Dave posted a comment:
A further angle I’d like to see a considered view on: as well as ISPs, will UK-based IaaS providers also be compelled to install and maintain lawful metadata intercept infrastructures in case a customer stands a mail or other messaging server up on one of their nodes? If so, how will such infrastructures handle the tying-together of customer details, VM details and vSwitch port details, at all times and in the face of infrastructure flexing, to ensure that all data requiring intercept, gets intercept?
Dave Walker — 2012/04/04 @ 01:35 — Reply
In other words: If you’re a Communications Service Provider living atop a Cloud provider of IaaS (Infrastructure as a Service) – who is meant to be providing the interception layer for the Government snoops?
For instance, a small Amazon-EC2-based chat service: at which layer – your code, or your cloud host infrastructure – is CCDP capability required to exist?
Also: What happens if such provision is illegal cross-border snooping in the country in which your Cloud provider is based? Are you forbidden from using them? Can you claim that the ISP-level sniffing of traffic is sufficient and that you are exempt from providing interception or log-access capability for CCDP because your servers are in the Bailiwick of Icemany where such international snooping is frowned upon?
Leave a Reply