You are on page 1of 8

Law and Technology

Designing the
Right Wiretap Solution
Setting Standards under CALEA

The Communications Assistance for Law Enforcement Act


(CALEA) requires telecommunications providers, including
VoIP and broadband ISPs, to provide wiretapping
capabilities with their services. Law enforcement and the
telecommunications industry must work together to set
CALEA-compliant standards.

“If you build it, they will come.” requirements for tomorrow’s com-
—“Shoeless Joe” Jackson in Field of Dreams munications networks.
ALBERT G IDARI
he “field of dreams” today for communications CALEA’s purpose Perkins Coie

T service providers and equipment manufacturers


seems without limits. But these organizations
need to understand that the much anticipated
“they” also includes law enforcement agencies—with
court orders in hand—demanding technical assistance in
The US government passed CALEA in 1994 to preserve
its “ability, pursuant to court order or other lawful au-
thorization, to intercept communications involving
advanced technologies such as digital or wireless trans-
mission modes, or features and services such as call for-
wiretapping the bad guys who find these new services so warding, speed dialing, and conference calling, while
delightful. So “if you build it”—for use in the US any- protecting the privacy of communications and without
way—you had better “bake” a wiretap capability into the impeding the introduction of new technologies, fea-
equipment, facilities, or service. The law requires this ca- tures, and services.”3 This was landmark legislation—
pability for telecommunications providers, and the Fed- never before had service providers been required to
eral Communications Commission (FCC) has extended build their systems with surveillance in mind.
the law to cover interconnected voice over IP (VoIP) and CALEA was necessary because by 1994, new tech-
all facilities-based, broadband Internet access providers.1 nologies were presenting enormous technical challenges
Since 1995, the Communications Assistance for Law for law enforcement surveillance efforts. Indeed, by the
Enforcement Act (CALEA)2 has required tele- time CALEA passed, law enforcement had been over-
communications carriers to install or deploy equipment, whelmed by the digital revolution in communications.
facilities, and services with surveillance capabilities at the The movement from analog to digital communications
ready. (To reflect the fact that CALEA now applies to and the introduction of new services and features left law
more than just local incumbent carriers and traditional enforcement well behind the technological surveillance
telephone companies, this article uses the term “service curve. Aptly enough, CALEA was initially called the
provider” throughout). But who decides what capabili- Digital Telephony Act.
ties the law requires? Is it a technical or legal decision? Moreover, a host of new entrants arrived in the mar-
The short answer is that the communications industry ketplace. With the Telecommunications Act of 1996 on
sets the standards in the first instance; law enforcement the horizon, competitive access providers and alterna-
and the FCC have significant influence on the process; tives to the local exchange were appearing in all major
and, ultimately, the courts are the final arbiters of what markets, and the wireless industry had begun its rapid and
CALEA requires. Thus, it’s both a technical and a legal steady growth. No longer could law enforcement go to
question, joining lawyers and engineers at the proverbial one service provider to capture all of a target’s communi-
hip to define and design CALEA’s assistance capability cations. At the same time, market forces were causing the

PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/06/$20.00 © 2006 IEEE ■ IEEE SECURITY & PRIVACY 29
Law and Technology

disaggregation of telecommunications network compo- • isolate expeditiously the content of targeted communi-
nents, and more entities than just the “corporate logo” cations transmitted within the carrier’s service area;
on a customer’s phone bill were providing raw transmis- • isolate expeditiously information identifying the tar-
sion, signaling, and new applications. geted communications’ originating and destination
As for the communications industry, it’s fair to say numbers, but not targets’ physical locations;
that no one considered law enforcement needs in de- • provide intercepted communications and call-identifying
sign criteria. Indeed, the notion of engineering a back information to law enforcement in a format transmit-
door into a communications system for anything other table over lines or facilities leased by law enforcement to
than troubleshooting or maintenance was the equiva- a separate location; and
lent of designing a security flaw into the product. It’s • carry out intercepts unobtrusively, so electronic sur-
one thing to tell the government which copper wire veillance targets aren’t aware of the interception, and in
serves which customer so they can attach a pair of alli- a way that doesn’t compromise other communications’
gator clips to the line and listen; it’s quite another to privacy and security.5
dedicate ports, rack space, and computer processing to
enable wiretaps in the central office, with service CALEA doesn’t tell manufacturers or service providers
provider personnel responsible for flipping the prover- how to meet these requirements, but lets individual en-
bial switch. Moreover, with increasingly intense com- tities decide how to comply, either ad hoc or through
petition for subscribers, some were concerned that the standards-setting organizations, which I discuss in the
added cost of developing surveillance solutions could next section.
delay or preclude the time to market or stifle innova- Telecommunications equipment installed or de-
tion altogether. ployed before 1 January 1995 is grandfathered and
Against this backdrop, and realizing that industry deemed compliant unless or until the government pays to
would continue to deploy new communications services upgrade it to meet CALEA or the service provider itself
without surveillance capabilities, the US Congress de- replaces or significantly upgrades the grandfathered
cided to require that surveillance capabilities be included equipment, installs new equipment, or launches new ser-
in the deployment of all future telecommunications vices.6 Providers deploying equipment or services after
equipment. According to CALEA’s drafters, it embodies this date receive no reimbursement for meeting
three key congressional policy goals: CALEA’s assistance capability requirements.6
Failure to meet these requirements could result in
• preserve a narrowly focused capability for law en- penalties of up to US$10,000 per day.7,8 Courts can also
forcement agencies to carry out properly authorized order service providers to undertake network or equip-
intercepts; ment modifications to meet them.8 However, before it
• protect privacy in the face of increasingly powerful and can impose any penalty, a court must find that compli-
personally revealing technologies; and ance is “reasonably achievable through the application of
• avoid impeding the development of new communica- available technology to the equipment, facility, or service
tions services and technologies.4 at issue or would have been reasonably achievable if
timely action had been taken.”7
In the end, the government passed CALEA to help This limitation on the court’s power is no loophole.
preserve law enforcement’s investigative capabilities in CALEA requires a service provider to consult with its
the face of a changing telecommunications landscape. manufacturers in a timely fashion to ensure that current
Some might argue that Congress actually set the stage and planned equipment, facilities, and services comply.9
for industry to significantly enhance surveillance capa- Additionally, manufacturers must make the necessary
bilities through design improvements in the surveil- CALEA-compliant features or modifications available to
lance architecture, making it easier, faster, and cheaper service providers in a timely manner and at a reasonable
to conduct wiretaps. This outcome could be good or charge.9 Significantly, the absence of technical standards
bad, depending on your political viewpoint, but one is no defense to an enforcement action, but involvement
thing is certain—the current architecture provides for in a standards effort might be important evidence of
greater accountability and transparency, as wiretaps whether service providers took timely action to ensure
now occur with the affirmative intervention of service available compliant equipment.
provider personnel.
The role of standards
Requirements and consequences Although the absence of standards is no excuse for
Section 103 of CALEA requires telecommunications avoiding CALEA compliance, section 107 of the act
carriers to ensure that their systems have the technical ca- does create a “safe harbor” for service providers or man-
pability to ufactures whose equipment, facilities, or services are in

30 IEEE SECURITY & PRIVACY ■ MAY/JUNE 2006


Law and Technology

compliance with publicly available technical require- whereas industry representatives took a minimalist ap-
ments or standards adopted by an industry association or proach, addressing only those it understated the law
standards-setting organization, or as set by the FCC, to clearly required.
meet CALEA’s requirements.10 (The FCC currently is The subcommittee’s meetings were often con-
contemplating which bodies can promulgate standards tentious, with law enforcement offering contributions
or requirements, including whether to recognize those explaining why certain capabilities were desirable or re-
developed by non-US standards organizations.) Con- quired and industry participants rejecting many of the
gress determined that although the communications in- demands as not clearly required by CALEA. For exam-
dustry should consult with law enforcement regarding ple, law enforcement desired, and industry refused to in-
surveillance needs, industry itself would decide how to clude, a feature status message that would require a
meet those needs.5 As Congress put it, “Those whose service provider to notify law enforcement “when spe-
competitive future depends on innovation will have a cific subscription-based calling services are added to or
key role in interpreting the legislated requirements and deleted from the facilities under surveillance, including
finding ways to meet them without impeding the de- when the subject modifies capabilities remotely through
ployment of new services.”11 another phone or through an operator.”12
Congress understood that disputes might arise over Conversely, after many arguments, industry partici-
standards’ adequacy and, in response, provided a proce- pants finally included in the standard a capability to report
dure for the FCC to review them. Section 107 provides a cell phone’s location at the beginning and end of a call.
that any person who believes a published standard is defi- This “compromise” (which excluded a law enforcement
cient can petition the FCC to set the requisite technical desire to also receive messages whenever a call was passed
requirements in a public rulemaking.10 To be clear, a pri- between cell towers—that is, a tracking capability) disap-
vacy advocate can challenge a standard because it fails to pointed privacy advocates, who believed that CALEA
protect the privacy of communications not authorized to didn’t include a requirement to report wireless call loca-
be intercepted, just as a local law enforcement agency can tion information. (The FCC and ultimately the courts
bring a challenge because the standard fails to provide all sustained the location requirement.)
the required capabilities. TIA and Committee T1 (sponsored by the Alliance
If the FCC finds the standard deficient, it must set for Telecommunications Industry) published the final
technical requirements that standard in December 1997. It defined the services and
features that must support surveillance (for example, call
• meet CALEA’s assistance capability requirements with forwarding) and specified the permissible interfaces (such
cost-effective methods; as allocation of call content and data channels) for deliv-
• protect the privacy and security of communications ery of intercepted communications and call-identifying
not authorized to be intercepted; information to law enforcement.
• minimize the cost of such compliance on residential Privacy advocates challenged the standard almost im-
ratepayers; mediately: on 27 March 1998, they petitioned the FCC
• serve the US’s policy of encouraging the provision of for review, claiming that the standard didn’t do enough to
new technologies and services to the public; and protect privacy because it permitted delivery of location
• provide reasonable time and conditions for compliance information and packet-mode communications. The
with and the transition to any new standard.10 next day, the US Department of Justice (DoJ) likewise

Any person who disagrees with the FCC’s findings can


appeal the resulting order to an appropriate federal Cir- The government passed CALEA
cuit Court of Appeals.
to help preserve law enforcement’s
The standards process in practice
The efficacy of CALEA’s standards process was tested investigative capabilities in the face
almost immediately. Subcommittee TR45.2 of the
Telecommunications Industry Association (TIA) of a changing telecommunications
worked for more than two years to develop Joint Stan-
dard 025, Lawfully Authorized Electronic Surveillance, landscape.
to serve as a “safe harbor” for wireline and wireless carri-
ers under section 107(a) of CALEA (you can buy copies filed its expected petition, claiming that the standard
of the standard and its subsequent iterations at failed to provide all the required capabilities. (For a list of
www.tiaonline.org). Law enforcement came into the the nine “essential” capabilities considered and rejected
standards process with a long list of desired capabilities, during the meeting, see the sidebar.)

www.computer.org/security/ ■ IEEE SECURITY & PRIVACY 31


Law and Technology

Law enforcement “punch list” items


L aw enforcement claimed the industry’s first standard was
deficient because it didn’t have these nine capabilities:

or other network message to the subject or associate (such as a noti-
fication that a line is ringing or busy).
Timing information. A LEA would receive information necessary to
• Content of subject-initiated conference calls. This capability would let correlate call-identifying information with the call content of a com-
law enforcement access the content of conference calls supported by munications interception.
the subject’s service (including the call content of parties on hold). • Surveillance status. A LEA would receive a message verifying that an
• Party hold, join, drop. Law enforcement would receive messages that interception is still functioning on the appropriate subject.
identify a call’s active parties. Specifically, on a conference call, these • Continuity check tone (c-tone). An electronic signal would alert a LEA
messages would indicate whether a party is on hold, has joined, or if the facility used for delivering a call-content interception has failed
has been dropped from a call. or lost continuity.
• Subject-initiated dialing and signaling information. This capability • Feature status. A message would affirmatively notify a LEA of any
would give a law enforcement agent (LEA) access to all dialing and changes in features to which a subject subscribes.
signaling information available from the subject and would inform • Dialed digit extraction. Information a LEA receives would include
the agent of a subject’s use of features (such as flash-hook and other those digits a subject dialed after the initial call setup was completed.
feature keys).
• In-band and out-of-band signaling (notification message). A LEA A federal court ultimately agreed that six were required, excluding
would receive a message whenever a subject’s service sends a tone feature and surveillance status, as well as continuity check capabilities.

The FCC put the petitions out for public comment in and all interconnected VoIP service providers. How-
April 1998,13 but didn’t resolve the challenges until Au- ever, JSTD-025 actually included a surveillance capa-
gust 1999, when it published an order generally support- bility for packet-mode communications, including
ing most but not all of law enforcement’s requests.12 The those delivered using IP. The solution calls for a service
telecommunications industry challenged this order be- provider to deliver each packet to law enforcement re-
fore the US Court of Appeals for the District of Colum- gardless of the form of legal process received. On a pen-
bia, and in August 2000, the court concluded that the register order, which records a user’s dialing and signaling
FCC had adequately considered privacy concerns, but activity associated with a call, law enforcement would
hadn’t engaged in “reasoned decision-making” in regard extract the communications’ identifying information
to law enforcement’s requests.14 Essentially, the court (that is, the packet header) itself. This “capability” was
concluded that the FCC didn’t adequately explain the part of the challenge to the standard I just described.14
basis of its decision. The court upheld the capability on the grounds that any
The court sent the case back to the FCC for further acquisition of identifying information had to be law-
consideration. Unsurprisingly, the FCC engaged in fully authorized, implying at least that a wiretap order
reasoned decision-making on remand, and in April based on probable cause—which is much more difficult
2002, upheld its initial determination that CALEA re- than a pen-register order for law enforcement to get—
quired law enforcements’ requested enhancements.15 was necessary.
The FCC gave the telecommunications industry 90 The FCC itself was uneasy with how the standard calls
days to comply with the requirements, and no one ap- for responding to packet communication pen-register
pealed this decision. requests. As part of its 1999 order, it requested that the
While these legal maneuvers were progressing, the communications industry report on how to better ad-
telecommunications industry also moved to standardize dress privacy concerns raised by lawfully authorized
law enforcement’s so-called “punch list” items and pub- surveillance of packet-mode communications.16 In re-
lished an amendment to JSTD–025 in May 2000. sponse, industry convened a series of Joint Experts Meet-
JSTD-025A contains only those capabilities the FCC ings (JEMs) to determine the feasibility of separating
identified as required by CALEA in its order after re- packet content from the information identifying its ori-
mand by the court (see the sidebar). It didn’t include law gin, destination, termination, and direction.
enforcement’s other desired capabilities, and they aren’t The industry submitted its final JEM report to the
available today. FCC on 29 September 2000, but the FCC took no ac-
tion on it or its recommendations. At the time, law
Standards for Internet access and VoIP enforcement wasn’t opposed to the JEM report recom-
As I noted previously, the FCC has extended CALEA mendations—it didn’t like the JSTD-025 approach of
to cover all facilities-based broadband Internet access delivering a packet’s entire content on a pen-register

32 IEEE SECURITY & PRIVACY ■ MAY/JUNE 2006


Law and Technology

order, and it viewed a separated delivery capability for not be able to easily isolate call-identifying infor-
packet headers to be more desirable from an evidentiary mation … without examining the packet in detail,
viewpoint. Essentially, law enforcement only wanted to or in other words, examining the packet content.”18
receive that which the law authorized, and it preferred to
have service providers take the necessary steps to ensure It seems that history is about to repeat itself in terms of
that no more than this was delivered. (For more informa- the standards process now that the FCC has deemed facil-
tion, see the Packet Surveillance Fundamental Needs ities-based broadband ISPs and interconnected VoIP
Document, available on request via www.askcalea.net.) providers to be subject to CALEA—although the FCC
In an effort to develop a new standard that would sep- has said who’s covered, it has yet to say what’s required.
arate call-identifying information from packet content, Several areas of contention exist. One of the punch-
the communications industry conducted a new round of list capabilities for circuit-mode communications, for
standards meetings in 2003 under the same auspices of example, involved the extraction of post-cut-through
TIA. TIA approved JSTD-025B for trial use in January dialed digits (that is, numbers dialed after a call has been
2004. This standard incorporates all broadband access connected or “cut through,” such as bank account num-
surveillance standards under one umbrella, including bers or voicemail passwords). Under packet standards,
CDMA2000, Internet access and voice-over packets such extraction isn’t required for VoIP calls, but law en-
using UMTS wireless technology, and wireline voice- forcement claims it should be. Another example in-
over packet services. volves law enforcement’s request for information about
Unfortunately, industry and law enforcement rep- each packet an Internet Service Provider (ISP) carries
resentatives were again at odds over CALEA require- that includes information at a protocol layer that the ISP
ments, and law enforcement actually withdrew from doesn’t manage.17
participating in the process. Law enforcement today It’s unclear when the saga of the packet-mode com-
claims that the standards are deficient and don’t provide munications standard will be resolved, or if doing so will
the same type of information and capabilities as do cir- even be necessary once the courts resolve the challenges to
cuit-mode communications. (You can find its updated the FCC’s extension of CALEA. Regardless of whether
packet requirements in Electronic Surveillance Needs for CALEA applies to these Internet services, however, law
Carrier Grade Voice over Packet Service and Electronic Sur- enforcement might still seek an order for technical assis-
veillance Needs for Public IP Network Access Services, both tance in wiretapping packet-mode communications.19
available via www.askcalea.net.) Industry representa- ISP’s will likely still implement some capability require-
tives who developed the standard counter that, assum- ments, if not those identified in JSTD-025B.
ing CALEA extends to certain packet-based services In addition, the TIA effort with JSTD-025B isn’t the
(which is in dispute and currently on appeal by privacy only ongoing standard setting activity. CableLabs, for ex-
groups and others), the FCC should examine the re- ample, has produced a standard that law enforcement has
quirements with respect to a particular technology found suitable.20 In fairness, law enforcement participa-
platform rather than on a service-focused basis.17 This tion in other venues has been less contentious. The
view is based on the belief that a platform approach question remains, however, whether any uniform under-
could define a set of network events common to all ser- standing of CALEA requirements exists, and how each of
vices and specify call-identifying information that law these standards compares with others in terms of defining
enforcement could extract without analyzing more of call-identifying information.
the packet than necessary.17
The real fight, however, is over how to define call-
identifying information in packet-based technologies Enforcement today claims that the
when you can find relevant information within several
encapsulated layers of the protocol stack. The FCC rec- standards are deficient and don’t
ognized the issue, which is as yet unresolved:
provide the same type of information
“The data link layer (supported by switches or
bridges) contains hardware source and destination and capabilities as do circuit-mode
address information; the network layer (supported
by routers) contains the source and destination IP communications.
address; and the transport/session/presentation/
applications layers (supported by host devices and
gateways) contain source and destination port ad- Lessons learned
dresses, session sources and destinations, and ses- CALEA created a natural conflict: industry trying to
sion start and stop times. [These providers] may minimize the cost of compliance through efficient stan-

www.computer.org/security/ ■ IEEE SECURITY & PRIVACY 33


Law and Technology

dards development and minimalist design requirements its goals are met in a balanced way, lawyers who have
set against law enforcement needs and the desire to want practiced before the FCC and engineers who have sat
all the bells and whistles, especially because someone else through standards meetings know that the process is any-
is paying for it. Add to this mix the fact that the law thing but efficient and prompt. It’s also a myth, albeit one
now enshrined in law, that standards ever really precede
service or capability development and deployment. Usu-
The two sides will always dispute ally, standards follow innovation and market acceptance
as service providers and manufacturers compete to be the
how much is enough, with standards first to introduce a service or feature.
In short, there is no real “industry” standard until a
organizations acting as the battlefield critical mass of industry participants is willing to share in-
formation to create one. The myth finally crumbles be-
but not the court of last resort. cause surveillance standards development is divorced
from service standardization itself. The surveillance solu-
doesn’t clearly articulate the legal requirements, and pro- tion will never arrive when an organization is ready to
tracted conflict is inevitable, leading to protracted de- deploy a service.
ployment dates for any solution, leading to great Thus, both law enforcement and the communica-
frustration for law enforcement, which sees the process as tions industry are in an endless cycle of CALEA “catch-
aiding and abetting the bad guy. In the end, the goal is to up” and “catch-22.” Catch-up for the reasons I just
arm law enforcement with the tools it needs to do its job outlined, and catch-22 because no safe harbor exists if
while protecting privacy and shareholder value. To services are deployed without CALEA capabilities. True
achieve that goal, a public-private partnership is needed enough, Congress made it unequivocally clear that
with adequate public funding of the process. After all, a CALEA wasn’t to hinder new service deployment, stat-
nation’s security is the quintessential public good, and we ing that if a service or technology couldn’t reasonably be
all have a stake in it. brought into compliance with interception require-
ments, then it could still be deployed. Of course, this is no
Lack of definition breeds dispute real alternative because service providers won’t want to
Ten years of surveillance standards development has re- risk an enforcement action.
vealed a gulf between law enforcement needs and ser- Nor will they want to design some rudimentary, or
vice-provider requirements. To law enforcement, any even reasonably sophisticated, ad hoc solution. CALEA
and all information about subscribers’ use of services is of doesn’t mandate using a standards-based solution, but a
interest and could yield intelligence. To a service service provider that “goes it alone” runs the risk of law
provider, information unrelated to communications enforcement deeming its solution unacceptable. Worse
processing (such as users receiving voicemail alerts) isn’t yet, subsequent standards could render it obsolete or in-
call-identifying and doesn’t fall under CALEA’s require- adequate by comparison.
ments. A further corollary is that information not relied Such “one-off ” solutions don’t help law enforcement
on by the subscriber’s provider to route a call shouldn’t be either, which must buy up-to-date collection equipment.
required (post-cut-through signaling acted on by another Vendors rely on standards to make collection equipment
carrier, for example). extensible so that law enforcement can buy one box to re-
Law enforcement and service providers can’t bridge ceive data from multiple service providers regardless of the
this gulf because the difference relates to cost and who underlying technology. Standardization saves law enforce-
bears it. Extracting signals that have no call-processing ment a fortune.
function and delivering them to law enforcement creates Nevertheless, extending the compliance obligation
a vastly different surveillance architecture than merely pending standards development or commercialization
delivering user input when a call begins. Whether isn’t authorized under CALEA, although the act does
CALEA requires one or the other remains to be seen, but permit the FCC, upon petition from a service provider
until it’s clear, the two sides will always dispute how much or manufacturer, to extend the date if compliance “is
is enough, with standards organizations acting as the not reasonably achievable through application of tech-
battlefield but not the court of last resort. (To be clear, nology available within the compliance period.”10
there is no law against providing more capabilities, as long However, the FCC has determined that this provision
as the resulting output is lawfully authorized.) doesn’t let it grant any extensions beyond the original
CALEA compliance date of 1998. Although the courts
Standards are always late will debate this issue in the future, industry can’t fill the
Although we might view the CALEA framework as pro- deployment gap if the FCC won’t grant extensions in
viding a thoughtful and deliberate process to ensure that the meantime.

34 IEEE SECURITY & PRIVACY ■ MAY/JUNE 2006


Law and Technology

So, although standards should theoretically drive prosecutors and lawyers advising service providers with-
CALEA compliance in a timely and effective manner, in out making engineers put these legal requirements into
reality, the framework is unlikely to serve any one well. software code.
What’s more, an old axiom says that lawyers can find
Engineers playing lawyers is a bad idea; ambiguity in a “no smoking” sign. How is it, then, that
lawyers playing engineers is worse Congress expected engineers to find clarity enough in
The law should define the necessary capabilities—it CALEA to set quasi-legal standards? Because the courts
doesn’t. Leaving it to engineers to guess is both unfair and are the final arbiters, the circle is complete as lawyers play
unlikely to yield a standard that actually meets either the engineers in explaining standards to courts, who then de-
law or law enforcement needs. CALEA “round 1” re- cide whether technical requirements meet the law. (Dur-
sulted in an exhausting eight-year process to implement a ing the oral argument in the court of appeals on the initial
standard for circuit-switched communications that were standard, one judge asked Ted Olsen, who represented
already losing ground to new IP-based communications the telecommunications industry and who ultimately
services. Industry didn’t develop those services with sur- became the US solicitor general, what JSTD stood for.
veillance in mind because it believed them to be exempt The courtroom full of lawyers looked blankly on, until
from CALEA as information services. The FCC has de- one offered that it meant “joint standard”—not that this
veloped a theory to extend CALEA to these services was illuminating in any way.)
today, years after their marketplace deployment and
adoption by customers. It’s broken; fix it
But how well did industry do with the first standard Despite everyone’s best intentions, the standards-setting
with regard to noncontroversial capabilities? It still made process for surveillance under CALEA is permanently
some fundamental mistakes despite law enforcement’s broken. The post-9/11 environment has given new
active involvement. JSTD-025, for example, requires urgency to law enforcement’s demands for robust capa-
that law enforcement receive a message showing the bilities in all new communications technologies. The
numbers a subject dials on each origination or the in- slowness of the standards-developing process has led law
coming numbers of each call to the subject. One is a pen enforcement to seek mandatory compliance deadlines
register, whereas the other is a trap and trace; both re- from the FCC.
quire separate authorization, but law enforcement gets Of equal concern, industry views some law enforce-
them combined regardless. ment requests as gold-plating on an already expensive de-
Another example is location information. Location velopment process. Because service providers exclusively
reporting is a parameter in each origination and termina- bear the development and implementation costs, they
tion message. In other words, to get location, you must have every incentive to develop fewer capabilities and less
also get the number dialed or the incoming one. The complex solutions.
problem is that a separate legal standard (which is neither And what of privacy concerns? They aren’t present at
a pen register nor a trap and trace) must authorize loca- the standards table, and the more complex standards be-
tion. Not all manufacturers implemented the standard come as they extend to packet communications, the less
with location parameters as conditional; law enforce- transparent or understandable the privacy impact could be.
ment routinely received location information on pen
registers despite CALEA’s express prohibition of doing so
pursuant to pen-register authorization.
Yet another example is the failure to differentiate be-
tween electronic and wire communications. Thus, law
I n the end, all would be better served by a publicly
funded, joint industry–government development pro-
cess. CALEA’s purpose was good—keep law enforce-
enforcement would receive a voice call on a content ment current, don’t impede innovation, and protect
channel and short-message-service traffic or other elec- privacy—but could be better achieved with this collabo-
tronic communications on the data channel. Again, the rative approach. The time has come to replace CALEA’s
two require separate legal authorizations, but the standard standards-setting provisions with a new, rapid, and fair
provided law enforcement with both regardless of the au- system of capability development.
thorization’s nature or CALEA’s admonition to protect
the confidentiality of communications not authorized to Acknowledgments
be intercepted. The views expressed in this article are my own and should not be attrib-
Eventually, vendors, service providers, and collec- uted to any of my clients.
tion-equipment manufacturers built solutions to rectify
these problems, but the standards remain unchanged in References
addressing these infirmities, despite subsequent revisions. 1. In the Matter of Communications Assistance for Law Enforce-
The point is that surveillance law is arcane enough for ment Act and Broadband Access and Services, First Report

