What is CALEA and Why is it Important to Broadband Providers
CALEA is the Communications Assistance for Law Enforcement Act, which requires all facilities-based broadband providers and providers of interconnected voice over Internet Protocol (VoIP) service to have the procedures and systems in place to be able to assist law enforcement with enabling real-time surveillance when presented with a lawful intercept request.
Passed in 1994, and managed by the Federal Communications Commission (FCC), the provisions in CALEA initially only applied to phone traffic. It was originally passed in response to the need for law enforcement to be able to initiate wiretaps on digital phone switches, which were becoming more prevalent at the time. It required carriers and manufacturers of telecom equipment to ensure that their systems are capable of selective wiretapping of any phone traffic, and that carriers have the people and policies in place to properly assist law enforcement with that process in the event of a valid surveillance request.
In 2005 the FCC extended coverage of CALEA to include broadband Internet access providers and VoIP providers. With that change, Broadband providers also needed to ensure they have the systems and people in place to assist with lawful intercept requests, and to do so in a way that protects the confidentiality of the surveillance while securely transmitting the data to the requesting law enforcement agency (LEA). Compliance with CALEA is mandated, and if a provider is found not to be in compliance they can be subject to fines of up to $10,000 per day from the Court until they become compliant.
Unfortunately, CALEA compliance is not easy for several reasons. First, the provider needs to have designated CALEA contacts that are available 24 hours a day who are familiar with what needs to be done and who can ensure that the court order for a CALEA intercept is valid. CALEA requests do not happen often, but you could get one at any time. This makes CALEA compliance a challenge, since it’s difficult to maintain the required policies and efficiently execute procedures when something is relatively rare and occurs unexpectedly.
Next, there is the technical complexity of providing a live intercept of the traffic flow for a specific individual or individuals identified in the court order and then delivering that data securely, in the proper format, to the requesting LEA. This requires that specialized equipment be placed in the network in the right location. And, as your network changes over time, where that equipment should be placed could change. You won’t have a lot of time to figure that out. You need to be able to get the live intercept set up in a timely manner, which is generally considered to be within just a few days of the order.
All providers are also required to file a CALEA System Security and Integrity (SSI) Plan with the FCC. This plan explains how the provider will comply with CALEA, including who their designated CALEA contacts are. In addition, the SSI needs to confirm that appropriate legal and carrier authorization will be obtained prior to beginning an intercept, and that a record of each interception request will be kept for a designated period of time. You should also have a policy in place notify the LEA of any security breaches related to the request. We have a sample CALEA SSI Plan that you can download here.
The FCC currently only accepts paper filings of SSI plans, but they are in the process of implementing a CALEA Electronic Filing System (CEFS). Electronic filing in the CEFS will initially be voluntary, but the FCC is currently seeking comment on whether to make electronic filing mandatory, which will likely be the case six months after voluntary filing begins. With all SSI filings in an online system they would be easier for operators to submit and keep up to date, and easier for LEAs to access the information. It will also be easier for the FCC to determine if there are providers who have not filed a plan.
For service providers there are three ways to handle CALEA compliance: 1) You can develop your own equipment and initiate and manage your own compliance steps when a request comes in; 2) you can purchase equipment specifically for CALEA and handle your own compliance; or, 3) you can contract with a Trusted Third Party (TTP) to provide the equipment and CALEA compliance services for you. The FCC has allowed for this third TTP option because of the required resources and complexity of CALEA compliance, especially for smaller and mid-sized operators.
Additional Resources:
You can go to the FCC's CALEA site to find out more about your responsibilities under CALEA.
If you are not CALEA compliant, ZCorum can help. We can provide you with CALEA Trusted Third Party services and do the heavy lifting for you. For more information, visit our CALEA Services page.
About the Author: Rick Yuzzi
Never miss a post.
Enter your email to subscribe:
- Ask an Expert (12)
- Blog (12)
- Technology (11)
- Hot Topics (8)
- ask a broadband expert (8)
- DOCSIS (7)
- PNM (7)
- proactive network maintenance (7)
- Industry Perspectives (5)
- BEAD (4)
- Broadband Funding (4)
- Customer Service (4)
- FCC (4)
- IIJA (4)
- PreEqualization Analyzer (4)
- correlation groups (4)
- fiber broadband (4)
- fiber optics (4)
- fiber troubleshooting (4)
- interview (4)
- CGNAT (3)
- Carrier Grade NAT (3)
- DDoS Attacks (3)
- DOCSIS pre-equalization (3)
- Diagnostics (3)
- Distributed Denial of Service Attacks (3)
- GPoN (3)
- IPv4 Conservation (3)
- Purchase IPv4 Addresses (3)
- What is DOCSIS PNM (3)
- broadband infrastructure funding (3)
- fiber (3)
- 5G (2)
- CALEA (2)
- CALEA Compliance (2)
- Codeword Errors (2)
- DOCSIS 3.1 (2)
- Distributed Access Architecture (2)
- Group Delay (2)
- ICFR (2)
- IP traffic (2)
- IPv6 migration (2)
- In Channel Frequency Response (2)
- Main Tap Compression (2)
- Marketing (2)
- Micro Reflections (2)
- Millimeter Wave (2)
- OTT (2)
- Rural Broadband (2)
- Types of DDoS Attacks (2)
- Voice Service (2)
- XGS-PON (2)
- broadband data collection (2)
- customer service (2)
- internet issues (2)
- mid-band spectrum (2)
- mmWave (2)
- network traffic (2)
- network virtualization (2)
- state broadband (2)
- state broadband program (2)
- weather-related Internet issues (2)
- 10G (1)
- BDC (1)
- BDC Availability Data Specification (1)
- BDC User Guide (1)
- BEAD Funding (1)
- Broadband Providers (1)
- Broadband Serviceable Location Fabric (1)
- Broadband Serviceable Locations (1)
- C-Band (1)
- CA Certificate Expiration (1)
- CAF II Requirements (1)
- CAF II Testing (1)
- CALEA SSI Plan (1)
- CBRS (1)
- Carpet Bombing (1)
- Citizens Broadband Radio (1)
- Communications Assistance for Law Enforcement Act (1)
- Connect America Fund (1)
- DAA (1)
- DOCSIS 4.0 (1)
- DOCSIS CA Certificate Expiration (1)
- DPoE (1)
- DPoG (1)
- EPoN (1)
- Excel Text Matching (1)
- Extended Spectrum DOCSIS (1)
- Extending HFC Life (1)
- FCC Broadband Map (1)
- FCC data (1)
- FTTH (1)
- FTTx (1)
- Fidelity Communications (1)
- Full Duplex (1)
- Greenfield Broadband (1)
- Hosted VoIP (1)
- IPTV (1)
- IPv4 (1)
- IPv6 (1)
- IPv6 Transition Plan (1)
- LTE (1)
- Low Latency DOCSIS (1)
- MAC/PHY (1)
- Mobile (1)
- Monitoring (1)
- Motivation for DDoS Attacks (1)
- Multi-Vector DDoS Attacks (1)
- NG-PON2 (1)
- NIST (1)
- NIST Cybersecurity Framework (1)
- NIST requirements (1)
- NetFlow (1)
- Network Traffic Management, (1)
- OTT video streaming (1)
- Private Access License (PAL) (1)
- RDOF Auction (1)
- RDOF Voice Requirements (1)
- Remote MAC/PHY (1)
- Remote PHY (1)
- Robocalls (1)
- Rural Broadband Network Advancement Act (1)
- Rural Digital Opportunity Fund (1)
- SSI (1)
- STIR/SHAKEN (1)
- Small Cells (1)
- Streaming (1)
- System Security and Integrity Plan (1)
- TV Viewership Analytics (1)
- TWDM-PON (1)
- TruVizion (1)
- Underserved Locations (1)
- Unserved Locations (1)
- Upstream Analyzer (1)
- Videos (1)
- VoIP (1)
- VoIP revenue (1)
- Wired Broadband (1)
- broadband data collection program (1)
- broadband deployment (1)
- broadband support (1)
- cableLabs (1)
- caf ii (1)
- case study (1)
- cloud-based VoIP (1)
- commercial VoIP (1)
- commercial VoIP revenue (1)
- cpe spectrum capture (1)
- customer service tip (1)
- cyber attacks (1)
- cybersecurity (1)
- dhcp (1)
- downstream spectrum issues (1)
- dual stack implementation (1)
- dynamic spectrum sharing (1)
- electric membership cooperatives (1)
- fiber Internet (1)
- fiber deployment (1)
- forward path monitoring (1)
- free download (1)
- full band capture (1)
- holiday customer service (1)
- holiday tech support (1)
- ingress (1)
- middle mile grant program (1)
- net neutrality (1)
- open access fiber (1)
- open access fiber network (1)
- open access networks (1)
- pppoa (1)
- pppoe (1)
- pre-equalization (1)
- reduced maintenance costs (1)
- remote spectrum analyzer (1)
- return path (1)
- scott helms (1)
- technical paper (1)
- technical support (1)
- vTDR (1)
.
About the Blog
Bloggers
Comments Policy
Guest Blogging
Privacy Policy
Leave a comment: