What is Lawful Intercept?
The legally authorized interception of telecommunications by law enforcement or intelligence agencies, built into communications infrastructure by design.
Lawful intercept capabilities are built into telephone and internet infrastructure, allowing authorized surveillance.
CALEA
The Communications Assistance for Law Enforcement Act (1994) requires US telecom carriers to build wiretapping capability into their networks.
How It Works
- Carriers must be able to isolate and deliver a specific user's communications
- This applies to phone calls, SMS, and internet connections
- ISPs maintain lawful intercept interfaces that law enforcement can access with proper authorization
Privacy Concerns
- Built-in interception capability can be exploited (China hacked US lawful intercept systems in 2024)
- Scope has expanded from phone calls to all internet traffic
- The infrastructure exists whether or not it's being actively used against you
Defense
End-to-end encryption makes lawful intercept of content ineffective. The carrier can intercept the traffic, but it's encrypted. This is why encryption is the foundation of digital privacy.
Related Terms
National Security Letter
An administrative subpoena issued by U.S. federal agencies (primarily the FBI) for national security investigations. NSLs come with gag orders preventing recipients from disclosing their existence, making them controversial tools of surveillance.
PRISM
A classified NSA surveillance program revealed by Edward Snowden in 2013 that collects data directly from major tech companies including Google, Apple, Facebook, and Microsoft.
SS7 Vulnerability
Security flaws in the SS7 telephone signaling protocol that allow attackers to intercept calls, read SMS messages, and track phone locations globally.
Have more questions?
Use our guided flow to get the right next privacy step for Lawful Intercept.
Open Guided Flow