Enviar pesquisa
Carregar
Lifting the Lid on Lawful Intercept
•
0 gostou
•
242 visualizações
Bangladesh Network Operators Group
Seguir
Lifting the Lid on Lawful Intercept
Leia menos
Leia mais
Internet
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 26
Baixar agora
Baixar para ler offline
Recomendados
Measuring the Internet Economy: How Networks Create Value
Measuring the Internet Economy: How Networks Create Value
Bangladesh Network Operators Group
Broadcast storms in service provider network, Nafeez Islam
Broadcast storms in service provider network, Nafeez Islam
Bangladesh Network Operators Group
China Telecom Global
China Telecom Global
Edwin Woo
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan Smadi
Internet Landscape in Thailand by Kittinan Sriprasert & Viraphan Smadi
MyNOG
Peering Personals @ Peering Asia 3.0
Peering Personals @ Peering Asia 3.0
MyNOG
China Telecom Americas - General Overview
China Telecom Americas - General Overview
Brian Trentacost
2017 China Telecom Presentation
2017 China Telecom Presentation
JY Tian
Content Localization Exercise in Telekom Malaysia by MUSLINA DEVI Nurhemdi
Content Localization Exercise in Telekom Malaysia by MUSLINA DEVI Nurhemdi
MyNOG
Mais conteúdo relacionado
Mais procurados
China Telecom - China Data Centers
China Telecom - China Data Centers
Brian Trentacost
Hitrail: The Hermes VPN Network for Railway Services
Hitrail: The Hermes VPN Network for Railway Services
ictseserv
The Future of Roaming
The Future of Roaming
Mark Phillips
Superloop Investor Presentation
Superloop Investor Presentation
Pranav Rao
Best Network Practices for DSL Deployment
Best Network Practices for DSL Deployment
Global MarCom & LeadGen
Colt Access Solution Presentation External 12 07 2011
Colt Access Solution Presentation External 12 07 2011
acaiani
Active sharing best practice for regulators
Active sharing best practice for regulators
Coleago Consulting
China Unicom Global Profile
China Unicom Global Profile
Abhijit Datey
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
3G4G
FTTx Panorama - Services & Positioning - Broadband World Forum 2013
FTTx Panorama - Services & Positioning - Broadband World Forum 2013
IDATE DigiWorld
FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16
FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16
Organization for the Promotion, Protection and Progress of Frogans Technology
Colt Backbone Solution Presentation External 12 07 2011
Colt Backbone Solution Presentation External 12 07 2011
acaiani
The 4G LTE Auction in Thailand
The 4G LTE Auction in Thailand
YOZZO
Diversity
Diversity
swbuza
Port of rotterdam & Blockchain
Port of rotterdam & Blockchain
Sajjad Khaksari
NBTC over view
NBTC over view
Siriporn Pookkaves
UK Spectrum Policy Forum - Report on future use of licence exempt radio spectrum
UK Spectrum Policy Forum - Report on future use of licence exempt radio spectrum
techUK
Transport network strategies at Telekom Austria Group- January 2014
Transport network strategies at Telekom Austria Group- January 2014
Wi-Fi 360
Motivation of the New SI Proposal:Study on Licensed-Assisted Access using LTE
Motivation of the New SI Proposal:Study on Licensed-Assisted Access using LTE
Yi-Hsueh Tsai
Mais procurados
(19)
China Telecom - China Data Centers
China Telecom - China Data Centers
Hitrail: The Hermes VPN Network for Railway Services
Hitrail: The Hermes VPN Network for Railway Services
The Future of Roaming
The Future of Roaming
Superloop Investor Presentation
Superloop Investor Presentation
Best Network Practices for DSL Deployment
Best Network Practices for DSL Deployment
Colt Access Solution Presentation External 12 07 2011
Colt Access Solution Presentation External 12 07 2011
Active sharing best practice for regulators
Active sharing best practice for regulators
China Unicom Global Profile
China Unicom Global Profile
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
FTTx Panorama - Services & Positioning - Broadband World Forum 2013
