Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FCC To Require Backdoor Network Access for Feds
Slashdot ^ | 8/6/2005 | Zonk

Posted on 08/06/2005 11:00:35 PM PDT by dila813

Your Rights Online: FCC To Require Backdoor Network Access for FedsPosted by Zonk on Saturday August 06, @06:36PM
from the come-on-in-boys dept.
humankind writes "The EFF is reporting that the Federal Communications Commission issued a release [pdf] announcing its new rule expanding the reach of the Communications Assistance to Law Enforcement Act (CALEA)." From the article: "Practically, what this means is that the government will be asking broadband providers - as well as companies that manufacture devices used for broadband communications - to build insecure backdoors into their networks, imperiling the privacy and security of citizens on the Internet. It also hobbles technical innovation by forcing companies involved in broadband to redesign their products to meet government requirements."


August 05, 2005

FCC Issues Rule Allowing FBI to Dictate Wiretap-Friendly Design for Internet Services

Tech Mandates Force Companies to Build Backdoors into Broadband, VoIP

Washington, DC - Today the Federal Communications Commission (FCC) issued a release announcing its new rule expanding the reach of the Communications Assistance to Law Enforcement Act (CALEA). The ruling is a reinterpretation of the scope of CALEA and will force Internet broadband providers and certain voice-over-IP (VoIP) providers to build backdoors into their networks that make it easier for law enforcement to wiretap them. The Electronic Frontier Foundation (EFF) has argued against this expansion of CALEA in several rounds of comments to the FCC on its proposed rule.

CALEA, a law passed in the early 1990s, mandated that all telephone providers build tappability into their networks, but expressly ruled out information services like broadband. Under the new ruling from the FCC, this tappability now extends to Internet broadband providers as well.

Practically, what this means is that the government will be asking broadband providers - as well as companies that manufacture devices used for broadband communications – to build insecure backdoors into their networks, imperiling the privacy and security of citizens on the Internet. It also hobbles technical innovation by forcing companies involved in broadband to redesign their products to meet government requirements.

"Expanding CALEA to the Internet is contrary to the statute and is a fundamentally flawed public policy," said Kurt Opsahl, EFF staff attorney. "This misguided tech mandate endangers the privacy of innocent people, stifles innovation and risks the functionality of the Internet as a forum for free and open expression."

At the same time, the Department of Justice (DOJ) is asking airlines to build similar backdoors into the phone and data networks on airplanes. EFF and the Center for Democracy and Technology (CDT) submitted joint comments to the FCC arguing against the DOJ's unprecedented and sweeping new technology design mandates and anticipatory wiretapping system.

The FCC's new proposal to expand CALEA to airline broadband illustrates the fallacy of law enforcement's rationale for its CALEA request. The DOJ takes the position that broadband has "substantially replaced" the local telephone exchange, but this claim is reduced to the point of absurdity aboard an airplane and opens the door for CALEA to cover just about anything.

Contact:

Kurt Opsahl
Staff Attorney
Electronic Frontier Foundation
kurt@eff.org

Posted at 05:49 PM


TOPICS: Crime/Corruption; Extended News; Government
KEYWORDS: fcc; foryourprotection; privacy
Navigation: use the links below to view more comments.
first previous 1-2021-38 last
To: Prime Choice

ok, aggreed

But that is a major behavior change for people

You almost have to live a security lifestyle to prevent this.


21 posted on 08/06/2005 11:27:10 PM PDT by dila813
[ Post Reply | Private Reply | To 20 | View Replies]

To: dila813
"Government backdoors" will not accomplish their nominal objectives. Professional criminals will just use Guardster and/or Neomailbox.com, and/or other equivalent services. Large criminal organizations, intelligence services and terrorist networks (sorry about the redundancy) will construct and use their own privacy technologies that operate on top of the public communications networks, with cost being no object.

Since the Feds know all this, the question that should be asked is what their true motives actually are.

22 posted on 08/06/2005 11:29:43 PM PDT by sourcery ("Compelling State Interest" is the refuge of judicial activist traitors against the Constitution)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dila813
ok, aggreed But that is a major behavior change for people

That's putting it mildly. I've long since earned the distinction of being known as my agency's "Crypto Evangelist."

You almost have to live a security lifestyle to prevent this.

I do. It's my life, my hobby, and my job.

23 posted on 08/06/2005 11:29:51 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 21 | View Replies]

To: dila813
I am not worried, voice over broadband can't even get e911 service to work.
24 posted on 08/06/2005 11:31:57 PM PDT by Pro-Bush (We're not vigilantes! We're undocumented Border Patrol agents!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dila813

The moment hackers start using these government mandated 'backdoors' to take control and shutdown these networks (costing the U.S. economy tens of billions in U.S. dollars), this regulation will be shelved.


25 posted on 08/06/2005 11:35:36 PM PDT by Paul C. Jesup
[ Post Reply | Private Reply | To 1 | View Replies]

To: Prime Choice
Ok, but would you agree we are making the sheeple very venerable to this tool when taking into consideration that the majority won't and can't live this security lifestyle (unless we radically alter their windows os)
26 posted on 08/06/2005 11:36:01 PM PDT by dila813
[ Post Reply | Private Reply | To 23 | View Replies]

To: endthematrix
Bubba legacy

Yes, the legacy that keeps on raping the U.S. population.

27 posted on 08/06/2005 11:38:22 PM PDT by Paul C. Jesup
[ Post Reply | Private Reply | To 14 | View Replies]

To: dila813
Dammit..

