Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Privacy

FCC Reinstates CALEA Surveillance Capabilities 113

tekneeq writes "According to this article on Yahoo, the FCC will require all US wireline, cellular, and broadband PCS carriers to provide law enforcement with surveillance capabilities by June 30th. Carriers will have to supply a multitude of information upon request, such as numbers dialed after a call is connected, call forwarding signals, and signals pertaining to voice mail services." Although it's hard to tell from the Reuters story, this is a continuation of a lawsuit filed against CALEA a few years ago. Read on for more.

This is a complex issue that we don't cover very often, so it requires some background. CALEA is the Communications Assistance for Law Enforcement Act. EPIC has a set of pages about CALEA, a law enacted in 1994 to require telephone companies to build "tap-ability" into their communications equipment. This is voice traffic, not data - don't get this confused with Carnivore, the FBI's tool for slurping down internet traffic. At the time, carriers were transitioning from analog networks to digital ones, and there was some concern that the new digital network would not permit the FBI to listen in easily. Due to the possible expenses incurred by the telephone companies in implementing this, Congress greased the skids with a $500,000,000 (yes, that's half a billion dollars) grant to the companies. Congress granted the FCC the power to decide exactly how to implement this, and the FCC asked for comments. The FBI suggested that the rules should make sure lots of information was available to the FBI, the civil liberties groups suggested that the rules should make sure little information (or at least no more than was available in the old analog system) was available to the FBI, and the phone companies suggested that the rules be inexpensive.

Let's go back in time a moment to look at the old, analog way of doing things. In a nutshell, there are two different ways to conduct a government search on someone's telephone calls: you can search to see who was calling who, or you can search to get the actual content of a telephone call. The first type of search is called a pen register or trap and trace. The pen register is the list of phone numbers you've called. Trap and trace gets the numbers of people who call you. These were (at one time) literal devices which would be physically attached to your phone line. Both of these have been seen by the courts and Congress as much less private (after all, you're "giving" the information to the phone company with every call) than the actual content of your calls, which can only be obtained with a wiretap. Under the old rules, getting pen register or trap and trace information requires only a simple warrant, issued by any judge. Under the law, the judge does not even have the discretion to refuse to issue the order! Nor should you get the impression that this is solely the FBI. Many states allow similar telecommunications searches, and in fact state law enforcement does the bulk of them.

The open question was, with many new digital phone services becoming available, what information would be obtainable with the (non-refusable) pen register or trap and trace-type order, and what would require a real search warrant where a judge is supposed to exercise his discretion in deciding whether to grant it or not? That is, in what cases would "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." be applied, and in what cases would the government be allowed to simply take the information without meeting those requirements?

Eventually the FCC released its interpretation of what the phone companies should do to implement CALEA. The FCC required several things that were "new" and expanded law enforcement's surveillance abilities. One requirement was that all the digits you dial after the call is put through be recorded and provided. So if you dial your bank to transfer funds to checking, or dial your voicemail to retrieve it, or send a message to someone's pager, your bank account number and PIN, your voicemail password, whatever you sent to the pager - all that can be retrieved without a search warrant by any law enforcement official. The FCC also required that if you were using a cell phone, that your physical location be provided as well. They required that if more than two people were on the line, complete information about who joined or dropped out of the conference call be made available. Similarly, data about call waiting or call forwarding was to be provided if these were used. And finally, if you were using VOIP, the government could get all the headers of all your packets sent during the call.

Cue the lawsuits. Civil liberties groups were concerned that the rules were too broad, the FBI was happy (the FCC had given them all they could want), and the telephone companies were concerned that the changes would be too expensive. The civil liberties groups and the telecom industry filed suits to force the FCC to revise its order.

In the case at hand, the telecom industry sued, claiming various things but attempting, in general, to reduce the cost of compliance. The lawsuit was partially successful. The court rejected certain aspects of the FCC's order, and accepted the cell-location and packet-headers parts. The reason for rejecting the other parts was basically that the FCC did not justify itself sufficiently - there are various requirements, created by previous courts, that when an agency creates rules like this that will have the force of law, that they do so in a reasonable and justified manner. The court felt that the stricken requirements did not meet this standard, and chucked the ball back into the FCC's court.

Fast-forward to today. The FCC has reinstated all of the four requirements that were stricken by the courts, and this time it took pains to justify itself. That's what the Reuters article linked above is talking about, and you can read the order yourself in text or in PDF.

There are other lawsuits filed against CALEA that have not yet concluded. Rulings in those may be expected this summer.

As a sidenote, a great many other laws have passed since then expanding other surveillance activities. Under them, the government can now record your internet-browsing activities in much the same way as they can can trace your phone calls - without judicial supervision. If you haven't already, you might wish to read more about the PATRIOT Act.

This discussion has been archived. No new comments can be posted.

FCC Reinstates CALEA Surveillance Capabilities

Comments Filter:
  • Maybe everyone doesn't want their privacy violated, but cellular phone devices are frequently used in criminal activities because of their mobility. I'm not saying this post is right or wrong, but at least they aren't tapping everyone's land line. While criminals could just switch to say, pay phones that work, to do their bidding, cell phones are a lot more convenient. Even if some do change their numbers every two days.
    • dude youre right.
      I think there should be locator devices on all cars.

      Cars are frequently used in criminal activities because of their mobility. I'm not saying this post is right or wrong, but at least they aren't putting beacons on your body.. While criminals could just switch to say, walking, to do their bidding, cars are a lot more convenient. Even if some do change their plates/cars every two days.
      • You don't have to use cell phones, though. You don't have to use phones period, but they're almost required to live effectively. As are cars. Cell phones are an option, and a very handy option for certain situations. I'm all for privacy, and I wouldn't want cell phones to be totally snooped, I see nothing wrong with the tracking of times and numbers called.
        • exactly, I see nothing wrong with storing your gps coordinates whenever you start moving your car until it becomes stationary again.

          Little things add up. You need to balance the privacy violations with the good. Now, the problems with todays legal system is not what Law Enforcement is allowed to do, its how often and how easy it is for them to justify and get 'permission' to do it.

          And by the way, there is no OPTION. We should have life, liberty and the pursuit of happiness. All laws enacted LIMIT our fullscale freedom. They arent enacted to add to, or enhance. If you try the 'option' bs then we can all agree that everything but eating and sleeping is optional in life. Its a pathetic argument. Point is: We start with EVERYTHING, every opportunity. Those are limited for the good of everyone(Ie: killing people is not legal.) by laws. Basically...its not about priveleges, its all about limiting your initial 3 rights. =-] (Sure some 'priveleges' are created from those limits)

          So...how much do you want to give up today? =-]
        • In major cities, you don't have to drive, either. You can take public transit or a taxi... less convenient, but hey. It's a small price to pay, right...


          The issue is not the technical ability. The issue is, under what circumstances can this be used? What justification does law enforcement have to offer? With pen-register, the answer is, "Virtually none." With wiretap, it's the same as a physical search. Which should cell phone content be considered? How about routing info?



          If you mistake this post for legal advice, well, the court'll probably at least find that you're not mentally competent to stand trial...

          • In major cities, you don't have to drive, either.

            You need to modify this with "some"
            In San Diego you *have* to drive or your life is practically worthless. Public transportation is crap and the city is huge geographically for its population.

            • >> In San Diego you *have* to drive or your life is practically worthless

              Have you ever actually tried the bus or the train? San Diego has an excellent system.

              Driving is a hassle. Ride the bus and read the paper, relax on the way to work tomorrow.
              • Have you ever actually tried the bus or the train? San Diego has an excellent system.

                I haven't ridden the bus in years here, but it took a loooong time to get anywhere.
                I worked downtown for a while and took the trolley. It works well, but only if you are near to a station, and have a car to get to the station. It would add at least an hour to bus to the trolley station and back.

                Driving is a hassle.

                True

                Ride the bus and read the paper, relax on the way to work tomorrow.

                Unfortunately this won't work for me. I am self employed and do consulting for companies all over the county: downtown, Sorrento Valley, Carlsbad, etc.
                Granted this is a somewhat unusual situation, but I spent a few weeks in London in September and was amazed by the public transportation system. This is even given that most Londoners seemed to be bitching about how it's gone way downhill recently.

            • Blockquoth the poster, quoting me:


              In major cities, you don't have to drive, either.

              You need to modify this with "some"

              I guess my New York roots are showing. Any city without an adequate public transit system is, IMHO, not a "major" city. :)
              • Any city without an adequate public transit system is, IMHO, not a "major" city. :)

                If you are using this as part of your definition of major city, then it's not arguable since it's a definition, but by most other definitions, LA is a major city and public transportation there is crap.

    • I don't have a problem with phone tapping when supervised by a strict, non-trivial judicial process and oversight. But the FCC appears to be making all sorts of new information obtainable with what is more or less a mandatory sign-off. That's trivial, and makes it far too easy (and much more likely to be abused).

      I don't want law enforcement to be unnecessarily hindered when they're honestly working on a case, but I darn-well want the cops to be able to justify exactly why they need such broad taps before they're allowed to conduct them. "Ummm... cause he looks funny" appears to be a perfectly valid reason under these regs, and that's not good enough.

    • You are right - but allowing monitoring of communications without judicial oversight creates a presumption of guilt, instead of a presumption of innocence. It also allows abuse by law enforcement with a strong possibility of little or no punishment for such abuse. Our current administration pays lip service to privacy regulations and being on the side of the average person, but then allows the government to walk all over due process in the name of security. No one, and I mean no one, has the right to shit on the Constitution.
  • Yet another way to hurt the good guys.

    I wonder when the word "privacy" will altogether disappear from English dictionaries....

    -kwishot
    • It'll still be in English dictionaries, its the American ones it'll be removed from....
    • Minute by minute, day by day.. we are being drained of our privacy right before our collective eyes. September 11th represents fuel being added to the fire that is represented by paranoia. In the war on terrorism, who is winning? We are slowly and methodically being drained of our freedoms while being watched closer and closer... Based on recent bills that have been passed with little opposition, you have to wonder exactly where it will all go from here!
    • by Rayonic ( 462789 ) on Friday April 12, 2002 @09:50PM (#3332993) Homepage Journal
      > I wonder when the word "privacy" will altogether disappear from English dictionaries....

      Of course it'll always be there. See:

      Privacy \Pri"va*cy\, n.; pl. Privacies. [See Private.]

      1. The state of acting in secret in order to plot a terrorist activity. "The terrorist needed privacy so nobody could see the bomb he was preparing."

      2. A dubious cause that various underground bodies like the ACLU (American Criminal Liberties Union) and the EFF (Electronic Fear Foundation) rally around.

      3. (slang) General descriptor of something which threatens security and freedom. "That new bill Senator Jones is introducing is horrible. It's a privacy!" or "Encryption is a privacy to all we hold dear."
  • by Anonymous Coward on Friday April 12, 2002 @08:11PM (#3332726)
    Enough said.

    You might need to spend a bit in there but you will find the goods. Please DO NOT xfer files in bulk. Its running financially strapped. You should buy cdrom archives of the bulk of it before the site suffers and dwindles from bandwidth abuse.
    • i would love to buy a cd but a $100 is a little much ;]
      Theres something to be said about pricepoints, sure the info is worth much more than that...but I bet the number of people buying cds would increase exponentially if the price were lower =-]
    • Please DO NOT xfer files in bulk. Its running financially strapped. You should buy cdrom archives of the bulk of it before the site suffers and dwindles from bandwidth abuse.

      Cryptome should definitely consider a P2P network for transfering their files. I'm thinking along the lines of BitTorrent [bitconjurer.org]. This would no doubt cut down on their "financially strapped" bandwidth while increasing it for everyone else downloading.

  • Just more proof. (Score:1, Interesting)

    by tcd004 ( 134130 )
  • Mirror (Score:1, Funny)

    by Anonymous Coward
    Here is a mirror [yimg.com]
  • well... (Score:3, Informative)

    by GutBomb ( 541585 ) on Friday April 12, 2002 @08:18PM (#3332753) Homepage
    this does not make cell phones more "tapable" than a regular phone. they have thier ways of tapping your land phone already. it does not mean they are listening to it. the same applies here. they will have a way to tap your cell phone, but they are most likely not listening to it anyway... that aside, i am sure they will be listening to some phone calls regardless of thier content, mostly so they can justify the $500 millon they spent getting such a system in place.
    • Worried about inappropriate collection of cellphone 'content'?
      Here in the UK, Echelon (www.echelonwatch.org) listens to all cellphone communications and all microwave relays (some of which transmit 'landline' calls) already.
      Big Brother may not be watching yet - but he's listening vey hard.
    • Actually, unless I borrow someone else's cell phone, the government knows exactly where I am through the phone at all times. That is just a bit 1984-ish in my book. The point is not how much more tapable the phone is but the rules under which they can be tapped, which have now been extended.
  • Wording... (Score:3, Interesting)

    by kwishot ( 453761 ) on Friday April 12, 2002 @08:24PM (#3332765)
    From the text:

    Although we understand "call- identifying information" to consist of both dialing and signaling information that may or may not be described in terms of telephone numbers, we emphasize that not all dialing and signaling information is "call-identifying information." For example, parties using bank- by- phone systems, automated prescription renewal services, and voicemail systems often enter account numbers, prescription numbers and passcodes that do not affect how the network processes the ongoing call. To reach this distinction, we look at the definition of "call- identifying information":
    "dialing or signaling information that identifies the origin, direction, destination, or termination of each communication generated or received by a subscriber by means of any equipment, facility, or service of a
    telecommunications carrier." 81 While some dialing or signaling information identifies the origin, direction, destination, or termination of a communication, 82 other dialing or signaling information - such as a bank account number - clearly does not. Again, an analysis of traditional pen register surveillance supports this distinction. During a traditional pen register surveillance, a LEA receives all signals that are
    sent from the intercept subject to the carrier, including 'off- hook' and 'on- hook' signals, hook flashes, ringing tones and busy signals. 83 Because special equipment is used to identify and record those audio
    signals used in call processing, the traditional model recognizes that there is a distinction between audio signals that are call content and audio signals that are call- identifying. 84 This model also supports a broad interpretation of what "identifies" the origin, direction, destination, or termination of a communication.
    ------
    I've been briefly looking over the document, and I can't seem to find where they specifically say that they want access to the call *content*. In fact, they seem to be saying that their original intent (to get call-identifying information) was misinterpreted to mean call-content.
    Maybe I just haven't found it yet, but does anyone know which part specifically says that they need access to call *content*?

    -kwishot
    • It's all down to their "special equipment" (see 83) - they get access to everything and their "special equipment filters out the call content. Must be pretty special equipment if you ask me! ;o)
    • To see their point of view, I can imagine people using 1800COLLECT or callback services to route around the system. That might, in the FCCs mind, mean that numbers dialed during the "content" portion of the call are still call-identifying.

      Of course, I highly doubt that they'll actually make any sort of distinction between your dialing a number that routes phone calls and any other numbers, so they'd be able to get content information in the process, without a pesky warrant standing in their way.

      Fortunately, touch tone voice-mail type systems may be going the way of the dinosaur as good voice-recognition/dialog systems become adopted.

  • bah.... (Score:4, Insightful)

    by jeffy124 ( 453342 ) on Friday April 12, 2002 @08:31PM (#3332791) Homepage Journal
    this means little. it's not like tomorrow the FBI's gonna know what your PIN is for your bank account. this was jsut a proposal.

    Also, because the judge initially rejected the FCC interpretation due to lack of justification doesnt mean he'll approve it because they "justified" it. He only rejected them the first time because EPIC et al said they didnt provide justification, and the judge agreed. Now (if I know legal patterns well enough) EPIC et al is going to be challenging those justifications, making the judge decide on the merits of the FCC's justification. Only after the judge gives the ok to the FCC does this actually become a real issue (for those who care about it).
  • ...but only on one condition.

    I would agree to this, if it were explicitly stated that the companies were legally required to refuse the information if a specific warrant is not shown to the company.

    That's just it. The FBI can search whatever the heck of mine they want, if they show me a warrant first. No sooner.
  • by SlamMan ( 221834 )
    Ok, so heres where I stand: The cell phone companies can do this sutff anyway, right? So if the police have a proper warrent to get this information, then mroe power to em. Now, I'd like to be informed that information about me has been seized, but otherwise, I see no problem with this. Checks and balances at work.
  • Hmm. (Score:3, Funny)

    by saintlupus ( 227599 ) on Friday April 12, 2002 @08:44PM (#3332835)
    According to this article on Yahoo, the FCC will require all US wireline, cellular, and broadband PCS carriers to provide law enforcement with surveillance capabilities by June 30th.

    Well, I certainly hope this helps us put a stop to those pesky terrorists. After all, look how well the RICO laws worked at eliminating organized crime.

    --saint
  • Isn't there supposed to be GPS chips installed in all cell phones as of last year anyways under the guise of being able to home in on accident victims more precisely than the current system? Let's see, with GPS installed and phone taps readily available now, doesn't that make anyone else here just a wee bit uneasy about using a cell phone? I'm going back to my trusty tomato cans and a long line of sting soon, that is until the NSA figures out how to listen in on my conversations by using a laser to read the vibrations off the string.... dang it!
    • Isn't there supposed to be GPS chips installed in all cell phones as of last year anyways under the guise of being able to home in on accident victims more precisely than the current system?

      The network doesn't need GPSes in the phone to locate the phone:

      The existing base stations already locate the phone by relative signal strength, at a minimum, to decide which station is the best one to contact it. They do this as a separate transaction before actually ringing the phone. If you don't have a monitor on the phone to let you know every time it transmits you won't know if they're pinging it.

      With a very small software upgrade the phone companies can trivially locate the phone to the resolution of the nearest cell tower whenever it is being used, and with a very slightly more extensive software upgrade they can ping it but not ring it, and tell the police the results.

      The base stations can also measure the round-trip delay to the phone, thus obtaining the radius of a sphere centered on the cell antenna. The phone will be on the surface of that sphere if the path is direct, slightly inside it if the path takes a bounce. (The intersection of the sphere with the earth's surface is a circle if the ground is level.) With two base stations the phone is located to the intersection of two spheres - a vertical circle intersecting the ground at two points. With three base stations (that aren't on a straight line but are at the same altitude) you typically get one or two points in space, and if it's two they're one above the other. Bingo.

      Of course this also works just pinging the phone without ringing it. There's a variant that lets the one handling the call or pinging the phone provide timing info to others that are passively monitoring.

      This capability is already deployed in some cell systems. In at least one city it is used to create traffic condition reports by measuring the speed of active cell phones in traffic on major routes.

      These capabilities make it possible to "tail" anyone with a cell phone, any time the phone is powered up.

      Once you're being tailed the location data can be archived, then data-mined to to create a dossier of your typical behavior, then call for a cop's attention if you deviate from your normal travel habits.

      One of the reasons the mandate is so expensive is it requires enough equipment to simultaneously monitor an ENORMOUS number of phones. (Something like a third of all of them or a third of the calls in progress, if I recall old news items correctly.) It's not enough to continuously monitor everybody all the time. But I seem to recall thinking that it IS enough to monitor everybody with a criminal record or a green card, even in "high-crime" residential areas, plus all the pay phones. (Am I confused on this?) Of course cell-phone location monitoring, rather than call content monitoring, isn't a big load once the software is in place to do it at all. So that can be done to ALL the cellphones ALL the time.

      Let's see, with GPS installed and phone taps readily available now, doesn't that make anyone else here just a wee bit uneasy about using a cell phone?

      Yep.

      Makes me want to turn off my phone (and remove the battery) whenever I'm not actually making a call, and to use a vending-machine calling card in payphones when on vacation.

    • Yeah but that capability is only good for like 500 feet or something (I could be way off on this, I can't find the article) and the reasoning for the GPS chips was that they could pinpoint accident victims within 50'. The big difference between 500' and 50' for emergency crews is that 50' will tell you what side of the road the person is on and since every minute counts, if they have to go on the other side of the road to get you, it may take them 20 minutes in heavy traffic to find you and you'd be dead by then. At least that was the premise behind it. I think it was to track me, but I'm paranoid from all the implants the government has put in me....
    • I'm going back to my trusty tomato cans and a long line of sting soon, that is until the NSA figures out how to listen in on my conversations by using a laser to read the vibrations off the string.... dang it!

      The frightening thing is I doubt it would take them long.

    • They are still in the process of implementing the 911 emergency phone locator. The phones themselves need no new chips or software, its the cell companies' software that needs to be upgraded for the 911 locator thing to be implemented.

      GPS has nothing to do with this, it works based on how long the signal from your phone takes to hit 3 different cell towers.
  • Considering how our privacy has gone down the tubes, it's time to roll out the encryption. One thing we can be grateful for is the delay, giving us more broadband options for our encoded communications. Break out PGP phone and all the rest, and hope they don't ban crypto as well.
  • I'd phone my congressman and senator to complain but I, errr, don't want to.
    • I'd phone my congressman and senator to complain but I, errr, don't want to.

      At least with this there'd be someone on the other end paying attention to what you're saying!!
      • At least with this there'd be someone on the other end paying attention to what you're saying!!

        We need a new moderation: +1 sad.
        It's equivalent to "funny if it weren't true"

  • As a professional who writes software for phone systems and switches, I'm telling you compliance with that date is impossible as are the other CALEA requirements. There is too much old telecomunications equipment that cannot be upgraded by then. The Original rules written after the 1996 Telecommunications Act was passed was going to give us a few more years. This date is completely irrational.
  • Damn you bin Laden, you are every control freak's wet dream.
  • Just when the elite were starting to lose their ability to spy on [1accesshost.com] and blackmail US citizens [whatreallyhappened.com], etc... we get this kick to give their corporations more money to boost in their currently deployed tapping infrastructure. [angelfire.com]

    The elite must be worried, so they need to tighten the grip on us. Too many people busy trying to figure out what really happened [whatreallyhappened.com] last September, and there is a real danger to the forces in power that democracy might break out.

    --Mike--

  • ...when The People don't Retain them?

  • Since I'm smack dab in the middle of rolling this out, I thought I'd mention that this system basically allows law enforcement to connect to any CALEA equipped telco switch (should be all of them soon; then fines for non-compliance are just too steep to make the business case to not do it), and initiate either a trap-n-trace, or a record look-up on a number, without telco permission, or knowledge if it works like the vendor docs say it will.

    There's nothing in anything I've read in the docs that say law enforcement will be able to remotely initiate a wiretap with CALEA, but you don't have to be a brain surgeon to figure out how to setup a few switch trunks to handle that, either.

    Anyhow... my thoughts for whatever it's worth...
  • by Nonesuch ( 90847 ) on Saturday April 13, 2002 @12:05AM (#3333372) Homepage Journal
    As reported by Fox News [1accesshost.com], the Isreali secret service (Mossad) has penetrated the CALEA infrastructure and uses it to their own ends.

    What I have found particularly striking is the extensive effort made to suppress this story.

    CARL CAMERON, FOX NEWS CORRESPONDENT (voice-over): The company is Comverse Infosys, a subsidiary of an Israeli-run private telecommunications firm,with offices throughout the U.S. It provides wiretapping equipment for law enforcement. Here's how wiretapping works in the U.S.

    Every time you make a call, it passes through the nation's elaborate network of switchers and routers run by the phone companies. Custom computers and software,made by companies like Comverse, are tied into that network to intercept, record and store the wiretapped calls, and at the same time transmit them to investigators.

    The manufacturers have continuing access to the computers so they can service them and keep them free of glitches.

    This process was authorized by the 1994 Communications Assistance for Law Enforcement Act, or CALEA.

    Senior government officials have now told Fox News that while CALEA made wiretapping easier, it has led to a system that is seriously vulnerable to compromise,and may have undermined the whole wiretapping system. Indeed, Fox News has learned that Attorney General John Ashcroftand FBI Director Robert Mueller were both warned October 18th in a hand-delivered letter from 15 local, state and federal law enforcement officials, who complained that -quote - "law enforcement's current electronic surveillance capabilities are less effective today than they were at the time CALEA was enacted."

    Congress insists the equipment it installs is secure. But the complaint about this system is that the wiretap computer programs made by Comverse have, in effect,a back door through which wiretaps themselves can be intercepted by unauthorized parties. Adding to the suspicions is the fact that in Israel,

    Comverse works closely with the Israeli government, and under special programs,gets reimbursed for up to 50 percent of its research and development costs by the Israeli Ministry of Industry and Trade.

    But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying through Comverse is considered career suicide.

    And sources say that while various F.B.I. inquiries into Comverse have been conducted over the years,they've been halted before the actual equipment has ever been thoroughly tested for leaks.

    A 1999 F.C.C. document indicates several government agencies expressed deep concernsthat too many unauthorized non-law enforcement personnel can access the wiretap system.

    I'm not sure how much of this story I believe, here are some other (mostly right-wing) sites that covered this:

    • I'm not sure how much of this story I believe

      Into the Buzzsaw [amazon.com] covers several cover-ups by the media. I have not finished reading it so I cannot say if it covers the Israeli/CALEA story you mention. With that said, after reading this book a coverup is neither hard to believe nor even far-fetched.

      Not to mention that if we are willing to coverup the Israeli attack against the Liberty, why not this? Attack on the USS Liberty [logogo.net]


  • So if you dial your bank to transfer funds to checking, or dial your
    voicemail to retrieve it, or send a message to someone's pager, your bank account
    number and PIN, your voicemail password, whatever you sent to the pager - all
    that can be retrieved without a search warrant by any law enforcement official.


    So let's say a LEO gets your PIN for your bank account. Would this give said LEO the right to access the account? Worse yet, if the LEO was corrupt, the issue would be moot: You'd be cleaned out in a heartbeat.

    I wonder how long it will be before someone comes up with a digital scrambler for secure communications...a pay-per-call "anonymizer" service designed to obfuscate called numbers...hacks to obfuscate one's own phone number...or would all of these be prohibited by the DMCA?

  • by ftobin ( 48814 ) on Saturday April 13, 2002 @01:08AM (#3333507) Homepage

    My company produces software for law enforcement agencies. A large part of my peronal job has been to write routines to 'import' the data that the telcos and such give the LEOs (law enforcement officers).

    The telcos don't like doing this at all. While some give us nice comma-delimited files, others give terminal screen prints (imagine looking at the data on a terminal, hitting 'printscreen to file', pgdn, 'printscreen to file', pgdn, and so on), and even worse formats, such as PDF (without the data in 'strippable' format). I'm surprised they haven't given us pure image files yet.

    From what I'm told, the law that the says the telcos have to provide this data pretty much says that they have to provide it in 'electronic form'. So sending it in PDF/Word/Excel formats technically compiles, but of course it's hardly usable. Supposedly it's a big pissing match between the FBI, saying, "Provide us this data; we have a law that says you have to!", and the telcos, saying, "OK, here 'ya go! 'Electronic' form it is! (and no more)".

    This really hurts the non-FBI LEOs; if we weren't handling this data for them, they'd have a bitch of a time scaling their wiretapping. The FBI, on the other hand, has gobs of resources to hire data-entry people to type the PDF's and such back in. So they might be your Big Brother, but your local PD certainly isn't; they're at the the mercy of the telcos.

  • Why is it that for code to be secure, it must be open, accessible, visibile for everyone to see, yet for real physical security, it seems like a terrible thing when the authorities want to do just this, allow more recording of what people are doing?

    Arent these two ideals in total contradiction to each other? what am I missing?

To program is to be.

Working...