Tag Archive for CALEA

The FBI’s Vision for Domestic Electronic Surveillance

Last month, Cryptome quietly posted a 2007 draft of the Federal Bureau of Investigation’s vision statement for the Domestic Communications Assistance Center (DCAC). The document, which has received no media attention, offers the most in depth view yet of the DCAC and its functions. In May, CNET correspondent Declan McCullagh disclosed the existence of the DCAC, which he described as having a mandate “covering everything from trying to intercept and decode Skype conversations to building custom wiretap hardware or analyzing the gigabytes of data that a wireless provider or social network might turn over in response to a court order.” The vision statement obtained by Cryptome describes the general functions and organization of the DCAC as well as the FBI’s national electronic surveillance (ELSUR) strategy.

Sprint Law Enforcement Subpoena Compliance Manual

This handbook has been created to assist law enforcement agencies in their understanding of processes and procedures implemented by Sprint for the compliance of legal demands. The handbook will include contact information, billing information, service of legal demands on Sprint, types of legal demands required and miscellaneous general information for your future reference.

MetroPCS CALEA Compliance Manual

It is the policy of MetroPCS to comply with the letter and spirit of all laws of the United States, including the Communications Assistant for Law Enforcement Act (hereinafter referred to as “CALEA”) relating to the implementation of law enforcement wiretap requests. CALEA requires MetroPCS to implement security measures to safeguard the privacy and reliability of information obtained through lawfully authorized interceptions of communications (i.e., wiretaps, pin registers, and subpoenas) and to help prevent unauthorized interceptions. MetroPCS Personnel must receive appropriate legal authorization and appropriate carrier authorization (as such terms are defined herein) to implement the interception of communications or access to call-identifying information.