Communications Assistance for Law Enforcement Act

Results: 129



#Item
211. LNP Order for Release _with statements_ _FINAL__Sec

1. LNP Order for Release _with statements_ _FINAL__Sec

Add to Reading List

Source URL: www.npac.com

Language: English
22Exploiting Lawful Intercept to Wiretap the Internet Blackhat DC, 2010 Tom Cross Manager, X-Force Research

Exploiting Lawful Intercept to Wiretap the Internet Blackhat DC, 2010 Tom Cross Manager, X-Force Research

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
23Case3:14-cvDocument1 Filed03Page1 ofMELINDA HAAG (CSBNUnited States Attorney 2 ALEX G. TSE (CSBN)

Case3:14-cvDocument1 Filed03Page1 ofMELINDA HAAG (CSBNUnited States Attorney 2 ALEX G. TSE (CSBN)

Add to Reading List

Source URL: cdn.arstechnica.net

Language: English - Date: 2015-04-11 18:14:25
24GOVERNMENT ACCESS TO DATA  April 2012  Current law in privacy from government intrusion does not provide the protections that people reasonably anticipate. Data kept with third parties is treated differently than that

GOVERNMENT ACCESS TO DATA April 2012  Current law in privacy from government intrusion does not provide the protections that people reasonably anticipate. Data kept with third parties is treated differently than that

Add to Reading List

Source URL: cdn.ccianet.org

Language: English - Date: 2014-09-06 05:40:50
25March 4, 2015 VIA ECFS Marlene H. Dortch, Secretary Federal Communications Commission 445 12th Street, S.W. Washington, D.C[removed]

March 4, 2015 VIA ECFS Marlene H. Dortch, Secretary Federal Communications Commission 445 12th Street, S.W. Washington, D.C[removed]

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-03-08 10:55:26
26Communications Security  Risking Communications Security: Potential Hazards of the Protect America Act A new US law allows warrantless wiretapping whenever

Communications Security Risking Communications Security: Potential Hazards of the Protect America Act A new US law allows warrantless wiretapping whenever

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2008-01-23 17:44:37
27SCIENTIFIC AND TECHNOLOGICAL OPTIONS ASSESSMENT  STOA DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE

SCIENTIFIC AND TECHNOLOGICAL OPTIONS ASSESSMENT STOA DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-15 15:13:07
28Privacy of telecommunications / Surveillance / Human rights / Privacy / Communications Assistance for Law Enforcement Act / Mass surveillance / Internet privacy / Voice over IP / Electronic Privacy Information Center / Ethics / National security / Security

April 12, 2004 Office of the Secretary Federal Communications Commission via ECFS Re:

Add to Reading List

Source URL: www.privacilla.org

Language: English - Date: 2013-02-25 23:50:35
29Sprint Communications, Inc. Agrees to Pay $15.5 Million to Resolve Allegations of Overcharging Law Enforcement Agencies for Court-Ordered Wiretaps

Sprint Communications, Inc. Agrees to Pay $15.5 Million to Resolve Allegations of Overcharging Law Enforcement Agencies for Court-Ordered Wiretaps

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2015-04-10 15:08:20
30CALEA	
  II:	
  Risks	
  of	
  Wiretap	
  Modifications	
  to	
  Endpoints	
   Ben	
  Adida	
   Collin	
  Anderson	
   Annie	
  I.	
  Anton	
  (Georgia	
  Institute	
  of	
  Technology)	
   Matt	
  Bl

CALEA  II:  Risks  of  Wiretap  Modifications  to  Endpoints   Ben  Adida   Collin  Anderson   Annie  I.  Anton  (Georgia  Institute  of  Technology)   Matt  Bl

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40