FTTx Panorama - Services & Positioning - Broadband World Forum 2013
FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16
FTC6 Olivier Breton Level3 resolving Frogans addresses worldwide 2016/02/16
Colt Backbone Solution Presentation External 12 07 2011
Colt Backbone Solution Presentation External 12 07 2011
The 4G LTE Auction in Thailand
The 4G LTE Auction in Thailand
Diversity
Diversity
Port of rotterdam & Blockchain
Port of rotterdam & Blockchain
NBTC over view
NBTC over view
UK Spectrum Policy Forum - Report on future use of licence exempt radio spectrum
UK Spectrum Policy Forum - Report on future use of licence exempt radio spectrum
Transport network strategies at Telekom Austria Group- January 2014
Transport network strategies at Telekom Austria Group- January 2014
Motivation of the New SI Proposal:Study on Licensed-Assisted Access using LTE
Motivation of the New SI Proposal:Study on Licensed-Assisted Access using LTE
Semelhante a Lifting the Lid on Lawful Intercept
Blockchain Technology - Week 4 - Hyperledger and Smart Contracts
Blockchain Technology - Week 4 - Hyperledger and Smart Contracts
Ferdin Joe John Joseph PhD
Blockchain and government opportunities
Blockchain and government opportunities
Susan Dart
Janet and The Cloud / Sky - Universities driving value from Guest Wi-Fi
Janet and The Cloud / Sky - Universities driving value from Guest Wi-Fi
Thomas Aspinall
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
Tom Lyons
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
ZoyaAli844417
PITA 22: Addressing interconnection and security in the Pacific
PITA 22: Addressing interconnection and security in the Pacific
APNIC
TTBizLink Project, Trinidad And Tobago
TTBizLink Project, Trinidad And Tobago
UNDP India
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
ISOC-KG
Trust and identity - enabling intra- and inter-organisational authentication ...
Trust and identity - enabling intra- and inter-organisational authentication ...
Jisc
Julie Marguerite - Tefis open calls (fia dec 2010)
Julie Marguerite - Tefis open calls (fia dec 2010)
FIA2010
chapter-1_iot.pptx
chapter-1_iot.pptx
RAHULRAJ438202
IOT UNIT 1B.ppt
IOT UNIT 1B.ppt
madhavanmohan1
intro to iot.pdf
intro to iot.pdf
DaisyFrancis9
Understanding blockchains
Understanding blockchains
Len Bass
The I in Internet of Things: Implications for the Global Open Internet
The I in Internet of Things: Implications for the Global Open Internet
Internet Technology Matters (Internet Society)
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
Jisc
SDN evolution: the view from academia. Dr Brendan Jennings, TSSG
SDN evolution: the view from academia. Dr Brendan Jennings, TSSG
Walton Institute
COMIT community day summer 2018 - main slides
COMIT community day summer 2018 - main slides
Comit Projects Ltd
IOT_module_3.pdf
IOT_module_3.pdf
AmitH42
Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal
Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal
ICT Frame Magazine Pvt. Ltd.
Semelhante a Lifting the Lid on Lawful Intercept
(20)
Blockchain Technology - Week 4 - Hyperledger and Smart Contracts
Blockchain Technology - Week 4 - Hyperledger and Smart Contracts
Blockchain and government opportunities
Blockchain and government opportunities
Janet and The Cloud / Sky - Universities driving value from Guest Wi-Fi
Janet and The Cloud / Sky - Universities driving value from Guest Wi-Fi
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
20190626 eu blockchain_how europe supports blockcahcin (cv conference) (1)
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
PITA 22: Addressing interconnection and security in the Pacific
PITA 22: Addressing interconnection and security in the Pacific
TTBizLink Project, Trinidad And Tobago
TTBizLink Project, Trinidad And Tobago
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
Trust and identity - enabling intra- and inter-organisational authentication ...
Trust and identity - enabling intra- and inter-organisational authentication ...
