At 10:34 a.m. 22/10/2015, B. Morgan Murrah wrote: <snip>
Ill retract and say I no longer actively solicit any information from NetOps about their experiences with compliance but appreciate any further engagement above link.
In the years after 9/11 (I don't remember which one sorry, 2003 or 2004) there was a meeting called between the Network Operators and Police and GCSB. This was to ensure we all had interception capabilities. We explained that in a modern packet based network, especially distributed metro "LAN" style networks, interception in the traditional sense was difficult if not impossible Many metro networks have no "exchange" but many switching centres. This was new to the authorities and a degree of education and explanation took place. I suspect TICSA is a result of that and a way to ensure that as network technologies change the requirement for interception capability is not forgotten. You probably aren't aware that such capabilities are more frequently used by the operator for their own commercial requirements, mainly fraud detection. Other utilities, especially electric power and gas also have active systems for looking after fraud, interference and other "unusual" activities by clients. In electricity in Wellington we would have had around 10 incidents a year in the 1980's, mainly fraud related, but all dealt with by "network adjustments". In the broad sense, even waster, dirty water and waste operators are all working with these issues. So don't get too worked up over TICSA. It doesn't seem too onerous compared with what a utility faces daily.