Back to Results
First PageMeta Content
Videotelephony / Surveillance / Privacy of telecommunications / Privacy law / Communications Assistance for Law Enforcement Act / Mass surveillance / Telephone tapping / Skype / Secure communication / Software / Voice over IP / Espionage


CALEA  II:  Risks  of  Wiretap  Modifications  to  Endpoints   Ben  Adida   Collin  Anderson   Annie  I.  Anton  (Georgia  Institute  of  Technology)   Matt  Bl
Add to Reading List

Document Date: 2015-01-21 19:48:40


Open Document

File Size: 247,69 KB

Share Result on Facebook

Company

Skype / The Washington Post / National Laboratory / Cracking China’s Skype Surveillance Software / the New York Times / BT / Internet Engineering Steering Group / Google / RTFM Inc. / SRI International / Circle LLC / Sina / Bloomberg / /

Country

China / Iran / United States / U.S. Virgin Islands / Georgia / /

Event

Business Partnership / Man-Made Disaster / Natural Disaster / /

Facility

Lawrence Livermore National Laboratory / Georgetown University / University of Michigan / University of California / Building Wiretap Capability / Princeton University / Georgia Institute of Technology / Center With / Cornell University / Johns Hopkins University / University of Pennsylvania / /

IndustryTerm

open instant messaging systems / endpoint systems / commodity software / malicious communications intercept / web browsing / Internet services / stand-alone services / communications content flows / real-time voice calls / telephone network / security systems / communications networks / communications tools / end user software / text communications / broadband Internet-service providers / software developer / communications contents / mobile systems / otherwise sufficient interception systems / directory server / telecommunications network operators / web browser software / end-user software / telecommunications / communication software systems / broadband Internet access / open source communications packages / law enforcement / corporate systems / access communications / wiretap-ready Web / user communications / communications environment / electronic communications service / voice-over-Internet protocol / public telephone network / software vendors / https /

NaturalFeature

Media Streams / /

Organization

U.S. government / University of Michigan / Princeton University / Center for Democracy & Technology / Cornell University / Judiciary Committee / Subcommittee on Crime / Federal Communications Commission / US Federal Reserve / U.S. Administrative office of the Courts / Georgetown University / Center for Strategic and International Studies / University of California / San Diego / University of Pennsylvania / University of California / Berkeley / Johns Hopkins University / Federal Bureau of Investigation / Subcommittee on Crime / Terrorism / and Homeland Security / Georgia Institute of Technology / Chinese government / /

Person

Vernon Silver / David Drummond / Charlie Savage / Greg Wiseman / Jeffrey Knockel / Rogue / Stalked Teens / James Andrew Lewis / Adrian Chen / Kenneth Corbin / Peter Swire / Declan McCullagh / /

Position

custodian / Engineer / CIO / software developer / /

ProgrammingLanguage

php / /

ProvinceOrState

Michigan / District of Columbia / California / Pennsylvania / /

PublishedMedium

New York Times / the New York Times / Washington Post / IEEE Spectrum / /

Technology

VoIP system / instant messaging / operating system / html / encryption / PSTN / voice-over-Internet protocol / Session Initiation Protocol / broadband / Session Description Protocol / peer-to-peer / DSL / VOIP / /

URL

http /

SocialTag