FCC Chairwoman Jessica Rosenworcel circulated a draft Declaratory Ruling within the FCC that will enhance and enforce the Communications Assistance for Law Enforcement Act (“CALEA”). This law requires carriers to secure their networks from unlawful access or interception of communications, including cybersecurity attacks. Chairman Rosenworcel also released a notice to carriers to ask ISPs to strengthen their cybersecurity measures as a result of the recent evidence that China has infiltrated ISPs. The proposed Declaratory Ruling would require carriers to submit an annual certification to the FCC showing they have created, updated, and implemented a cybersecurity risk management plan.
CALEA has been in place since 1994 and originally provided a mechanism for law enforcement to conduct lawful wiretapping of ISP networks. The law has often been referred to as a government backdoor into telecommunications networks. On its surface, CALEA requires a subpoena from the FBI to wiretap an ISP end-user customer, although there are those in the government who argue that the law also allows for warrantless searches in some situations and even allows for mass surveillance of a communications network.
CALEA was originally intended to provide a way for the government to surveil digital phone calls – a new technology in the early 1990s. The law has been expanded over time to include VoIP, texting, and all broadband traffic.
This warning puts all ISPs on notice that they must be CALEA compliant. CALEA compliance requires two steps. First an ISP must have a CALEA manual on file at the FBI that describes the specific method that is available for law enforcement to wiretap them.
Carriers can allow wiretapping in one of two ways. First, it can own gear and software that will allow it to respond to a law enforcement wiretap in real-time. Very few ISPs have this capability for reaching all customers. The alternative is to use a mediation device that will be installed in the network that will gather and format the information the government is seeking. There are vendors who will contract with an ISP to have this gear in place within 24 hours.
I know there are many small ISPs who never created a CALEA manual. I also suspect that there are companies that act as ISPs, such as large corporate or government networks that do their own connections to the web without an intermediate ISP. For CALEA purposes, I think anybody that directly controls a block of IP addresses and who sends and receives traffic directly from the web should be CALEA compliant.
I also know a lot of ISPs have not updated their CALEA manuals at the FBI. They may have filed the manual decades ago and forgotten they even have a manual. The ISP might have changed technologies and added markets and not identified these changes to the FBI. Anybody with an existing CALEA manual should look at it and update it as needed.
I don’t normally peddle CCG service in these blogs, but the FCC and the government as a whole are about to get extremely serious about the Chinese hack of our telecommunications networks. Please contact me if you need to create or update a CALEA manual to make sure your company is compliant. The Declaratory Ruling is going to be approved soon by the current FCC or the next one, and you should start now to be able to say that you are compliant with the CALEA portion of the annual cybersecurity attestation.

