Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementCyber Tactics ColumnSecurity Leadership and Management

The Communications Assistance for Law Enforcement Act: a Lesson from the Past

By John McClurg
SEC0819-Cyber-Feat-slide1_900px
SEC0819-cyber-slide2_900px
SEC0819-Cyber-Feat-slide1_900px
SEC0819-cyber-slide2_900px
August 1, 2019

On a recent trip to Australia, I appeared on a National morning news show. It wasn’t long until the hosts were trying to get me to weigh in on a debate that was then raging in their legislature. The point of contention was the proper balance between privacy interests and the need for law enforcement and the intelligence community, in their battle against terrorism and other crimes, to intercept communications being shrouded with powerful encryption. [Sound familiar?] I acknowledged the consternation and hand-wringing then occurring in their country as familiar reactions.

Echoing the Philosopher George Santayana, I shared an experience from our U.S. past, when in 1994, the Voice-Over-Internet Protocol was emerging in the Telcom industry, engendering great concern on the part of Law Enforcement and the Intelligence Community that this new technology was going to undercut our ability to effectively monitor our adversaries. The Congress, the Private Sector, Law Enforcement, and Intelligence Community came together and worked collaboratively to formulate a solution about which there was considerable consternation – worries that if this legislation were enacted proverbial “dogs and cats” would start living together. The legislation, the Communications Assistance for Law Enforcement Act, or CALEA, was enacted; the provisions and oversight called out in the legislation engaged; and the feared consequences never experienced. Subsequently, CALEA has never been amended. However, in 2005 the Federal Communications Commission issued an order extending the coverage of CALEA to two-way interconnected VoIP and broadband Internet access, further preserving the ability of law enforcement to conduct lawful intercepts despite evolutions in network technology.

Under CALEA, a telecommunications carrier, including Internet Service Providers who provide paying subscribers with access to the public Internet, must essentially ensure that, when it is served with a court order for lawful surveillance, its network can isolate the communications of the criminal suspect, terrorist or spy identified, and deliver the communications to the law enforcement agency named in the order. The 1994 Congress was aware of the internet, but because the new computer-based medium was not at that time significantly used by criminals, and because political leaders wanted to let the nascent technology grow unfettered by regulation, they limited CALEA, exempting “information and electronic messaging services.” CALEA is now 25 years old and the internet – no longer a nascent service free from criminal or terrorist use. On the contrary, the nefarious actors now exploit the most advanced internet-based techniques in the planning and execution of their schemes – reason enough, for a public-safety minded community, to close the CALEA coverage divide, and something Congress could do by updating the old statute.

For those concerned about the possible encroachment on privacy interests, CALEA extends subscriber privacy protection at every stage of the intercept process:

The Technical Standard-Setting Stage. Industry lawyers and engineers craft intercept standards that limit solutions to delivering only the call content and call-identifying information required by CALEA Section 103. The standards also protect the privacy of non-suspect subscribers.

The Solution Development Stage. Equipment vendors design solutions that conform to industry standards or achieve the goals of CALEA Section 103 in other privacy-protective ways.

The Court Order Stage. Telecommunications carriers confirm the court order is properly authorized before implementing it.

The Implementation Stage. The intercept solution may be activated only when authorized by the carrier’s appointed officer or employee. When the solution is activated, the carrier controls the type of data transmitted to law enforcement and is required to employ security measures to prevent security breaches and privacy measures to keep the intercept confidential.

Shortly after my visit, the Australians passed new Encryption Laws. Now it may be time for the U.S. to take a lesson from our Australian friends.

KEYWORDS: security career security officer security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John mcclurg

John McClurg served as Sr. Vice President, CISO and Ambassador-At-Large in BlackBerry's/Cylance’s Office of Security & Trust. McClurg previously was CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell Laboratories; and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Cyber tactics

    2023: The year for contextual cyber threat intelligence

    See More
  • Police officer

    The critical need for secure communications in modern law enforcement

    See More
  • cyber security

    Reflections on 35 years in the trenches

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing