Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Communications Crime Government Privacy The Internet Your Rights Online

FBI Complains About Wiretapping Difficulties Due To Web Services 228

c0lo writes with news that the Federal Bureau of Investigation is lamenting the difficulty in executing wiretaps because of "web-based e-mail, social-networking and peer-to-peer services." "President Barack Obama's administration is debating ways to deal with Web-based services not covered by traditional wiretap laws, including incentives for companies to build in surveillance capabilities, said Valerie Caproni, general counsel at the FBI. Many Internet services are not covered by the Communications Assistance for Law Enforcement Act (CALEA), which requires traditional telecom carriers to allow law enforcement agencies real-time access to communications after a court has issued a wiretap order, she told members of a subcommittee of the US House of Representatives Judiciary Committee. But Caproni told lawmakers she was not asking for expanded CALEA powers. And she stopped short of calling for rules requiring Web-based communication providers to build in so-called back doors allowing law enforcement access to their software, although she said she's optimistic the US government can find incentives for companies to 'have intercept solutions engineered into their systems.'"
This discussion has been archived. No new comments can be posted.

FBI Complains About Wiretapping Difficulties Due To Web Services

Comments Filter:
  • by BitterOak ( 537666 ) on Saturday February 19, 2011 @09:55PM (#35257120)
    Would peer to peer services which offer end to end encryption like Skype be required to re-engineer their software to allow government wiretaps? This could be the end of personal use encryption as we know it.
  • A few reasons (Score:5, Interesting)

    by sjames ( 1099 ) on Saturday February 19, 2011 @10:25PM (#35257248) Homepage Journal

    I can think of about 84,000 good reasons we don't want to make pushbutton law enforcement any easier than it already is.

    Watching people is supposed to be resource intensive, that's what makes sure they only do it when it's absolutely necessary.

    Here's an idea, I will build in a police API to tap the web messages BUT it will automatically CC all requests to the EFF, ACLU, and Wikileaks. By using the API they agree to the CC up front.

    I'm guessing it will be the world's least used police back door.

  • by Anonymous Coward on Saturday February 19, 2011 @11:10PM (#35257408)

    Remember, folks. This is now OBAMA'S FBI. Where are all the cries of, "Fascist!" and "ZOMG Nazi!" now?

    Gitmo still open? Check!

    US Gov't still conducting warrantless wiretaps on citizens? Check!

    US Gov't still in bed with mega corporations? Double check!

    Still bogged down in 2 sandy 3rd world shitholes populated by diaperheads that hate us? Check!

  • yea no... (Score:4, Interesting)

    by Charliemopps ( 1157495 ) on Saturday February 19, 2011 @11:35PM (#35257470)
    My companies solution to this was to ship the entire email nightmare over to Google, let them deal with it. In fact, if law enforcement were to REQUIRE we do something anyway I'd think we'd just drop email all together. It's not profitable, we can't charge for it, it's nothing but a headache. So basically law enforcement would just be force ALL email off shore.
  • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Sunday February 20, 2011 @02:09AM (#35257972) Journal

    I agree the vulnerabilities you mentioned are correct, but I really don't think "security theater" is appropriate here.

    First, SSL as a technology works just fine. It's entirely possible to create a restricted set of CAs and certificates and have a system at least as secure as, say, SSH. I know I do something similar with OpenVPN connections, which use OpenSSL certificates. Not every use of SSL is the mess that the typical HTTPS in your browser is.

    Second, it reduces the number of individuals who can successfully MITM you massively. For a live demonstration of this, walk into any coffee shop and fire up FireSheep, and look at how many people are vulnerable. Flip on SSL and, far from security theater, they are at least safe from you.

    By contrast, what Schneier was talking about was specifically the act of guarding against the sort of threat you'd see as a movie plot, which is a real threat, but is so unlikely and specific that defending against it simply isn't worth it -- often, it's not just a matter of money and resources, it actually buys you no additional security, whereas SSL does provide some security.

    Let me put it this way: Forcing you to remove your shoes and surrender any significant amounts of liquid is security theater, because it's defending against specific threats which we've already seen -- I suppose the next bomb will be in someone's hat instead, or made of solid pastes instead of liquid. By contrast, a bulletproof vest is not security theater just because it doesn't defend against a headshot -- even ignoring that helmets exist for that purpose, if it really seems likely you'll get in a firefight of some sort, it's still going to be a lot harder for someone to take you out of the fight, and certainly harder for them to do anything fatal.

    I do share your concern for SSL, though. If I may abuse the above analogy, it's become apparent that we need helmets, and maybe better armor.

  • by Aryden ( 1872756 ) on Sunday February 20, 2011 @06:20AM (#35258712)
    and just who do you say we vote in? the next guy that will do the same thing, but said he wouldn't during the election? Get real. The problem lies in the system of electing people who WANT to be in those positions rather than people who are actually qualified to be in them. I do not give 2 shits if a politician has experience in foreign policy if that self same politician is making, executing or ruling on IP Law. I want people that actually understand what IP law is and the technologies involved doing that.

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...