www.computer.org/security/ ■ IEEE SECURITY & PRIVACY 35


Law and Technology

and Order and Further Notice of Proposed Rulemak- the District of Columbia Circuit); www.fcc.gov/ogc/
ing, ET Docket No. 04-295, RM-10865, 23 Sept. 2005; documents/opinions/2000/99-1442.html.
www.askcalea.net/docs/20050923-fcc-05-153.pdf. 15. In the Matter of Communications Assistance for Law Enforce-
2. Communications Assistance for Law Enforcement Act, Public ment Act, Order on Remand, CC Docket No. 97–213,
Law No. 103–414, Statutes at Large, vol. 108, 1994, p. 17 FCC Rcd 6896, 11 Apr. 2002; www.askcalea.net/
4279 (codified as US Code, Title 47, sections 1001–1010 docs/fcc02108.pdf.
and US Code, Title 47, section 229). 16. In the Matter of Communications Assistance for Law Enforce-
3. House Report No. 103–827, section 1; reprinted in US ment Act, Third Report and Order, CC Docket No.
Code Congressional and Administrative News, vol. 3489, 97–213, 14 FCC Rcd 16794, paragraph 55, 31 Aug.
1994. 1999; www.askcalea.net/docs/fcc99230.pdf.
4. House Report No. 103–827, section 1; reprinted in US 17. Notice of Proposed Rule Making, ET Docket No. 04-295,
Code Congressional and Administrative News, vol. 3489, paragraphs 77–85, 9 Aug. 2004; www.askcalea.net/
1994, p. 3493. docs/20040809.fcc.04-187.pdf.
5. US Code, Title 47, section 1002, 1994. 18. Notice of Proposed Rule Making, ET Docket No. 04-295,
6. US Code, Title 47, section 1008, 1994. paragraph 65, 9 Aug. 2004; www.askcalea.net/docs/2004
7. US Code, Title 47, section 1007, 1994. 0809.fcc.04-187.pdf.
8. US Code, Title 18, section 2522, 2000. 19. US Code, Title 18, section 2518(4), 2000.
9. US Code, Title 47, section 1005, 1994. 20. PacketCable Electronic Surveillance Specification, PKT-SP-
10. US Code, Title 47, section 1006, 1994. ESP-I03-040113, specification by CableLabs, 13 Jan.
11. House Report No. 103–827, section 1; reprinted in US 2004; www.cablelabs.com/specifications/archives/PKT
Code Congressional and Administrative News, vol. 3489, -SP-ESP-I03-040113.pdf.
1994, p. 3499.
12. In the Matter of Communications Assistance for Law Enforce- Albert Gidari is a partner with Perkins Coie, where he leads the
ment Act, Third Report and Order, CC Docket No. firm’s privacy and security practice. He represents service
providers in the implementation of CALEA and participated in
97–213, 14 FCC Rcd 16794, paragraph 107, 31 Aug. development of JSTD-025, the first electronic surveillance stan-
1999; www.askcalea.net/docs/fcc99230.pdf. dard developed to meet CALEA’s requirements under the aus-
13. Federal Comm. Commission, Public Notice DA-98-762, pices of the Telecommunications Industry Association, and
20 Apr. 1998; www.askcalea.net/docs/da980762.pdf. subsequent standardization and implementation efforts. Gidari
has a law degree from George Mason University Law School
14. United States Telecom. Assoc. v. FCC, Federal Reporter, 3rd and a masters of law degree from the University of Washing-
Series, vol. 227, 2000, p. 450 (US Court of Appeals for ton. Contact him at gidari@worldnet.att.net.

IEEE TRANSACTIONS ON DEPENDABLE


AND SECURE COMPUTING
Learn how others are achieving systems and networks design and
development that are dependable and secure to the desired
degree, without compromising performance.

This new journal provides original results in research, design, and


development of dependable, secure computing methodologies,
strategies, and systems including:

• Architecture for secure systems


• Intrusion detection and error tolerance
• Firewall and network technologies
Learn more about this new • Modeling and prediction
publication and become a • Emerging technologies
subscriber today.
Publishing quarterly
www.computer.org/tdsc Member rate: $31
Institutional rate: $285

36 IEEE SECURITY & PRIVACY ■ MAY/JUNE 2006

You might also like