The following text is copyright 2006 by Network World, permission is hearby given for reproduction, as long as attribution is given and this notice is included.

 

Do you have to be ready to tap your boss?

 

By Scott Bradner

 

The U.S. Court of Appeals for the District of Columbia Circuit decided 2-1 (http://pacer.cadc.uscourts.gov/docs/common/opinions/200606/05-1404a.pdf) on June 9th that the FCC was acting within it's statutory authority when it said that much of the Internet had to designed to be wiretapable.   I'm sure that this decision will be appealed and Judge Edwards dissenting opinion on this decision may prevail in the end.  But even if it does, Congress is sure to support the idea that the Internet should not be safe from wiretapping so any FCC defeat would just delay the inevitable.  A less predictable part of the FCC order applies to enterprise networks.  Just what will your corporate network need to be ready to do?

 

So far the FCC has not made it clear if enterprise network managers will need to do anything in response to their order extending the Communications Assistance for law Enforcement (CALEA) to the Internet and voice over IP (VoIP) but there is an ominous hint in a footnote of the original FCC order.  (http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-05-153A1.pdf)  Footnote 100 on page 19 ostensibly deals with educational networks but there is nothing in the order or in the FCC's court filing with the Appeals Court (quoted in a statement by FCC Commissioner Deborah Taylor Tate ( http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-06-56A5.pdf) that limits the impact to networks in educational institutions. 

 

CALEA (http://www.epic.org/privacy/wiretap/calea/calea_law.html) defines what a telecommunications provider must be able to do in response to a proper request from law enforcement.  CALEA covers both information about communications and the communications themselves.  Note that CALEA does not limit what information law enforcement can ask you to provide, it just says what information you must be able to provide or you can get fined up to $10,000 per day that you cannot provide the information.  Just as in other situations, law enforcement can ask for anything that court agrees is relevant to a case and you have to produce any of that information that you are able to produce.

 

 The CALEA law has a specific exemption for "private networks" but if a private network is connected to the Internet footnote 100 and the FCC court filing say that "the connection point between the private and public network is subject to CALEA."  This applies whether the "connection point" is provided by an ISP or by the operator of the private network.    The implication of this is, at best, fuzzy.  It may mean that the router connecting an enterprise network manager to the Internet is subject to CALEA.  It could mean that the ISP router is the CALEA point, but it's hard to see how the ISP could be able to map your boss to an IP address in order to be able to tap his or her Internet usage. Such a mapping becomes all that harder if the enterprise is using a NAT or NAT functionality in their firewall.  The ISP will have to give all of your corporate communications to the cops if they cannot reliably select just your boss's.  For the geeks: enterprise multihoming makes ISP-based tapping even more questionable.

 

Given history, do not expect any useful clarification from the FCC until close to or after the May 14, 2007 effective date of the law.  Meanwhile you might ask your corporate lawyer to look into the long list of things that the final rules (pages 45-50 of

http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-06-56A1.pdf) say that you will have to do if you are subject to CALEA.  Or better yet, get your lawyer to contact your lobbying group and get them to find out how much this is going to hurt.

 

disclaimer: Dealing with pain the way the Harvard Med School suggests (good drugs) has other complications in this type of case and, anyway, the above is my, not the university's opinion.