Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
The Communications Assistance For Law Enforcement Act (CALEA) is a U.S. wiretapping law passed by Congress in 1994. The law requires telecommunications providers and equipment manufacturers to allow law enforcement agencies to intercept communications with a warrant. The law originally applied only to telephone conversations, but has since been expanded to cover VoIP and internet traffic.
The Communications Assistance For Law Enforcement Act is a U.S. federal wiretapping law passed by Congress and signed into law by President Bill Clinton in 1994. At the time, phone companies were transitioning from the old electromechanical switching equipment to newer digital switching equipment in their central offices. The Federal Bureau of Investigation and other law enforcement agencies in the U.S. were worried that the new digital switching equipment would make it difficult for them to conduct wiretaps.
The law requires equipment manufacturers and telecommunications providers to allow law enforcement agencies to intercept communications on digital switching equipment. Not only do telcos have to cooperate with investigations, equipment manufacturers are required to provide access using hardware and software designs.
As communications networks have evolved to carry more internet traffic, the law has been expanded to cover broadband internet and VoIP providers. Complying with the law is more difficult with internet traffic, as it usually requires deep packet inspection to decipher. Hardware-based taps like the controversial CARNIVORE are used to intercept traffic of suspects.
Even with the access, authorities cannot just spy on everyone’s internet traffic or phone calls. Law enforcement agencies still must have warrants in order to conduct wiretaps.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
What is a Security Posture? Security posture definition refers to the ability an organization has to protect its information technology...
Trending NewsLatest GuidesReviewsTerm of the Day