Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FCC To Require Backdoor Network Access for Feds
Slashdot ^ | 8/6/2005 | Zonk

Posted on 08/06/2005 11:00:35 PM PDT by dila813

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-38 next last
This sounds like a huge security hole that everyone will be able to attack.

I am all for wiretaps, but when you purposely put in a universal hole in your security, you are asking for people to target this hole. here, but it sounds like the These people are the Chinese, terrorists, etc.

They will take note to explote this.

I don't know why our government thinks these types of things will work in the future. There was a time when you had to physically had to touch and have the knowledge to exploit security holes.

I don't aggree with everything in this article, but it does appear as if the government is trying to enable the ability to scan all communciations on the internet searching for the subject communications. Problem is that this is subject to abuse and hacking by others that want to use this system.

1 posted on 08/06/2005 11:00:35 PM PDT by dila813
[ Post Reply | Private Reply | View Replies]

To: dila813

The feds can already eavesdrop on any electronic commerce they care to. They OWN the backbone....

I agree with you: this won't help the Feds at all and will be a tremendous boon for the criminals.


2 posted on 08/06/2005 11:05:38 PM PDT by clee1 (We use 43 muscles to frown, 17 to smile, and 2 to pull a trigger. I'm lazy and I'm tired of smiling.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: clee1
If I wanted to steal identities, this is where I would attack.

I could steal every identity in the United States.
3 posted on 08/06/2005 11:10:01 PM PDT by dila813
[ Post Reply | Private Reply | To 2 | View Replies]

To: dila813

Don't worry, they'll make it illegal to attack this vulnerability.

It will work as well as outlawing murder.


4 posted on 08/06/2005 11:10:59 PM PDT by flashbunny (Always remember to bring a towel!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: dila813

Let me guess if I know the feds the password will probably be either "password" or "gman"

Sheeesh stupid!


5 posted on 08/06/2005 11:11:46 PM PDT by Syntyr
[ Post Reply | Private Reply | To 1 | View Replies]

To: dila813

Tell those freaks to stay away from my back door. I'm not that kind of guy.


6 posted on 08/06/2005 11:13:10 PM PDT by RichInOC (Laguna Beach: Where men are men and gerbils are nervous.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dila813
Encrypt as if your life depends on it.

It does.

Get GPG

7 posted on 08/06/2005 11:13:47 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: flashbunny

I feel much safer now. As long as it is illegal I know no one will take advantage of this security hole.


8 posted on 08/06/2005 11:16:14 PM PDT by dila813
[ Post Reply | Private Reply | To 4 | View Replies]

To: dila813
They will take note to explote this.

Sort of like the way phreakers take advantage of internal phone company auditing systems...the kind that record your inbound and outbound phone numbers, length of phone calls, and even audio access to your conversations.

What law enforcement needs a court order for the telcos can do with impunity in the name of "internal auditing."

Privacy? It's just an illusion when you're dealing with anything electronic in an unencrypted environ, folks.

9 posted on 08/06/2005 11:16:29 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Syntyr

Password is "Wiretap"


10 posted on 08/06/2005 11:17:13 PM PDT by dila813
[ Post Reply | Private Reply | To 5 | View Replies]

To: clee1
The feds can already eavesdrop on any electronic commerce they care to. They OWN the backbone....

Actually, that's not true, and hasn't been since 1985.

The backbone (as you so quaintly put it) is composed of high speed circuits owned and operated by huge telle-com companies, little telephone companies, and private parties.

Some parts are owned by other governments, the British, Canadian, etc manage the tell-co in their respective countries.

11 posted on 08/06/2005 11:17:29 PM PDT by konaice
[ Post Reply | Private Reply | To 2 | View Replies]

To: Prime Choice

Uh huh.


12 posted on 08/06/2005 11:17:42 PM PDT by clee1 (We use 43 muscles to frown, 17 to smile, and 2 to pull a trigger. I'm lazy and I'm tired of smiling.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dila813
If I wanted to steal identities, this is where I would attack.

I could steal every identity in the United States.

Then watch all these companies get sued by victims for all the holes the government forced them to have.

13 posted on 08/06/2005 11:17:48 PM PDT by rmmcdaniell
[ Post Reply | Private Reply | To 3 | View Replies]

To: dila813
"Practically, what this means is..."

I can't help but giggle at that.

"CALEA, a law passed in the early 1990s"

Bubba legacy

14 posted on 08/06/2005 11:17:57 PM PDT by endthematrix ("an ominous vacancy"...I mean, JOHN ROBERTS now fills this space!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Prime Choice

Look up "AirSnort" as long as you can sniff the traffic, even if it is encrypted, you can crack it.

Most encryption schemes give you the illusion of privacy. As long as you can record the network traffic, there will be a way found to crack it.


15 posted on 08/06/2005 11:19:48 PM PDT by dila813
[ Post Reply | Private Reply | To 9 | View Replies]

To: dila813

Now who in h gave these clowns, no, tyrants, this kind of power? The number one criminal here is our government.


16 posted on 08/06/2005 11:21:45 PM PDT by jwh_Denver (How come people who say money can't buy you everything are filthy rich?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: konaice
backbone, doesn't matter

The way the Internet works the traffic is routed. Unless you are on the route, you can't listen in on the packets.

Not all traffic even hits the backbone, thats why the feds need this type of scheme.

Example, you can listen in on your neighbors broadband connections, but you can't listen in on Dan Rather's connection.

But, if you purchased a connection on the route to Dan's house, you can listen in.
17 posted on 08/06/2005 11:23:34 PM PDT by dila813
[ Post Reply | Private Reply | To 11 | View Replies]

To: konaice

Yes, you are correct. The bulk of the data traffic is carried over telco networks, and the root domain servers are "owned" by a quasi-public consortium.

However, if you don't think that the Feds can sniff any packet they like and at nearly any point on that quaint "backbone", you are sadly mistaken.

Network security, until very recently, has been by bread and butter for years. I'm here to tell you that Prime Choice is right on target: if you want privacy on the "public" network, it had best be heavily encrypted. Even then, if they want to break your traffic badly enough, they will eventually do just that.


18 posted on 08/06/2005 11:23:58 PM PDT by clee1 (We use 43 muscles to frown, 17 to smile, and 2 to pull a trigger. I'm lazy and I'm tired of smiling.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: endthematrix

Yes, it is a Clinton/Janet Reno thing


19 posted on 08/06/2005 11:24:42 PM PDT by dila813
[ Post Reply | Private Reply | To 14 | View Replies]

To: dila813
Look up "AirSnort" as long as you can sniff the traffic, even if it is encrypted, you can crack it.

Look it up? I use that and Airfart when doing penetration tests. Hell, wireless security is a frickin' joke. The only thing it does is provide wired equivalency at best.

You misunderstand me. I am referring to encryption of the content...even if it moves via an encrypted tunnel such as over a VPN and/or SSL/TLS.

Cracking PGP (or GPG) is another story altogether. That's what I'm talking about.

20 posted on 08/06/2005 11:24:52 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-38 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson