The Communications Assistance for Law Enforcement Act, also known as the "Digital Telephony Act," is a United Stateswiretapping law passed in 1994, during the presidency of Bill Clinton. CALEA's purpose is to enhance the ability of law enforcement agencies to conduct lawful interception of communication by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in capabilities for targeted surveillance, allowing federal agencies to selectively wiretap any telephone traffic; it has since been extended to cover broadband Internet and VoIP traffic. Some government agencies argue that it covers mass surveillance of communications rather than just tapping specific lines and that not all CALEA-based access requires a warrant. The original reason for adopting CALEA was the Federal Bureau of Investigation's worry that increasing use of digital telephone exchange switches would make tapping phones at the phone company's central office harder and slower to execute, or in some cases impossible. Since the original requirement to add CALEA-compliant interfaces required phone companies to modify or replace hardware and software in their systems, U.S. Congress included funding for a limited time period to cover such network upgrades. CALEA was passed into law on October 25, 1994 and came into force on January 1, 1995. In the years since CALEA was passed it has been greatly expanded to include all VoIP and broadband Internet traffic. From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEAand more than 3,000 percent growth in interception of Internet data such as email. By 2007, the FBI had spent $39 million on its Digital Collection System Network system, which collects, stores, indexes, and analyzes communications data.
Provisions of CALEA
In its own words, the purpose of CALEA is: The U.S. Congress passed the CALEA to aid law enforcement in its effort to conduct criminal investigations requiring wiretapping of digital telephone networks. The Act obliges telecommunications companies to make it possible for law enforcement agencies to tap any phone conversations carried out over its networks, as well as making call detail records available. The act stipulates that it must not be possible for a person to detect that his or her conversation is being monitored by the respective government agency. Common carriers, facilities-based broadband Internet access providers, and providers of interconnected Voice over Internet Protocol serviceall three types of entities are defined to be “telecommunications carriers” and must meet the requirements of CALEA. The CALEA Implementation Unit at the FBI has clarified that intercepted information is supposed to be sent to Law Enforcement concurrently with its capture. On March 10, 2004, the United States Department of Justice, FBI and Drug Enforcement Administration filed a "Joint Petition for Expedited Rulemaking" in which they requested certain steps to accelerate CALEA compliance, and to extend the provisions of CALEA to include the ability to perform surveillance of all communications that travel over the Internetsuch as Internet traffic and VoIP. As a result, the FCC adopted a "First Report and Order" concluding that CALEA applies to facilities-based broadband Internet access providers and providers of interconnected Voice-over-Internet-Protocol services. In May 2006, the FCC adopted a "Second Report and Order", which clarified and affirmed the First Order:
The CALEA compliance deadline remains May 14, 2007.
Carriers are permitted to meet their CALEA obligations through the services of "Trusted Third Parties "that is, they can hire outside companies, which meet security requirements outlined in CALEA, to perform all of the required functions.
Carriers are responsible for CALEA development and implementation costs.
Technical implementation
For Voice and Text messaging, CALEA software in the central office enables wiretap. If a call comes in for a number on the target phone a "conference bridge" is created and the second leg is sent to law enforcement at the place of their choosing. By law this must be outside of phone company. This prevents law enforcement from being inside the phone company and possibly illegally tapping other phones. Text messages are also sent to law enforcement. There are two levels of CALEA wiretapping:
The first level only allows that the "meta data" about a call be sent. That is the parties to the call, the time of the call and for cell phones, the cell tower being used by the target phone. For text message, the same information is sent but the content is not sent. This level is called "Trap and Trace".
The second level of CALEA wiretap, when permitted, actually sends the voice and content of text messages. This is called "Title III" wiretap.
USA telecommunications providers must install new hardware or software, as well as modify old equipment, so that it doesn't interfere with the ability of a law enforcement agency to perform real-time surveillance of any telephone or Internet traffic. Modern voice switches now have this capability built in, yet Internet equipment almost always requires some kind of intelligent deep packet inspection probe to get the job done. In both cases, the intercept function must single out a subscriber named in a warrant for intercept and then immediately send some or all of the intercepted data to an LEA. The LEA will then process this data with analysis software that is specialized towards criminal investigations. All traditional voice switches on the U.S. market today have the CALEA intercept feature built in. The IP-based "soft switches" typically do not contain a built-in CALEA intercept feature; and other IP-transport elements almost always delegate the CALEA function to elements dedicated to inspecting and intercepting traffic. In such cases, hardware taps or switch/router mirror-ports are employed to deliver copies of all of a network's data to dedicated IP probes. Probes can either send directly to the LEA according to the industry standard delivery formats ; or they can deliver to an intermediate element called a mediation device, where the mediation device does the formatting and communication of the data to the LEA. A probe that can send the correctly formatted data to the LEA is called a "self-contained" probe. In order to be compliant, IP-based service providers must choose either a self-contained probe, or a "dumb" probe component plus a mediation device, or they must implement the delivery of correctly formatted data for a named subscriber on their own.
CALEA-free devices will probably be available in the gray market.
Journalist Marc Zwillinger from the Wall Street Journal explains his concerns with proposed revisions to the CALEA that would require Internet companies to provide law enforcement with a method of gaining access to communication on their networks. Zwillinger warns this new mandatory access could create a dangerous situation for multinational companies not being able to refuse demands from foreign governments. This governments could “threaten financial sanctions, asset seizures, imprisonment of employees and prohibition against a company’s services in their countries." In addition, the creation of this new mechanism could create an easier way for hackers to gain access to the U.S. government's key. Moreover, the U.S. telephone network and the global internet differ in that U.S. telephone carriers “weren’t responsible for decrypting communications unless the carrier possessed the decryption key. In fact, CALEA’s legislative history is full of assurances that the Department of Justice and FBI had no intention to require providers to decrypt communications for which they did not have the key.” Therefore, a revision of the CALEA cannot necessarily secure companies from providing data on their devices during criminal investigations to foreign governments.
Lawsuits
Originally CALEA only granted the ability to wiretap digital telephone networks, but in 2004, the United States Department of Justice, Bureau of Alcohol, Tobacco, Firearms, and Explosives, Federal Bureau of Investigation, and Drug Enforcement Administration filed a joint petition with the Federal Communications Commission to expand their powers to include the ability to monitor VoIP and broadband Internet communicationsso that they could monitor Web traffic as well as phone calls. The Electronic Frontier Foundation has filed several lawsuits to prevent the FCC from granting these expanded domestic surveillance capabilities. The FCC's First Report and Order, issued in September 2005, ruled that providers of broadband Internet access and interconnected VoIP services are regulable as “telecommunications carriers” under CALEA. That order was affirmed and further clarified by the Second Report and Order, dated May 2006. On May 5, 2006, a group of higher education and library organizations led by the American Council on Education challenged that ruling, arguing that the FCC's interpretation of CALEA was unconstitutional under the Fourth Amendment. However, on June 9, 2006, the D.C. Circuit Court disagreed and summarily denied the petition.