Solved

Voip and Communications Assistance for  Law Enforcement  Act

Posted on 2011-03-23
1
311 Views
Last Modified: 2012-05-11
Hi:
I need help in resolving the following question:
I have a company which uses Voip which has a server with all the company user’s registered names. That server is used to set up each call by giving each participant the IP address of the other party. The actual phone calls are peer to peer encrypted links ( which do not go through any of  my servers, and the keys do not come from the company but, instead it comes from a Diffie Helman exchange).
My company is required to comply with the Communications Assistance for  Law Enforcement  Act (CALEA) for all calls to and from USA phones.
A)      How can my company determine if a phone call is being made in the USA?
B)      Where would the CALEA have to put the hardware or software to eavesdrop on the calls?


0
Comment
Question by:Sundayy
1 Comment
 
LVL 40

Accepted Solution

by:
noci earned 500 total points
ID: 35203367
The only way I can see is that you need some "Man in the middle" ...
for example a proxy server that is presented to both as the endpoint, on that endpoint you can log a conversation.
If you have a zrtp based connection this will not exactly work though. ( due to the missing end to end encryption)...
It might not even work in your case depending on the protocol around the DH exchange.
It might be sufficient to have the encrypted stream and a key to decode the data (if that is possible), then you just need a proxy that logs the raw stream (still a proxy in the middle) + a way to get the key.

This might be tough to undoable depending on the exact technology involved.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article is focussed on erradicating the confusion with slash notations. This article will help you identify and understand the purpose and use of slash notations. A deep understanding of this will help you identify networks quicker especially w…
There are times where you would like to have access to information that is only available from a different network. This network could be down the hall, or across country. If each of the network sites have access to the internet, you can create a ne…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question