I just KNOW the ACLU is going to take up this topic..
I HATE having to support the ACLU on topics..

But in this instance I will have to..

28 posted on 08/07/2005 12:39:51 AM PDT by Drammach (Freedom; not just a job, it's an adventure..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Drammach
I just KNOW the ACLU is going to take up this topic.. I HATE having to support the ACLU on topics..

I once saw someone say they split their giving between the ACLU and the NRA so they could get coverage on the whole bill of rights.

29 posted on 08/07/2005 1:05:58 AM PDT by cryptical
[ Post Reply | Private Reply | To 28 | View Replies]

To: dila813; Prime Choice

As long as you use a sufficiently healthy key pair, PGP is essentially unbreakable, but some in government have taken care of that as well. I don't remember the details of the case, but the simple fact that the defendant used PGP was enough to convict him recently. Also, some people have done time for refusing to give up the passphrase to their decryption key.

I fear the privacy and freedom we have given up in the name of "Homeland Security" will not easily be won back.


30 posted on 08/07/2005 4:29:25 AM PDT by NCSteve
[ Post Reply | Private Reply | To 21 | View Replies]

To: NCSteve
As long as you use a sufficiently healthy key pair, PGP is essentially unbreakable, but some in government have taken care of that as well.

With commercial PGP, sure. But with Open Source GPG, I doubt it.

I don't remember the details of the case, but the simple fact that the defendant used PGP was enough to convict him recently.

I'm going to have to see some details on that. What you describe is absurd and a positively blatant violation of the Fifth Amendment. Even if it flew in one court (which I find highly doubtful), it'd never fly on appeal.

Also, some people have done time for refusing to give up the passphrase to their decryption key.

I think you've got some seriously erroneous reports, Steve. Not forking over a passphrase is totally covered under the Fifth Amendment (the right to not incriminate yourself).

I'm going to need to see some credible links on these claims.

31 posted on 08/07/2005 11:10:08 AM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 30 | View Replies]

To: dila813
Ok, but would you agree we are making the sheeple very venerable to this tool when taking into consideration that the majority won't and can't live this security lifestyle (unless we radically alter their windows os)

Getting people to understand the nature of security is difficult when the sheeple live under the illusion that the police will "protect" them...never minding all the court precedents that have ruled that no police are thus obligated in any way.

I think it was Albert Ellis who once remarked that most people don't want to be of sound mental faculties; they just want to be happy neurotics. In the same vein, most people don't want real security; they just want reinforcement of the illusion of security.

32 posted on 08/07/2005 11:15:08 AM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 26 | View Replies]

To: Prime Choice
Hell, wireless security is a frickin' joke.

What's your take on spread spectrum? That bit-rotation thing on top of encyrption looks like it could be a bear to crack.

33 posted on 08/07/2005 11:22:29 AM PDT by tacticalogic (Say goodnight, Grace.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: tacticalogic
What's your take on spread spectrum? That bit-rotation thing on top of encyrption looks like it could be a bear to crack.

Spread spectrum is based on a frequency vs. time function utilized by the transmitter. It adds a layer of complexity, but it doesn't eliminate the threat of hostile eavesdroppers; especially when the hardware and software is commercially available to anyone who can afford it.

For my own part, I won't have anything to do with 802.11b or g. Even with SSID broadcast turned off, MAC filtering enabled, and WEP or WPA (which is strictly interim until 802.11i) enabled, it's only wired equivalency at best.

34 posted on 08/07/2005 11:42:34 AM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 33 | View Replies]

To: Prime Choice
I should have been more clear. Both cases took place in the UK. However, all challenges to the UK law have failed on grounds of the "greater public good." But, I wouldn't advise standing on the Fifth Amendment. The courts in this country obviously have no regard for that particular piece of the Bill of Rights. Remember Kelo? Is it so hard to imagine the courts here making a similar ruling in the name of "Homeland Security?"
35 posted on 08/07/2005 4:49:55 PM PDT by NCSteve
[ Post Reply | Private Reply | To 31 | View Replies]

To: NCSteve
I should have been more clear. Both cases took place in the UK.

Ohhhhhhhhhhhhhhhhh! Well, that's diff'rent!

I wouldn't advise standing on the Fifth Amendment.

Please consult a lawyer on this. I did. The State cannot compel you to testify against yourself. If anyone ordered me to do as much, I'd go Federal on 'em.

As for Kelo, I wish I knew what the hell the Supremes were thinking when they handed down that abomination...it's just a frickin' mystery.

36 posted on 08/07/2005 5:39:09 PM PDT by Prime Choice (Thanks to the Leftists, yesterday's deviants are today's "alternate lifestyles.")
[ Post Reply | Private Reply | To 35 | View Replies]

To: dila813
as well as companies that manufacture devices used for broadband communications – to build insecure backdoors into their networks, imperiling the privacy and security of citizens on the Internet.

It should be interesting trying to convince, say, the Red Chinese to participate in this scheme.

37 posted on 08/07/2005 5:48:24 PM PDT by snowsislander
[ Post Reply | Private Reply | To 1 | View Replies]

To: Prime Choice
Please consult a lawyer on this. I did.

Given that the SCOTUS stepped around the property rights portion of the Fifth Amendment as easily as it did, what makes you (or your lawyer) think the self-incrimination portion is sacrosanct?

38 posted on 08/08/2005 5:14:04 AM PDT by NCSteve
[ Post Reply | Private Reply | To 36 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-38 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson