{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:49Z","timestamp":1750307929216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231079","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"147-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["The storm ahead"],"prefix":"10.1145","author":[{"given":"Jason","family":"Hill","sequence":"first","affiliation":[{"name":"Kennesaw State University, Taylorsville, GA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"American Council on Education vs. Federal Communication Commission and United States of America (2006) United States Court of Appeals for the District of Columbia Circuit; No 05-1404  American Council on Education vs. Federal Communication Commission and United States of America (2006) United States Court of Appeals for the District of Columbia Circuit; No 05-1404"},{"key":"e_1_3_2_1_2_1","unstructured":"Bellovin Steven Blaze Matt Brickell Ernest Broks Clinton Cerf Victor Diffe Whitfield Landau Susan Peterson Jon Treichler John; (June 2006) Security implications of Applying Communications Assistance to Law Enforcement Act on Voice over IP; ITAA; Retrieved June 20 2006 from http:\/\/www.itaa.org\/news\/docs\/CALEAVOIPreport.pdf  Bellovin Steven Blaze Matt Brickell Ernest Broks Clinton Cerf Victor Diffe Whitfield Landau Susan Peterson Jon Treichler John; (June 2006) Security implications of Applying Communications Assistance to Law Enforcement Act on Voice over IP; ITAA ; Retrieved June 20 2006 from http:\/\/www.itaa.org\/news\/docs\/CALEAVOIPreport.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Bennett Brian (June 21 2006). Court Rules Providers of Broadband Internet and VoIP Services Must Make Networks \"Wiretap-Friendly\"; Privacy and Security Law Blog; Retrieved June 26 2006 from http:\/\/www.privsecblog.com\/archives\/internet-court-rules-providers-of-broadband-internet-and-VoIP-services-must-make-networks-awiretapfriendlya.html  Bennett Brian (June 21 2006). Court Rules Providers of Broadband Internet and VoIP Services Must Make Networks \"Wiretap-Friendly\"; Privacy and Security Law Blog ; Retrieved June 26 2006 from http:\/\/www.privsecblog.com\/archives\/internet-court-rules-providers-of-broadband-internet-and-VoIP-services-must-make-networks-awiretapfriendlya.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Bradner Scott (June 2006) How FCC wiretapping order could affect enterprise networks Do you have to be ready to be tapped?; Network World; Retrieved June 23 2006 from http:\/\/www.networkworld.com\/columnists\/2006\/061906bradner.html  Bradner Scott (June 2006) How FCC wiretapping order could affect enterprise networks Do you have to be ready to be tapped?; Network World; Retrieved June 23 2006 from http:\/\/www.networkworld.com\/columnists\/2006\/061906bradner.html"},{"key":"e_1_3_2_1_5_1","unstructured":"Buckler Grand (June 2006) VoIP systems bring new vulnerabilities; IT Business Report; Summer 2006  Buckler Grand (June 2006) VoIP systems bring new vulnerabilities; IT Business Report ; Summer 2006"},{"key":"e_1_3_2_1_6_1","unstructured":"Communications Assistance for Law Enforcement Act of 1994 Pub. L. No. 103--414 108 Stat. 4279 One Hundred Third Congress of the United States of America AT THE SECOND SESSION; (1994)  Communications Assistance for Law Enforcement Act of 1994 Pub. L. No. 103--414 108 Stat. 4279 One Hundred Third Congress of the United States of America AT THE SECOND SESSION; (1994)"},{"key":"e_1_3_2_1_7_1","unstructured":"Court Ruling Stirs CALEA Compliance Urgency (2006) Telecom Policy Reports; Vol. 4 No. 25 Court Ruling Stirs CALEA Compliance Urgency (2006) Telecom Policy Reports; Vol. 4 No. 25"},{"key":"e_1_3_2_1_8_1","unstructured":"Freeman Roger (1996) Telecommunication System Engineering; (3rd Edition) New York; John Wiley &amp; Sons Inc   Freeman Roger (1996) Telecommunication System Engineering ; (3 rd Edition) New York; John Wiley &amp; Sons Inc"},{"key":"e_1_3_2_1_9_1","unstructured":"Greene Tim (June 2006) VoIP wiretap poses business threats; Network World; Retrieved June 19 2006 from http:\/\/www.networkworld.com\/weblogs\/convergence\/012770.html  Greene Tim (June 2006) VoIP wiretap poses business threats; Network World; Retrieved June 19 2006 from http:\/\/www.networkworld.com\/weblogs\/convergence\/012770.html"},{"key":"e_1_3_2_1_10_1","unstructured":"Industry Holds Its Breath On CALEA Compliance (2006) Telecom Policy Reports; Vol. 4 No. 23 Industry Holds Its Breath On CALEA Compliance (2006) Telecom Policy Reports; Vol. 4 No. 23"},{"key":"e_1_3_2_1_11_1","unstructured":"Kovacs Beatrice (2006) USA PATRIOT Act: Who Cares? Everyone Should! University of North Carolina at Greensboro Retreived August 10 2006 from www.sla.org\/conf\/conf_sar\/Presentations\/051103_0919%20(D)\/Kovacs%20-%20USA%20PATRIOT%20Act%202005.ppt  Kovacs Beatrice (2006) USA PATRIOT Act: Who Cares? Everyone Should! University of North Carolina at Greensboro Retreived August 10 2006 from www.sla.org\/conf\/conf_sar\/Presentations\/051103_0919%20(D)\/Kovacs%20-%20USA%20PATRIOT%20Act%202005.ppt"},{"key":"e_1_3_2_1_12_1","unstructured":"Newitz Annalee (April 5 2004) The Internet Surveillance cash cow; SecurityFocus; Retrieved June 20 2006 from http:\/\/www.securityfocus.com\/news\/8394  Newitz Annalee (April 5 2004) The Internet Surveillance cash cow; SecurityFocus; Retrieved June 20 2006 from http:\/\/www.securityfocus.com\/news\/8394"},{"key":"e_1_3_2_1_13_1","unstructured":"Mark Roy (October 2005) VoIP Wiretap Order heads to Court; InternetNewsBureau.com; Retrieved June 24 2006 from http:\/\/www.internetnews.com\/bus-news\/article.php\/3559066  Mark Roy (October 2005) VoIP Wiretap Order heads to Court; InternetNewsBureau.com ; Retrieved June 24 2006 from http:\/\/www.internetnews.com\/bus-news\/article.php\/3559066"},{"key":"e_1_3_2_1_14_1","unstructured":"McCullagh Declan (July 2003) FBI targets Net phoning; CNet News; Retrieved June 23 2006 from http:\/\/news.com.com\/FBI+targets+Net+phoning\/2100-1028_3-5056424.html?tag=nl  McCullagh Declan (July 2003) FBI targets Net phoning; CNet News ; Retrieved June 23 2006 from http:\/\/news.com.com\/FBI+targets+Net+phoning\/2100-1028_3-5056424.html?tag=nl"},{"key":"e_1_3_2_1_15_1","unstructured":"Poulsen Kevin (March 2003) FBI seeks Internet telephony surveillance; SecurityFocus; Retrieved June 21 2006 from http:\/\/www.securityfocus.com\/news\/3466  Poulsen Kevin (March 2003) FBI seeks Internet telephony surveillance; SecurityFocus ; Retrieved June 21 2006 from http:\/\/www.securityfocus.com\/news\/3466"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028893.1028898"},{"key":"e_1_3_2_1_17_1","unstructured":"Swire Peter P. (April 2005) Tesamony on before the Subcommittee on Crime Terrorism and Homeland Security of the Judiciary Committee of the U.S. House of Representatives on Oversight Hearing on the Implementation of the USA PATRIOT Act: Sections of the Act that Address - Crime Terrorism and the Age of Technology Retrieved on August 10 2006 from http:\/\/www.peterswire.net\/swire.house.judiciary.testimony.042105.doc  Swire Peter P. (April 2005) Tesamony on before the Subcommittee on Crime Terrorism and Homeland Security of the Judiciary Committee of the U.S. House of Representatives on Oversight Hearing on the Implementation of the USA PATRIOT Act: Sections of the Act that Address - Crime Terrorism and the Age of Technology Retrieved on August 10 2006 from http:\/\/www.peterswire.net\/swire.house.judiciary.testimony.042105.doc"},{"key":"e_1_3_2_1_18_1","unstructured":"Wiretapping (April 2005) Electronic Privacy Information Center; Retrieved June 21 2006 from http:\/\/www.epic.org\/privacy\/wiretap\/ Wiretapping (April 2005) Electronic Privacy Information Center; Retrieved June 21 2006 from http:\/\/www.epic.org\/privacy\/wiretap\/"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231079","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231079"}},"subtitle":["how CALEA will turn VoIP on its head"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":18,"alternative-id":["10.1145\/1231047.1231079","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231079","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}