A Cloud Provider’s Checklist for CALEA Compliance
April 2, 2014Internet Telephony
April 2, 2014
A Cloud Provider’s Checklist for CALEA Compliance
Nearly a decade has passed since federal policymakers expanded the reach of the Communications Assistance for Law Enforcement Act to VoIP, cloud, and certain broadband service providers. Yet a surprising number remain in the dark over their responsibility to comply with the law and provide technical support to law enforcement for lawful intercept.
SUBSENTIO NAMES MARCUS THOMAS CHIEF TECHNOLOGY OFFICER
December 10, 2013Former FBI Official Takes Charge of Tech Development at U.S. Surveillance Industry’s Leading Lawful Intercept Service Bureau
DENVER, CO, December 10, 2013 — Subsentio, the first name in advanced lawful intercept solutions for the communications industry, today named FBI intelligence and surveillance veteran Marcus Thomas to the position of Chief Technology Officer.
Subsentio president Steve Bock said, “Marcus Thomas stands out as an experienced and visionary leader in the areas of surveillance technology and federal law enforcement, and we are delighted to welcome him to Subsentio’s senior management team.”
“As CTO, Marcus Thomas will direct the company’s continuing advancement of technologies used by law enforcement to investigate, apprehend and convict terrorists and criminal elements that pose a threat to public safety,” Bock added.
Marcus Thomas said, “As the pace of technological advancement continues at warp-speed and as more terrorists and criminals make use of these advances, Subsentio’s highly-skilled personnel are working every day to ensure that our partners in law enforcement maintain a vital technological edge.”
A 25-year veteran of the Federal Bureau of Investigation, Mr. Thomas today is among the most respected figures in lawful electronic surveillance—a trusted resource whose expertise has been featured in national media including TIME Magazine, The Washington Post, ABC News, and CNET.
As the FBI Assistant Director, Operational Technologies Division (OTD), Mr. Thomas served as lead executive to advise, govern, oversee policy, direction, and operations and provide the leadership and general promotion of all FBI operational technologies so as to support the FBI’s mission and needs, as well as the Intelligence and Law Enforcement communities. OTD supports the FBI’s investigative and intelligence-gathering efforts—and those of federal, state, and local law enforcement/intelligence partners—with a wide range of sophisticated technological equipment, examination tools and capabilities, training, and specialized experience.
Wiretapping Firm Says Telecom Providers Could Be Handing Over More Data Than Authorized
November 14, 2013Slate
March 14, 2013
Wiretapping Firm Says Telecom Providers Could Be Handing Over More Data Than Authorized
Wiretapping emails and phone calls has always been a contentious law enforcement tactic. But now surveillance is becoming more of a legal minefield than ever in the United States, thanks to a clash between European and American eavesdropping regulations—and some telecom firms could be handing over data on suspects without court authorization.
When Should a Wireless Carrier Disclose Location Data to Law Enforcement?
November 8, 2013RCR Reader Forum
April 8, 2013
When Should a Wireless Carrier Disclose Location Data to Law Enforcement?
Wireless carriers often receive court orders to assist electronic surveillance by law enforcement agencies. In fact, over the last decade, the number of court orders for electronic surveillance has doubled to some 3,000 per year, according to U.S. court statistics, and increasingly they bear on wireless carriers.
DEA Can’t Get Around iMessage Encryption Roadblocks
November 5, 2013MacNewsWorld
April 5, 2013
DEA Can’t Get Around iMessage Encryption Roadblocks
The gap between technology and law enforcement grew a little wider this week following revelations that the Drug Enforcement Agency can’t unlock the encryption on iMessage, Apple’s texting app. What’s ironic about the situation is that increased fears about data hacks by identity thieves, along with the rise of mobile devices, have led to greater use of encryption by tech companies like Apple.