Julie Marguerite - Tefis open calls (fia dec 2010)
Julie Marguerite - Tefis open calls (fia dec 2010)
chapter-1_iot.pptx
chapter-1_iot.pptx
IOT UNIT 1B.ppt
IOT UNIT 1B.ppt
intro to iot.pdf
intro to iot.pdf
Understanding blockchains
Understanding blockchains
The I in Internet of Things: Implications for the Global Open Internet
The I in Internet of Things: Implications for the Global Open Internet
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
SDN evolution: the view from academia. Dr Brendan Jennings, TSSG
SDN evolution: the view from academia. Dr Brendan Jennings, TSSG
COMIT community day summer 2018 - main slides
COMIT community day summer 2018 - main slides
IOT_module_3.pdf
IOT_module_3.pdf
Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal
Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal
Mais de Bangladesh Network Operators Group
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Bangladesh Network Operators Group
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Bangladesh Network Operators Group
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
Bangladesh Network Operators Group
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
Bangladesh Network Operators Group
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Bangladesh Network Operators Group
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
Bangladesh Network Operators Group
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
Bangladesh Network Operators Group
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
An Overview about open UDP Services
An Overview about open UDP Services
Bangladesh Network Operators Group
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
Bangladesh Network Operators Group
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
Bangladesh Network Operators Group
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
Bangladesh Network Operators Group
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
Bangladesh Network Operators Group
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
Bangladesh Network Operators Group
MANRS for Network Operators
MANRS for Network Operators
Bangladesh Network Operators Group
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
Bangladesh Network Operators Group
RPKI ROA updates
RPKI ROA updates
Bangladesh Network Operators Group
Blockchain Demystified
Blockchain Demystified
Bangladesh Network Operators Group
Mais de Bangladesh Network Operators Group
(20)
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia 2022
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
An Overview about open UDP Services
An Overview about open UDP Services
12 Years in DNS Security As a Defender
12 Years in DNS Security As a Defender
Contents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User Experience
BdNOG-20220625-MT-v6.0.pptx
BdNOG-20220625-MT-v6.0.pptx
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
Tale of a New Bangladeshi NIX
Tale of a New Bangladeshi NIX
MANRS for Network Operators
MANRS for Network Operators
Re-define network visibility for capacity planning & forecasting with Grafana
Re-define network visibility for capacity planning & forecasting with Grafana
RPKI ROA updates
RPKI ROA updates
Blockchain Demystified
Blockchain Demystified
Último
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
ssuser166378
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
Mavein
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
edrianrheine
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
Jan Löffler
Zero-day Vulnerabilities
Zero-day Vulnerabilities
alihassaah1994
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
naveenithkrishnan
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
Shubham Pant
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Roxana Stingu
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
mchristianalwyn
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Shreedeep Rayamajhi
Último
(12)
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
Zero-day Vulnerabilities
Zero-day Vulnerabilities
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Lifting the Lid on Lawful Intercept
1.
Lifting the Lid
on Lawful Intercept Shane Alcock University of Waikato New Zealand shane.alcock@waikato.ac.nz
2.
© The University
of Waikato • Te Whare Wānanga o Waikato Introductions ● Research Programmer at the University of Waikato ○ Specialist in packet capture and analysis ○ Most of my work ends up as open source ○ Recently, developing software to assist with lawful intercept ● Unlike other LI experts... ○ I don’t work in law enforcement ○ I don’t work for a commercial LI vendor ○ I can be much more transparent about the LI process
3.
© The University
of Waikato • Te Whare Wānanga o Waikato Lawful Intercept (LI) ● Legal and authorised interception of telecommunications ○ Mandated by governments ○ Aim is to investigate or prevent criminal activity ● Requested by Law Enforcement Agencies (LEAs) ○ Police, Intelligence Services, National security agencies ● Actioned by network operators
4.
© The University
of Waikato • Te Whare Wānanga o Waikato Lawful Intercept (LI) ● Targeted at a specific user ● Supported by a lawfully issued warrant ● Severe penalties for failure to comply ○ Be prepared ahead of time!
5.
© The University
of Waikato • Te Whare Wānanga o Waikato Lawful Intercept (LI) LEA Network Operator Warrant
6.
© The University
of Waikato • Te Whare Wānanga o Waikato Lawful Intercept (LI) Warrant Configuration LI System
7.
© The University
of Waikato • Te Whare Wānanga o Waikato Lawful Intercept (LI) Warrant LI System Configuration AAA SIP IP
8.
© The University
of Waikato • Te Whare Wānanga o Waikato Lawful Intercept (LI) Warrant LI System Configuration AAA SIP IP Meta-data (IRI) Communication Contents (CC)
9.
© The University
of Waikato • Te Whare Wānanga o Waikato Standards ● Two widely recognised standards for LI ○ CALEA / ATIS: used in USA ○ ETSI: used almost everywhere else ● Not as simple as just sending a pcap to the LEA! ○ Standards ensure the intercept can withstand scrutiny in court
10.
© The University
of Waikato • Te Whare Wānanga o Waikato ETSI Requirements ● Intercepted traffic must be streamed to LEAs in real time ○ Encrypted TCP sessions over public Internet ○ Closed physical connections for very sensitive intercepts
11.
© The University
of Waikato • Te Whare Wānanga o Waikato ETSI Requirements ● Two separate handovers ○ Separate encrypted TCP session for each handover ○ One handover for meta-data ○ One for intercepted communications / packets
12.
© The University
of Waikato • Te Whare Wānanga o Waikato ETSI Requirements ● Custom record format to label and sequence recorded data ○ Unique LIID provided by the LEA ○ Each session or call must also have a unique CIN ○ Sequence numbers per CIN to identify lost data ● Format is defined by many pages of ASN.1
13.
© The University
of Waikato • Te Whare Wānanga o Waikato ETSI Requirements ● All communication by a target must be delivered to the LEA ○ No packet loss allowed ● Protect privacy of other network users ○ No interception of traffic for anyone other than the target
14.
© The University
of Waikato • Te Whare Wānanga o Waikato ETSI Requirements ● Target cannot detect that the intercept is taking place ○ Communication must continue uninterrupted ○ No noticeable changes in routing or latency
15.
© The University
of Waikato • Te Whare Wānanga o Waikato OpenLI ● Open source software for ETSI-compliant LI ○ Designed and maintained by me (mostly) ○ Low cost alternative to buying solutions from an LI vendor ○ Runs of Linux + commodity server hardware ○ Target audience: smaller operators ○ Deployed in production by operators in NZ ○ Can convert some network vendor LI formats into ETSI https://openli.nz
16.
© The University
of Waikato • Te Whare Wānanga o Waikato IP Lawful Intercept with OpenLI Warrant REST API Requests AAA SIP Meta-data (IRI) Communication Contents (CC) OpenLI Provisioner OpenLI Collector OpenLI Mediator Intercept InstructionsAgency Details Intercepted Data
17.
© The University
of Waikato • Te Whare Wānanga o Waikato OpenLI ● Multiple collectors can be distributed throughout a network ○ One per BNG or customer aggregation point ● Collector uses AAA protocols to determine target IP ○ Only intercepts packets for that session ○ Tracks dynamic IP changes ● Mediator is the only external-facing component ○ Makes outbound connections to the LEAs
18.
© The University
of Waikato • Te Whare Wānanga o Waikato Alternatives ● Specialist LI vendors ○ Many companies offering LI solutions to choose from ○ Costs will be high and ongoing ○ Commercial-grade support ○ Provisioning and mediation included in the system ○ Good option for large carriers with money to spend
19.
© The University
of Waikato • Te Whare Wānanga o Waikato Alternatives ● LI licenses for networking hardware ○ Cisco, Juniper, Nokia, etc. ○ Can be used for the collection phase ○ Still require a third-party mediator, as output is not ETSI compliant Image credit: Jim Bryson
20.
© The University
of Waikato • Te Whare Wānanga o Waikato The LI Deployment Checklist ▢ Determine the LI standards that apply to your network ○ Enquire with the relevant LEAs ○ Is the ETSI standard required? ○ Choose a vendor that meets the required standard
21.
© The University
of Waikato • Te Whare Wānanga o Waikato The LI Deployment Checklist ▢ Security of your LI platform ○ LI is very sensitive infrastructure ○ Some vendors may not be allowed in your region ○ Also consider if you trust certain vendors ○ Internal security plan ○ Control access to the LI provisioning system ○ Audit logs of intercepts created and halted
22.
© The University
of Waikato • Te Whare Wānanga o Waikato The LI Deployment Checklist ▢ Budgeting ○ Who pays for the LI equipment and software? ○ Who pays for support and maintenance? ○ Account for time to learn, integrate and validate LI system
23.
© The University
of Waikato • Te Whare Wānanga o Waikato The LI Deployment Checklist ▢ Testing and validation ○ How do you confirm that the LI system is working? ○ Internally -- is there a validation mechanism available ○ Coordination with LEAs to test production system ○ Plan for regular monitoring to detect disruption
24.
© The University
of Waikato • Te Whare Wānanga o Waikato The LI Deployment Checklist ▢ Upkeep and support ○ LI systems will require continuous maintenance ○ Adapting to new technologies, e.g. 5G ○ Updating to conform to changes in standards ○ Again, who pays and what is the budget?
25.
© The University
of Waikato • Te Whare Wānanga o Waikato Interested in OpenLI? ● Learn more: ○ https://openli.nz ○ https://github.com/wanduow/openli ○ Email: openli-support@waikato.ac.nz ● I would love to learn more about the LI situation here ○ Public information is scarce ○ Allow me to ensure OpenLI is compliant with LEA requirements ○ Conversations would be off the record
26.
© The University
of Waikato • Te Whare Wānanga o Waikato Thank you! ● Questions?
Baixar agora