Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FCC To Require Backdoor Network Access for Feds
Slashdot ^ | 8/6/2005 | Zonk

Posted on 08/06/2005 11:00:35 PM PDT by dila813

Your Rights Online: FCC To Require Backdoor Network Access for FedsPosted by Zonk on Saturday August 06, @06:36PM
from the come-on-in-boys dept.
humankind writes "The EFF is reporting that the Federal Communications Commission issued a release [pdf] announcing its new rule expanding the reach of the Communications Assistance to Law Enforcement Act (CALEA)." From the article: "Practically, what this means is that the government will be asking broadband providers - as well as companies that manufacture devices used for broadband communications - to build insecure backdoors into their networks, imperiling the privacy and security of citizens on the Internet. It also hobbles technical innovation by forcing companies involved in broadband to redesign their products to meet government requirements."


August 05, 2005

FCC Issues Rule Allowing FBI to Dictate Wiretap-Friendly Design for Internet Services

Tech Mandates Force Companies to Build Backdoors into Broadband, VoIP

Washington, DC - Today the Federal Communications Commission (FCC) issued a release announcing its new rule expanding the reach of the Communications Assistance to Law Enforcement Act (CALEA). The ruling is a reinterpretation of the scope of CALEA and will force Internet broadband providers and certain voice-over-IP (VoIP) providers to build backdoors into their networks that make it easier for law enforcement to wiretap them. The Electronic Frontier Foundation (EFF) has argued against this expansion of CALEA in several rounds of comments to the FCC on its proposed rule.

CALEA, a law passed in the early 1990s, mandated that all telephone providers build tappability into their networks, but expressly ruled out information services like broadband. Under the new ruling from the FCC, this tappability now extends to Internet broadband providers as well.

Practically, what this means is that the government will be asking broadband providers - as well as companies that manufacture devices used for broadband communications – to build insecure backdoors into their networks, imperiling the privacy and security of citizens on the Internet. It also hobbles technical innovation by forcing companies involved in broadband to redesign their products to meet government requirements.

"Expanding CALEA to the Internet is contrary to the statute and is a fundamentally flawed public policy," said Kurt Opsahl, EFF staff attorney. "This misguided tech mandate endangers the privacy of innocent people, stifles innovation and risks the functionality of the Internet as a forum for free and open expression."

At the same time, the Department of Justice (DOJ) is asking airlines to build similar backdoors into the phone and data networks on airplanes. EFF and the Center for Democracy and Technology (CDT) submitted joint comments to the FCC arguing against the DOJ's unprecedented and sweeping new technology design mandates and anticipatory wiretapping system.

The FCC's new proposal to expand CALEA to airline broadband illustrates the fallacy of law enforcement's rationale for its CALEA request. The DOJ takes the position that broadband has "substantially replaced" the local telephone exchange, but this claim is reduced to the point of absurdity aboard an airplane and opens the door for CALEA to cover just about anything.

Contact:

Kurt Opsahl
Staff Attorney
Electronic Frontier Foundation
kurt@eff.org

Posted at 05:49 PM


TOPICS: Crime/Corruption; Extended News; Government
KEYWORDS: fcc; foryourprotection; privacy
Navigation: use the links below to view more comments.
first 1-2021-38 next last
This sounds like a huge security hole that everyone will be able to attack.

I am all for wiretaps, but when you purposely put in a universal hole in your security, you are asking for people to target this hole. here, but it sounds like the These people are the Chinese, terrorists, etc.

They will take note to explote this.

I don't know why our government thinks these types of things will work in the future. There was a time when you had to physically had to touch and have the knowledge to exploit security holes.

I don't aggree with everything in this article, but it does appear as if the government is trying to enable the ability to scan all communciations on the internet searching for the subject communications. Problem is that this is subject to abuse and hacking by others that want to use this system.

1 posted on 08/06/2005 11:00:35 PM PDT by dila813
[ Post Reply | Private Reply | View Replies]

To: dila813

The feds can already eavesdrop on any electronic commerce they care to. They OWN the backbone....

I agree with you: this won't help the Feds at all and will be a tremendous boon for the criminals.


2 posted on 08/06/2005 11:05:38 PM PDT by clee1 (We use 43 muscles to frown, 17 to smile, and 2 to pull a trigger. I'm lazy and I'm tired of smiling.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: clee1
If I wanted to steal identities, this is where I would attack.

I could steal every identity in the United States.
3 posted on 08/06/2005 11:10:01 PM PDT by dila813
[ Post Reply | Private Reply | To 2 | View Replies]

To: dila813

Don't worry, they'll make it illegal to attack this vulnerability.

It will work as well as outlawing murder.


4 posted on 08/06/2005 11:10:59 PM PDT by flashbunny (Always remember to bring a towel!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: dila813

Let me guess if I know the feds the password will probably be either "password" or "gman"

Sheeesh stupid!


5 posted on 08/06/2005 11:11:46 PM PDT by Syntyr
[ Post Reply | Private Reply | To 1 | View Replies]

To: dila813

Tell those freaks to stay away from my back door. I'm not that kind of guy.


