SlideShare a Scribd company logo
1 of 20
EMAIL INTERCEPTION
FOR THE GOOD GUYS
Why and How Would My Hosting Service Intercept Emails?
How Do the Rules Apply in Real Life?
BOGDAN MOLDOVAN
CEO
Head of Sales and Professional Services
Phone: +40-21-303-2080
Mobile: +40 722 402 868
Skype: bogdan_m
Email: bogdan.moldovan@axigen.com
Integrated all-in-one
email, calendaring &
collaboration, masterfully
built on unique mail
server technologies, for
increased speed &
security.
• Developed by Axigen Messaging, EU-
based vendor in the messaging industry
• Designed to meet the email hosting
needs of Service Providers of all sizes
• Axigen’s mission is to enable CSPs to
deliver a premium, all-in-one
communication and collaboration
service, with an awesome experience for
their end customers.
You’ll most likely find
the content relevant if
you’re wearing one of
these hats
• Product Manager for the Email Hosting
Service
• Compliance Officers
• Technical Architects of Email Hosting
Services
• Technical Level - Intermediate to
advanced
• Curious about legal provisions regarding
lawful interception in the EU and
Romania
What this presentation
covers
• Intro to the Legal Framework, legal
provisions
• We’ll focus on the EU and deep dive into
some examples of the Romanian (our HQ)
Legislation
• We’ll also touch (a few notes) on the statutory
provisions in the US (although we did not
investigate American case-law)
• A selection of technical strategies and
tactics that apply to email legal
interception
What you’ll NOT
find here
• Legal hold
• Workplace surveillance
DID YOU SEE WHAT HAPPENED RECENTLY?
EU RELEVANT LEGAL FRAMEWORK
Different Location, Different Lawful Interception Regulations
Your company will have to comply with local and national laws. It’s mandatory to seek
legal advice for what is relevant in your national law, and we recommend doing so as early
as possible during the setup procedures.
When you talk to a legal representation in your local country, you must brief them about
your current logging procedures; what you currently log and why, what you do with it,
and who has access to that so they can tell you from the purpose of lawful intercept what
you should do moving forward.
This is done on a case-by-case basis, only under legal advice. It helps to be prepared. You
will usually have a specific amount of time (depending on the country) to comply and
respond, so it will be challenging to comply if you aren’t prepared.
• European Convention on Human Rights
• Budapest Convention on Cybercrime
• Case-law of the European Court of Justice
(mainly judgements in cases Digital Ireland,
Tele2 Sverige and La Quadrature du Net) and of
the European Court of Human Rights
EU RELEVANT LEGAL FRAMEWORK
• Directive 2002/58/EC concerning the
processing of personal data and the
protection of privacy in the electronic
communications sector
• Principle of communications’ confidentiality –
article 5
• Exception – article 15(1)
• Charter of Fundamental Rights of the EU
• CJEU declared the Directive 2006/24/EC invalid,
considering that the EU legislature exceeded the
limits of the proportionality principle:
EU law does not currently provide for
an obligation to retain data.
• However, Member States remain able to
introduce exceptions to the main obligation of
ensuring confidentiality of electronic
communications
EU LEGISLATION – DIRECTIVE 2006/24/EC
• Article 5 of Directive 2006/24/EC provided for
the retention of data necessary to:
• trace and identify the source of a communication;
• identify the destination of a communication;
• identify the date, time and duration of a
communication;
• identify the type of communication;
• identify users’ communication equipment;
• identify the location of mobile communication
equipment.
• Article 5 paragraph 2 of Directive 2006/24/EC:
No data revealing the content of the
communication may be retained
pursuant to this Directive
“
EU: EXCEPTIONS TO THE MAIN OBLIGATION OF
ENSURING CONFIDENTIALITY OF ELECTRONIC
COMMUNICATIONS
The exact conditions under which data
must be retained and disclosed to
authorities are governed by national laws.
• A national measure that derogates from
the confidentiality of communications and
related traffic data principle must be
strictly proportionate to the intended
purpose; such measure must comply to
several rules.
SHORT U.S. NOTES
The Fourth Amendment,
governing the right to privacy
Electronic Communications Privacy
Act (“ECPA”), enacted by the
Congress in 1986
Stored Communication Act.
Title II of the ECPA
Case-law on these matters
CASE STUDY: ROMANIA
GEO 111/2011, Decision 987/2012 and
Decision 987/2012
• Mostly aimed to assist the Romanian Informational
Service
Criminal Procedure Code
• In the Romanian law, service providers are
obliged under the Criminal Procedure Code to
cooperate with authorities and respond to
their requests regarding data.
• The cooperation can take the following forms:
• Interception of any type of distance communication
(Art. 138-146 of the Criminal Procedure Code);
• Preservation of computer data (Art. 154 of the
Criminal Procedure Code).
Law 506/2004
• Covers the processing of personal data and the
protection of private life in the area of electronic
communications
• The approval of the court has the role of censoring
potential violation of private life and the provider
can not censor or limit the request.
CASE STUDY: ROMANIA
Things to ask yourself.
• What is the obligation to keep historical
records of content (e.g. actual email and
attachments)?
• Can I (as an operator) be required by local
authorities to provide communication
content (e.g. actual email and attachments)?
• How can I (as email hosting operator)
validate that the request is valid?
• Who are the email addresses that our
suspect (suspect@domain.com) has
communicated with in the past 30 - 60
days?
• What are the emails currently in his
mailbox?
• We need to monitor all future email
communication and intercept also content
of emails?
• For how long does an operator need to
keep historical records of metadata (who
sent an email to whom on which date)?
SOME TECH STUFF… FINALLY…
Core Basic Concepts
• Email Communication & Mailbox Access Logs
• Accessing the email content (Subject and Body)
Several aspects behind all these
questions that span:
• product capabilities,
• internal processes,
• various other integration points with other
systems (Monitoring and Alarming, Logging
and Reporting, Backup and Restore, etc).
# Logs, Logs, Logs
Email Communication
SOME TECH STUFF… FINALLY…
• Querying these logs should be subject to access
control lists and should be audited
• Example of such a log line (anonymized with
***):
• Is is best practice to aggregate all the logs
from all the nodes in your email hosting
platform into a separate platform
• A syslog server
• An Axigen log gathering server
• An ElasticSearch / Kibana server
• A Graylog server (see more here)
• Any other log centralization solution
• That platform should implement the retention
policies in sync with regulatory requirements
2021-04-08 14:20:08 +0300 08 mailPROCESSING:001141BE:
New mail <1617880807728676528@fe1.axigen.lan>
received from fe1.axigen.lan (192.168.1.226) with
envelope from <r***n@axigen.com>, authenticated as
<r***n@axigen.com>, recipients=8 (a***u@axigen.com,
i***s@axigen.com, v***n@axigen.com, f***a@axigen.com,
b***m@axigen.com, t***k@axigen.com, c***e@axigen.com,
r***n@axigen.com), size=7236, enqueued with id 2215C4
(orgid=2A2B93)
Mailbox Access logs
SOME TECH STUFF… FINALLY…
• Example of such a log line:
• On all Axigen Systems logs, there is a special
log file, called security.txt, which is also
captured and sent to the OBF Platform.
• This log file captures the logins via various
client access protocols (Mailbox REST API,
WebMail, IMAP, SMTP, etc.), remote IP
address, and corresponding statuses
(successful or unsuccessful).
2021-04-08 12:24:53 +0300 02 mail
SECURITY:WEBMAIL;000235BD;192.168.1.226;37885;OP_OK;a
xigen.test99@axigen.com;Android-
Mail/2021.03.07.364486182.Release;Authentication
successful;
Accessing the Email Content (Subject, Body, Attachments)
SOME TECH STUFF… FINALLY…
• All of these cases require various configurations
that can be made on the existing product and
existing integrations.
• For a more detailed discussion, you can refer
to How to Implement Email Archiving with
Axigen and our dedicated Lawful Interception
for Service Providers article.
• Now, from a product standpoint, the email
content of an email can be accessed:
• by the user himself
• by any other user which is granted access on the
original user’s mailbox (e.g. Sharing)
• by creating a copy of the message and storing it
in an separate mailbox along with the original
mailbox
• by redirecting a copy of inbound and/or
outbound messages of a certain user to an
external mailbox (can be an email address from
the legal authorities)
• by accessing a past backup and extracting the
NOT TO BE ALLOWED UNDER NORMAL CIRCUMSTANCES.
MUST BE GATED BY PROCESSES AND ACCESS RESTRICTIONS.
Our email server:
Thank you for reading!
Follow us on Facebook, Twitter, or LinkedIn

More Related Content

What's hot

What's hot (11)

IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 Final
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
 
Legal update - Leeds
Legal update - LeedsLegal update - Leeds
Legal update - Leeds
 
SSl and certificates
SSl and certificatesSSl and certificates
SSl and certificates
 
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights
 
Legal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataLegal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students data
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
 
E-Justice in Central and Eastern Europe
E-Justice in Central and Eastern Europe E-Justice in Central and Eastern Europe
E-Justice in Central and Eastern Europe
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 

Similar to Email Interception For The Good Guys | CloudFest 2021

installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
TadeseBeyene
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
TadeseBeyene
 
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docxPart 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
herbertwilson5999
 

Similar to Email Interception For The Good Guys | CloudFest 2021 (20)

Unit Iv
Unit IvUnit Iv
Unit Iv
 
installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Trade Digitalisation - Trade Trust
Trade Digitalisation - Trade TrustTrade Digitalisation - Trade Trust
Trade Digitalisation - Trade Trust
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
Legal Markup Generation in the Large: An Experience Report
Legal Markup Generation in the Large: An Experience ReportLegal Markup Generation in the Large: An Experience Report
Legal Markup Generation in the Large: An Experience Report
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
install and manage network protocol .pptx
install and manage network protocol .pptxinstall and manage network protocol .pptx
install and manage network protocol .pptx
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
Ecommerce_Ch3.ppt
Ecommerce_Ch3.pptEcommerce_Ch3.ppt
Ecommerce_Ch3.ppt
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docxPart 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Tssn ppt(en.39) data netwok standards
Tssn ppt(en.39) data netwok standardsTssn ppt(en.39) data netwok standards
Tssn ppt(en.39) data netwok standards
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Basics of ecommerce part2
Basics of ecommerce part2Basics of ecommerce part2
Basics of ecommerce part2
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)Dc lec-05 (protocols & standards)
Dc lec-05 (protocols & standards)
 

Recently uploaded

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 

Email Interception For The Good Guys | CloudFest 2021

  • 1. EMAIL INTERCEPTION FOR THE GOOD GUYS Why and How Would My Hosting Service Intercept Emails? How Do the Rules Apply in Real Life?
  • 2. BOGDAN MOLDOVAN CEO Head of Sales and Professional Services Phone: +40-21-303-2080 Mobile: +40 722 402 868 Skype: bogdan_m Email: bogdan.moldovan@axigen.com
  • 3. Integrated all-in-one email, calendaring & collaboration, masterfully built on unique mail server technologies, for increased speed & security. • Developed by Axigen Messaging, EU- based vendor in the messaging industry • Designed to meet the email hosting needs of Service Providers of all sizes • Axigen’s mission is to enable CSPs to deliver a premium, all-in-one communication and collaboration service, with an awesome experience for their end customers.
  • 4. You’ll most likely find the content relevant if you’re wearing one of these hats • Product Manager for the Email Hosting Service • Compliance Officers • Technical Architects of Email Hosting Services • Technical Level - Intermediate to advanced • Curious about legal provisions regarding lawful interception in the EU and Romania
  • 5. What this presentation covers • Intro to the Legal Framework, legal provisions • We’ll focus on the EU and deep dive into some examples of the Romanian (our HQ) Legislation • We’ll also touch (a few notes) on the statutory provisions in the US (although we did not investigate American case-law) • A selection of technical strategies and tactics that apply to email legal interception
  • 6. What you’ll NOT find here • Legal hold • Workplace surveillance
  • 7. DID YOU SEE WHAT HAPPENED RECENTLY?
  • 8. EU RELEVANT LEGAL FRAMEWORK Different Location, Different Lawful Interception Regulations Your company will have to comply with local and national laws. It’s mandatory to seek legal advice for what is relevant in your national law, and we recommend doing so as early as possible during the setup procedures. When you talk to a legal representation in your local country, you must brief them about your current logging procedures; what you currently log and why, what you do with it, and who has access to that so they can tell you from the purpose of lawful intercept what you should do moving forward. This is done on a case-by-case basis, only under legal advice. It helps to be prepared. You will usually have a specific amount of time (depending on the country) to comply and respond, so it will be challenging to comply if you aren’t prepared.
  • 9. • European Convention on Human Rights • Budapest Convention on Cybercrime • Case-law of the European Court of Justice (mainly judgements in cases Digital Ireland, Tele2 Sverige and La Quadrature du Net) and of the European Court of Human Rights EU RELEVANT LEGAL FRAMEWORK • Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector • Principle of communications’ confidentiality – article 5 • Exception – article 15(1) • Charter of Fundamental Rights of the EU
  • 10. • CJEU declared the Directive 2006/24/EC invalid, considering that the EU legislature exceeded the limits of the proportionality principle: EU law does not currently provide for an obligation to retain data. • However, Member States remain able to introduce exceptions to the main obligation of ensuring confidentiality of electronic communications EU LEGISLATION – DIRECTIVE 2006/24/EC • Article 5 of Directive 2006/24/EC provided for the retention of data necessary to: • trace and identify the source of a communication; • identify the destination of a communication; • identify the date, time and duration of a communication; • identify the type of communication; • identify users’ communication equipment; • identify the location of mobile communication equipment. • Article 5 paragraph 2 of Directive 2006/24/EC: No data revealing the content of the communication may be retained pursuant to this Directive “
  • 11. EU: EXCEPTIONS TO THE MAIN OBLIGATION OF ENSURING CONFIDENTIALITY OF ELECTRONIC COMMUNICATIONS The exact conditions under which data must be retained and disclosed to authorities are governed by national laws. • A national measure that derogates from the confidentiality of communications and related traffic data principle must be strictly proportionate to the intended purpose; such measure must comply to several rules.
  • 12. SHORT U.S. NOTES The Fourth Amendment, governing the right to privacy Electronic Communications Privacy Act (“ECPA”), enacted by the Congress in 1986 Stored Communication Act. Title II of the ECPA Case-law on these matters
  • 13. CASE STUDY: ROMANIA GEO 111/2011, Decision 987/2012 and Decision 987/2012 • Mostly aimed to assist the Romanian Informational Service Criminal Procedure Code • In the Romanian law, service providers are obliged under the Criminal Procedure Code to cooperate with authorities and respond to their requests regarding data. • The cooperation can take the following forms: • Interception of any type of distance communication (Art. 138-146 of the Criminal Procedure Code); • Preservation of computer data (Art. 154 of the Criminal Procedure Code). Law 506/2004 • Covers the processing of personal data and the protection of private life in the area of electronic communications • The approval of the court has the role of censoring potential violation of private life and the provider can not censor or limit the request.
  • 14. CASE STUDY: ROMANIA Things to ask yourself. • What is the obligation to keep historical records of content (e.g. actual email and attachments)? • Can I (as an operator) be required by local authorities to provide communication content (e.g. actual email and attachments)? • How can I (as email hosting operator) validate that the request is valid? • Who are the email addresses that our suspect (suspect@domain.com) has communicated with in the past 30 - 60 days? • What are the emails currently in his mailbox? • We need to monitor all future email communication and intercept also content of emails? • For how long does an operator need to keep historical records of metadata (who sent an email to whom on which date)?
  • 15. SOME TECH STUFF… FINALLY… Core Basic Concepts • Email Communication & Mailbox Access Logs • Accessing the email content (Subject and Body) Several aspects behind all these questions that span: • product capabilities, • internal processes, • various other integration points with other systems (Monitoring and Alarming, Logging and Reporting, Backup and Restore, etc). # Logs, Logs, Logs
  • 16. Email Communication SOME TECH STUFF… FINALLY… • Querying these logs should be subject to access control lists and should be audited • Example of such a log line (anonymized with ***): • Is is best practice to aggregate all the logs from all the nodes in your email hosting platform into a separate platform • A syslog server • An Axigen log gathering server • An ElasticSearch / Kibana server • A Graylog server (see more here) • Any other log centralization solution • That platform should implement the retention policies in sync with regulatory requirements 2021-04-08 14:20:08 +0300 08 mailPROCESSING:001141BE: New mail <1617880807728676528@fe1.axigen.lan> received from fe1.axigen.lan (192.168.1.226) with envelope from <r***n@axigen.com>, authenticated as <r***n@axigen.com>, recipients=8 (a***u@axigen.com, i***s@axigen.com, v***n@axigen.com, f***a@axigen.com, b***m@axigen.com, t***k@axigen.com, c***e@axigen.com, r***n@axigen.com), size=7236, enqueued with id 2215C4 (orgid=2A2B93)
  • 17. Mailbox Access logs SOME TECH STUFF… FINALLY… • Example of such a log line: • On all Axigen Systems logs, there is a special log file, called security.txt, which is also captured and sent to the OBF Platform. • This log file captures the logins via various client access protocols (Mailbox REST API, WebMail, IMAP, SMTP, etc.), remote IP address, and corresponding statuses (successful or unsuccessful). 2021-04-08 12:24:53 +0300 02 mail SECURITY:WEBMAIL;000235BD;192.168.1.226;37885;OP_OK;a xigen.test99@axigen.com;Android- Mail/2021.03.07.364486182.Release;Authentication successful;
  • 18. Accessing the Email Content (Subject, Body, Attachments) SOME TECH STUFF… FINALLY… • All of these cases require various configurations that can be made on the existing product and existing integrations. • For a more detailed discussion, you can refer to How to Implement Email Archiving with Axigen and our dedicated Lawful Interception for Service Providers article. • Now, from a product standpoint, the email content of an email can be accessed: • by the user himself • by any other user which is granted access on the original user’s mailbox (e.g. Sharing) • by creating a copy of the message and storing it in an separate mailbox along with the original mailbox • by redirecting a copy of inbound and/or outbound messages of a certain user to an external mailbox (can be an email address from the legal authorities) • by accessing a past backup and extracting the NOT TO BE ALLOWED UNDER NORMAL CIRCUMSTANCES. MUST BE GATED BY PROCESSES AND ACCESS RESTRICTIONS.
  • 20. Thank you for reading! Follow us on Facebook, Twitter, or LinkedIn