontier Foundation
Page 46: national lawful intercept strategy - Electronic Frontier Foundation
Page 47: national lawful intercept strategy - Electronic Frontier Foundation
Page 48: national lawful intercept strategy - Electronic Frontier Foundation
Page 49: national lawful intercept strategy - Electronic Frontier Foundation
Page 50: national lawful intercept strategy - Electronic Frontier Foundation
Page 51: national lawful intercept strategy - Electronic Frontier Foundation
Page 52: national lawful intercept strategy - Electronic Frontier Foundation
Page 53: national lawful intercept strategy - Electronic Frontier Foundation
Page 54: national lawful intercept strategy - Electronic Frontier Foundation
Page 55: national lawful intercept strategy - Electronic Frontier Foundation
Page 56: national lawful intercept strategy - Electronic Frontier Foundation
Page 57: national lawful intercept strategy - Electronic Frontier Foundation
Page 58: national lawful intercept strategy - Electronic Frontier Foundation
Page 59: national lawful intercept strategy - Electronic Frontier Foundation
Page 60: national lawful intercept strategy - Electronic Frontier Foundation
Page 61: national lawful intercept strategy - Electronic Frontier Foundation
Page 62: national lawful intercept strategy - Electronic Frontier Foundation
Page 63: national lawful intercept strategy - Electronic Frontier Foundation
Page 64: national lawful intercept strategy - Electronic Frontier Foundation
Page 65: national lawful intercept strategy - Electronic Frontier Foundation

ATT II'IFORHÀTIOI'I üDI.ITATIIED

TIEREIIü IS IJ}ICLq.55IFIEDDATE 1t-24-200Ê Er 6æZZllJtLÈp/p,1/EHt

b6b?C

I

ÉdrrË :

=aÐ-go{i[s-ggã,Ë'ËFgëËdrff-ö ä'geöúi=

-rdÐ5€Goo

f-g{rà'

{

Page 66: national lawful intercept strategy - Electronic Frontier Foundation

c{@A.ENDA

o Technlcaf Challenges Presented by EmergtngTechnologþs

o tttlgraüon ln Wreless Handset Gapablllües

ÞlNa-

Page 67: national lawful intercept strategy - Electronic Frontier Foundation

INTERCEPTION CHALLENGES RESULTING FROMEMERGING PACKET-BASED COMMUNICATION SERVICES

i M Eentfces are erloþlrìg to ofror newfeaturQs anrd capablllües to subserlbers whhh rere notavallable on üadlüonal teleconrmunlcatlon netrcrks

' Thb evoluüon preEents Ee\teral dìallengesto lawen@lrildudlng

Page 68: national lawful intercept strategy - Electronic Frontier Foundation

TARGET IVIOBILITY

t¡lC.J F-J] JI

NZ¡Io / subscriber may roam from location to location wíthout impacting theirservrces

c "l/-/Eorth1|n&

m@Løw Enforcement

l^,' .r:..¡.-.\r,. - J Ji..ii__.r:.!

@ØINETZERO

-

Page 69: national lawful intercept strategy - Electronic Frontier Foundation

ünvo@TARGET IDENTIFICATION

TargetAddress A

AMw,bødgu¡@wffi.com

= Good Account

= Address A

ünttEnftw*^t7Ðs.^3

w

,ffiæw,,llrw*ß=.ffihæA

WWtu* MWM*

Page 70: national lawful intercept strategy - Electronic Frontier Foundation

ENCRYPTION

ÞlôJ t-.

Law Enforcemenl

Page 71: national lawful intercept strategy - Electronic Frontier Foundation

"@ 'EER-T'-'EER

c.¡ t*--a!

Løw Enforcement

Page 72: national lawful intercept strategy - Electronic Frontier Foundation

CELLULAR COMMUNICATION SERVICES -THE "PERFECT STORM'' OF CHALLENGES

¡ ModeT:f!?I.t phones combl.e the mobilts ofhadlüonal cell phorrês wtÛr Hre capab¡mru of fixedcomputers

¡ Wll become more popularutllh 61e e\reregeGonsumeres costs ere rcduced and heti:lntrÐilacesbecome more eæsslbþ (*ó., eppl";ò rÞiiàñCi--i

Page 73: national lawful intercept strategy - Electronic Frontier Foundation

ALWAYS ON, ALWAYS CONNECTED, ALWAYS MOVINGWIRELESS SERVICES / CAPABILITIES

Ëatat

z.tc (cPß$)3G (UMTS)

vrnBlaetooth

6TTT

3rd Pany Applicøtions

Keyboaú

Tooú ScrlenPrice (with contract)

.-T--tr'lobile.

DWbryúrc SetrrqDfiú

Page 74: national lawful intercept strategy - Electronic Frontier Foundation

ELECTRONIC SURVEILLANC TRENDS .WHERE TITLE III WIRETAP AUTHORIZATIONS OCCUR

. Shlftln loceüon of wflctrps

' tfirchss I mobllo tochnologhr ilo g¡o prhncdmcdlum of communlcrtþns fior tergcts

I 991

ffi

2006

Page 75: national lawful intercept strategy - Electronic Frontier Foundation

PROCESSING AND VIEWING COLLECTED DATA

i¡ QnpnhDoHed,,Laweffirccmmmrü* plgoÊÊs ttC hdtiktrd¡

¡ r e ìa

eBpxorüom'r X,ffiy'pfi@Jaffi ,Wnridntnær.ffir;ñrlLñÊ€ds

II

qìffir/äIþ,

Wffi{Wrqg¡ilttngq@&tæ.-{øffitñsîrþrr@IiløiÑ.@lg6tø¡rqfilÞmsffi

r hrpds.ofmvahrcofdaheøtcdcql'¡ W.@@-ryfrWtreqprrÊ3

vq¡nlltrarnftEÍe¡ø4p'r $gril.tr@JîÉ UC neø¿rc arengufiø) ¡ø ædVæ dil üilÊ @W&rdffil

Page 76: national lawful intercept strategy - Electronic Frontier Foundation

TECHNICAL CHALLENGES WITH PROTOCOLPROCESSING AND APPLICATION COMPLEXITY

o lmplementatlons of packetùased segæs nolonger çlyon standärdÞed arcfrltþctrres andprotocolsrrNllæn\We#.d¡-&Æ¡F#4llærnvfæsanebuflft

upørttn¡@rnr€fiâmdbrdt@larWW¡tøwryøffis¡¡¡p*

- Ðßtnt ün¡e BMwdø wnil and¡t¡6*u ¡rW æ ryj¡Wnpgfi@dtm¡ aprøuidWr"sryfffrørrîwfiürwr - "'-'r' e-

,¡ çJræfæ attt e¡tnvfiiantrm¡ent øf erg¡nütrmnrt wx¡wflfM før uørtøt¡løns tntrrnpHrnøntøtlørtt

H¡øuldÐru wnfttni¡uø[f,iyt u@&¡tp-and mffiftytrlhetr ar{l/ræfføns tø Wfilrtøfie Wfn@frfue --'- --''t -¿r¡qr,v="-"¡rz¡,.¡ì¿

llnf¡øxrnøItøn aunÍtØMÞ ffnr øn¡e nú-vue'¡tn tîrry nøt W auniløUte fmlarmfilnør

Page 77: national lawful intercept strategy - Electronic Frontier Foundation

CHALLENGES WITH TITIE III INTERCEPTION OFEII,IERG ING TECH NOLOGIES

The comblaüon of several tecfin¡cel hctorspresent unhue ]egal cfialbngÊs vútfii thelnterceptbn of packet commùnbaüons

Page 78: national lawful intercept strategy - Electronic Frontier Foundation

TITLE ll¡ GOVERAGE: KEY DEFINITIONS

ilnteræpf * ecqulrlng æntents of a@mmunlcatlon uslng a devToe*contents'- substanoe pumort or meanlng of aGommunlcatonnwlre communlcaüon" -'ir frnnrollvfng tthr@ hrulnnørnr voføe

- €rt ljeast WW üh,nouglhr uæ øf awüne

- fndJuldlee tfh,nough a *suyijt-çJhfng str-arü@ni'

'¡ f nrciudles *d@ffiwnt fto st-onagp' øfr a @Mfriúfiî¡trurnrficøtfionr

Page 79: national lawful intercept strategy - Electronic Frontier Foundation

TITLE lll COVERAGE: KEY DEF|NIT|ONS

i *elecüonlc @mmunlcaüon' - eny ftansþr ofslgns, sþnals, wrtüng, lmages, sounds, data orlntelllgence of any natunÐ, üansmltted ln wholeor in part byìillrê, radlo, ebchomegneüqphotoelectronlc, or photoopücel system exoept:- @! wtne w wr@tll çøntnn¡ulnl@rtdont

-

-t[@ßMng¡ dlevfræ

- ellæff@nrlCI fuindB trarnsfer

Page 80: national lawful intercept strategy - Electronic Frontier Foundation

ìË

CHALLENGES IDENTIFYING WIRE AND ELECTRONICCOMMUNICATIONS IN PACKET NETWORKS

Page 81: national lawful intercept strategy - Electronic Frontier Foundation

SUMMARY

Erne.rgi¡q tecfinologles present a unigue æt ofrecnroef g?lFgl$ g lgq.g@rcemeritb abifig roA ,Âr^.al-.^{consduct elecffion

¡ Gellularoommqniaüons are becomlns rnoresophft¡c.ated, ofreted all of t e Cpa-ËlÌtää-ùrtetouslyassociated vvth frted bfoadbend'g€n l'ces inä

!v-vr

moblle, llght weþht device

bsurvellalnæ

Page 82: national lawful intercept strategy - Electronic Frontier Foundation

oCmoJo=o