6 posted on 08/06/2005 11:13:10 PM PDT by RichInOC (Laguna Beach: Where men are men and gerbils are nervous.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dila813
Encrypt as if your life depends on it.

It does.

Get GPG

7 posted on 08/06/2005 11:13:47 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: flashbunny

I feel much safer now. As long as it is illegal I know no one will take advantage of this security hole.


8 posted on 08/06/2005 11:16:14 PM PDT by dila813
[ Post Reply | Private Reply | To 4 | View Replies]

To: dila813
They will take note to explote this.

Sort of like the way phreakers take advantage of internal phone company auditing systems...the kind that record your inbound and outbound phone numbers, length of phone calls, and even audio access to your conversations.

What law enforcement needs a court order for the telcos can do with impunity in the name of "internal auditing."

Privacy? It's just an illusion when you're dealing with anything electronic in an unencrypted environ, folks.

9 posted on 08/06/2005 11:16:29 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Syntyr

Password is "Wiretap"


10 posted on 08/06/2005 11:17:13 PM PDT by dila813
[ Post Reply | Private Reply | To 5 | View Replies]

To: clee1
The feds can already eavesdrop on any electronic commerce they care to. They OWN the backbone....

Actually, that's not true, and hasn't been since 1985.

The backbone (as you so quaintly put it) is composed of high speed circuits owned and operated by huge telle-com companies, little telephone companies, and private parties.

Some parts are owned by other governments, the British, Canadian, etc manage the tell-co in their respective countries.

11 posted on 08/06/2005 11:17:29 PM PDT by konaice
[ Post Reply | Private Reply | To 2 | View Replies]

To: Prime Choice

Uh huh.


12 posted on 08/06/2005 11:17:42 PM PDT by clee1 (We use 43 muscles to frown, 17 to smile, and 2 to pull a trigger. I'm lazy and I'm tired of smiling.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dila813
If I wanted to steal identities, this is where I would attack.

I could steal every identity in the United States.

Then watch all these companies get sued by victims for all the holes the government forced them to have.

13 posted on 08/06/2005 11:17:48 PM PDT by rmmcdaniell
[ Post Reply | Private Reply | To 3 | View Replies]

To: dila813
"Practically, what this means is..."

I can't help but giggle at that.

"CALEA, a law passed in the early 1990s"

Bubba legacy

14 posted on 08/06/2005 11:17:57 PM PDT by endthematrix ("an ominous vacancy"...I mean, JOHN ROBERTS now fills this space!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Prime Choice

Look up "AirSnort" as long as you can sniff the traffic, even if it is encrypted, you can crack it.

Most encryption schemes give you the illusion of privacy. As long as you can record the network traffic, there will be a way found to crack it.


15 posted on 08/06/2005 11:19:48 PM PDT by dila813
[ Post Reply | Private Reply | To 9 | View Replies]

To: dila813

Now who in h gave these clowns, no, tyrants, this kind of power? The number one criminal here is our government.


16 posted on 08/06/2005 11:21:45 PM PDT by jwh_Denver (How come people who say money can't buy you everything are filthy rich?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: konaice
backbone, doesn't matter

The way the Internet works the traffic is routed. Unless you are on the route, you can't listen in on the packets.

Not all traffic even hits the backbone, thats why the feds need this type of scheme.

Example, you can listen in on your neighbors broadband connections, but you can't listen in on Dan Rather's connection.

But, if you purchased a connection on the route to Dan's house, you can listen in.
17 posted on 08/06/2005 11:23:34 PM PDT by dila813
[ Post Reply | Private Reply | To 11 | View Replies]

To: konaice

Yes, you are correct. The bulk of the data traffic is carried over telco networks, and the root domain servers are "owned" by a quasi-public consortium.

However, if you don't think that the Feds can sniff any packet they like and at nearly any point on that quaint "backbone", you are sadly mistaken.

Network security, until very recently, has been by bread and butter for years. I'm here to tell you that Prime Choice is right on target: if you want privacy on the "public" network, it had best be heavily encrypted. Even then, if they want to break your traffic badly enough, they will eventually do just that.


18 posted on 08/06/2005 11:23:58 PM PDT by clee1 (We use 43 muscles to frown, 17 to smile, and 2 to pull a trigger. I'm lazy and I'm tired of smiling.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: endthematrix

Yes, it is a Clinton/Janet Reno thing


19 posted on 08/06/2005 11:24:42 PM PDT by dila813
[ Post Reply | Private Reply | To 14 | View Replies]

To: dila813
Look up "AirSnort" as long as you can sniff the traffic, even if it is encrypted, you can crack it.

Look it up? I use that and Airfart when doing penetration tests. Hell, wireless security is a frickin' joke. The only thing it does is provide wired equivalency at best.

You misunderstand me. I am referring to encryption of the content...even if it moves via an encrypted tunnel such as over a VPN and/or SSL/TLS.

Cracking PGP (or GPG) is another story altogether. That's what I'm talking about.

20 posted on 08/06/2005 11:24:52 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-38 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson