Groups Slam FCC on Internet Phone Tap Rule 164
kamikaze-Tech writes "An Associated Press report posted in the Vonage VoIP Forums discusses the new CALEA regulations that will make it easier for
law enforcement to tap Internet phone calls. The article claims that the
new law will also make computer systems more vulnerable to hackers, according to
some digital privacy and civil liberties groups. While the groups don't want
the Internet to be a safe haven for terrorists and criminals, they complain that
expanding wiretapping laws to cover Internet calls -- or Voice over Internet
Protocol (VoIP) -- will create additional points of attack and security holes
that hackers can exploit. VoIP service providers such as Vonage, Skype and
Packet 8 have eighteen months to comply with the new law."
Is Skype accountable to the FCC? (Score:5, Insightful)
Of course... (Score:2, Troll)
You don't fuck with the world police...
Re:Is Skype accountable to the FCC? (Score:4, Informative)
Re:Is Skype accountable to the FCC? (Score:2)
Re:Is Skype accountable to the FCC? (Score:1)
Re:Is Skype accountable to the FCC? (Score:4, Insightful)
Re:Is Skype accountable to the FCC? (Score:2)
Re:Is Skype accountable to the FCC? (Score:2)
Re:Is Skype accountable to the FCC? (Score:2)
"VoIP service providers such as Vonage, Skype and Packet 8 have eighteen months to comply with the new law."
Should Say:
VoIP service providers such as Vonage, Packet 8, and have eighteen months to move operations to the caribbean."
The regulation also only applies to VoIP to POTS (standard voice line), and not VoIP to VoIP. It's a way to get the protocol changed now to enable a second stream. Then later they can ease in the VoIP to VoIP taping as well, without drawing too much attention.
This is yet a
Re: (Score:2)
Re:Is Skype accountable to the FCC? (Score:5, Informative)
58. We also seek comment on our tentative conclusion that providers of non-managed, or
disintermediated, communications should not be subject to CALEA.166 Non-managed VoIP services, such as peer-to-peer communications and voice enabled Instant Messaging, as currently provided, do not appear to be subject to CALEA for two reasons. First, because they are confined to a limited universe of users solely within the Internet or a private IP-network, they may be more akin to private networks, which Congress expressly excluded from section 103's capability requirements. Therefore, they do not appear to replace a substantial portion of local exchange service; as such they do not appear to fall within the Substantial Replacement Provision. Second, they may be excluded information services under section 103(b)(2)(A) (as discussed above). We seek comment on this issue. Are there other characteristics or distinguishing features that may be used to determine whether a particular class of VoIP service providers is covered under CALEA? One example may be that VoIP service providers are covered under CALEA where their service interconnects to the PSTN.
The bolded portion reflects where Skype themselves say that they are not intended as a replacement for local phone service. Trying to use them for that is silly in most cases, anyway, because in the US you can normally talk to someone a few houses down the street without per-minute charges. Using Skype to connect to your local PSTN in that case would cost $0.02/minute.
If it's found that Skype may fall under the new rules, it's only where it connects to phone networks in the US for incoming and outgoing calls. Wiretap provisions could be done at that point if required, probably by the phone companies providing that connection.
Re:Is Skype accountable to the FCC? (Score:4, Informative)
From Skype's Terms of Service [skype.com]
8.1
Further, as stated in the Privacy Policy, Skype and/or its local partners may need to provide such data to designated competent authorities upon request, or may need to enter into further activities due to local regulations, for example with regard to the interception of communications, if requested by such authorities.
So, if you're using Skype for the privacy features, dump it and switch to SpeakFreely. Skype CAN wiretap you and never said that it wouldn't.
It's so much worse.. (Score:5, Insightful)
The article claims that the new law will also make computer systems more vulnerable to hackers, according to some digital privacy and civil liberties groups.
Oh it's a whole metric-fuckton worse than that. The problem the FCC, FBI (insert your favourite alphabet agency here) is that they make the assumption that the criminals that will be using VOIP will COMPLY with FCC.
Voice/IP isn't like traditional the traditional telephone system at all. I can't install my own private telephone network with encrypted lines but with V/IP this is fairly easy to achieve. What's worse, what criminal is really going to open up their private P2P telephone so the government can tap them?
So the measure has absolutely no effect on our ability to catch criminals. Instead we subject the communication of ordinary law abiding citizens to the possibility of them having their perfectly legitimate conversations compromised, be it by a l33t|st or corupt police officers alike.
Simon.
Re:It's so much worse.. (Score:5, Insightful)
Agreed. If you've got something big to plan, you don't use an unsecured public medium (criminals and terrrorists have learnt that it's possible to track down your position from a mobile phone call. A Chechen leader was assasinated in this way, and it's how the Madrid bombers were traced).
How does the FCC think it will be able to tap an 128-bit RSA-encrypted private protocol? It can't, and the overwhelming majority of phone taps will be of law-abiding citizens. But that's the way the world works. Just look at DRM
In short, terrorists/criminals/enemies of the state aren't stupid.
Re:It's so much worse.. (Score:2)
Most criminals aren't IT experts. If they were all that clever, they would have regular well-paid jobs and wouldn't need to turn to a life of crime.
Re:It's so much worse.. (Score:3, Insightful)
That's not a case of they *do*. It's a case of they *did*. The others, assuming they aren't stupid, have probably wised up by now.
Did the directors of Enron need
Re:It's so much worse.. (Score:2)
Re:It's so much worse.. (Score:2)
Re:It's so much worse.. (Score:3)
Re:It's so much worse.. (Score:2, Insightful)
Sounds like a plan to me. A fucking stupid one.
People are always going to have untappable means of communication. Untappable because they actually cannot be tapped (Strong encryption, people carrying messages by hand.) or just that no one can find out where they are. (Calls between two disposible cell phones, message drops.)
Tapping phones works fine for catching normal criminals. That's because if you know who a criminal is, you can just fo
Re:It's so much worse.. (Score:3, Insightful)
We keep saying that real criminals wouldn't do this, but somehow they seem to keep doing it. So I suppose we can catch the stupid criminals, and the ones we want to frame.
Cyberstalkers... (Score:5, Interesting)
I see a big market soon for do-it-yourself NICs and PC routers...
Re:Cyberstalkers... (Score:2)
gentlemen, start your ebay
Re:It's so much worse.. (Score:5, Insightful)
In short, attempts to legislate terrorism out of existance are doomed from the start and should be suspect. You can damned well bet that lawmakers are smart enough to know that these laws aren't going to do anything to stop the Bogeyman of the day. They're being passed as "feel good" measures at best, and as attempts to control the law-abiding population at worse.
Making it illegal to carry cigarette lighters onto airplanes doesn't stop a terrorist; a terrorist would find a way to bring an incendiary onboard anyway. Making it illegal to have an untappable VoIP connection doesn't stop a terrorist, either; a terrorist would just setup stunnel or pgpFone end-to-end and chat away.
Sigh. Someday, the United States Congress will be comprised of people who grew up understanding technology...
Re:It's so much worse.. (Score:4, Insightful)
Re:It's so much worse.. (Score:2)
Re:It's so much worse.. (Score:3, Interesting)
Re:It's so much worse.. (Score:2)
Re:It's so much worse.. (Score:2)
Re:It's so much worse.. (Score:3, Interesting)
Very true. It's not like most families that raise 'Political' children try to also teach them technology.
Those children are shown how to use human resources to use people and technology.
Being a politician mostly involves high skills in using other people to accomplish tasks and do the 'understanding' for the politician. That is pretty much the opposite of learning how to understand technology themselves.
Re:It's so much worse.. (Score:2)
Re:It's so much worse.. (Score:2)
Um, didn't you already answer to this when you said "You can damned well bet that lawmakers are smart enough to know that these laws aren't going to do anything to stop the Bogeyman of the day. They're being passed as "feel good" measures at best, and as attempts to control the law-abiding population at worse." If your congress will get better technical know-how, they will simply become better at
Re:It's so much worse.. (Score:1, Funny)
Re:It's so much worse.. (Score:2, Insightful)
> they make the assumption that the criminals that will be using VOIP will COMPLY
> with FCC.
No, they're relying on the fact that if you have the ability to wiretap data conveyed by companies which provide internet access but not ordinary phone calls then you can keep tabs on criminals who are using VOIP using that company.
> So the measure has absolutely no effect on our ability to catch criminals.
Wrong - every last by
Re:It's so much worse.. (Score:1)
> will be using VOIP will COMPLY with FCC
I'm confused. Don't all criminals obey the law?
Re:It's so much worse.. (Score:2)
Re:It's so much worse.. (Score:2, Insightful)
In my case I use Vonage. They make the IP connection to PaeTec's switch in my city and from there the call hits the PSTN. I used that very scenario to push the local PUC into forcing Verizon to port my number faster because it was in fact a regulated to regulate port.
I've confirmed all of my suspicions with both Vonage, PaeTec and Verizon folks that I know and sure
Re:It's so much worse.. (Score:2)
As to VOIP tap-ins, well, the government would rather you use VOIP since it's much easier to collect.
On the other hand there are dumb criminals (Score:2)
Criminals smart enough to do things we consider obvious will escape capture by CALEA. No question there.
If most criminals were smart, then we'd catch even fewer of them than we do now. The whole system is geared toward finding and prosecuting dumb criminals.
Sure you can (Score:2)
It's always been easy to achieve, provided you had a computer at each end. Remember PGPFone [pgpi.org]?
Why should the Feds get their own backdoor? (Score:5, Funny)
Re:Why should the Feds get their own backdoor? (Score:5, Insightful)
Period.
I have plenty to hide (Score:2)
Re:Why should the Feds get their own backdoor? (Score:1)
What you do in the bathroom isn't a secret, but it is private.
What 99% of people do 99.9999% of the time isn't secret. The bulk of it is predictable. As Pinky and the Brain put it, "What are you doing to do tomorrow? The same thing we always do (Take over the World)." But a lot of what we do is private. (Console a loved one. Talk to friends about personal m
Rephrased for proper effect (Score:4, Insightful)
If you're making fun of that line, you've got to go a little further; the way you state it is exactly the way the serious supporters of surveillance state it.
E.g.:
If you've got nothing to hide then you shouldn't have any objection to select government agencies/individuals listening to what you whisper in your lover's ear. On the other hand, if you're a member of Al Queda, I could see why you might have a problem with this idea.
If you've got nothing to hide then you shouldn't have any objection to select government agencies/individuals placing cameras in your shower. On the other hand, if you're a member of Al Queda, I could see why you might have a problem with this idea.
If you've got nothing to hide then you shouldn't have any objection to select government agencies/individuals reading your thoughts. On the other hand, if you're a member of Al Queda, I could see why you might have a problem with this idea.
Re:Rephrased for proper effect (Score:1)
Ya, I was just goofing around.. didn't think the mods would go so crazy about it
Re:Rephrased for proper effect (Score:1)
THey didn't.. they already are crazy as it is
Re:Rephrased for proper effect (Score:2)
I don't think the Al Queda will be whispering terrorist plans into their lover's ears. So why should they care?
If you've got nothing to hide then you shouldn't have any objection to select government agencies/individuals placing cameras
Re:Why should the Feds get their own backdoor? (Score:1)
Re:Why should the Feds get their own backdoor? (Score:2)
Because even the feds still have some trouble doing realtime decryption of aes without some help of a backdoor?
Re:Why should the Feds get their own backdoor? (Score:2)
Skype uses AES for encrypting conversations so if you want to tap such a conversation you supposedly have to decrypt it.
Re:Why should the Feds get their own backdoor? (Score:2)
1. get notified about the session key being used so you don't have to brute force it
2. get an unencrypted copy of the data
Either way, life gets a lot easier.
Sounds fine to me (Score:3, Interesting)
If only the UK was able to procecute criminals based on phone tapping, currently it's not allowed (hears gasps of shock).
Re:Sounds fine to me (Score:1)
> currently it's not allowed (hears gasps of shock).
That's a misleading statement. The police use phone taps all the time as a tool to see who's talking to who, and what they're saying. Then they mount surveillance, arrest people, get them to grass people up or work out the best time to catch people. What you're probably referring to is that you can't use a transcript or tape of a phone call in court as evidence. Usually, howeve
Re:Sounds fine to me (Score:1)
Re:Sounds fine to me (Score:2)
Legal consequences? (Score:2, Interesting)
I can't help but wonder what will happen when someone uses one of these "mandated" security weak points to impair service from one of the larger providers, like Vonage. If the government was warned that it would be a likely outcome of their new law, are they liable for the damages?
Even worse, sniffable (tapable, whatever) by the government means sniffable by a lot of far more clever black-hats. Who is liable for the damages incurred by identity theft? Or are we just never supposed to order anything ove
here is the link to the FCC anouncement (Score:1)
This is not as bad as 911 requirements (Score:2)
As far as Vonage or Packet8 are concerned they will have easier time implementing this then incumbents. It is dead easy to do this with SIP. All that is necessary is to make the SIP server reply with a different voice endpoint to all SIP invites from persons who are under surveilance. As a result the "snooping" equipment is separate and does not encumber primary network infrastructure.
As far as Skype is concerned I could not care less. It will be dead by that time. Same as Kaz
Or what? (Score:5, Insightful)
Re:Or what? (Score:2)
Re:Or what? (Score:2)
Get a court injunction preventing you from doing any and all business in the US and it's territories.
well they're pretending to be a phone company, so they might have some luck.
If they're going to be a phone company, they have to follow all the phone company regulations.
Re:Or what? (Score:2)
It doesn't matter where your company is, you're very intentionally doing business with US Citizens. You've subjected yourself to US Jurisdiction. If you don't like it, don't do business here.
Re:Or what? (Score:2)
Now clearly IANAL, but the only thing the FCC can do is prevent the wholesale of phone minutes and numbers to foreign companies, forcing companies like Skype to set up US
Re:Or what? (Score:2)
Re:Or what? (Score:2)
Benson says Emery has sold $3 million worth of seeds - mostly to the U.S.
You sell stuff to people in the U.S. you're subject to jurisdiction in the U.S. regarding those sales.
Also, the raid on the guys home was authorized by a Canadian judge and carried by Canadian authorities.
Re:Or what? (Score:2)
Re:Or what? (Score:2)
Yes! We got those pesky terrorists at last! (Score:3, Insightful)
All I can say is thank god that the technology doesn't exist to communicate over voice outside of the phone and VoIP channels.
You know, if anyone ever figures out how to do direct PC-to-PC voice service, or if an IM service such as Yahoo ever include voice in their client, we'll all be doomed!
Wait a minute... they could be emailing each other right now! They could be talking to each other on IRC right now, or in a chat room, or through Yahoo messenger, or through MSN messenger, or through....
Yikes. I never realised how much danger we are all in. SOMEONE BLOW UP THE INTERNET NOW!!!!!!1!!!1oneone
Re: Someone blow up the internet (Score:3, Insightful)
The only way to tap on *every* conversation is to kindly ask *ever
Re: Someone blow up the internet (Score:4, Insightful)
I guess that the general population just get what they deserve, and the rest of us have to suffer along with them.
calea is for telecom.but FCC just reclassified net (Score:3, Insightful)
Calea is supposed to apply to telecom.
I sense some cognitive dissonance here, or maybe a simple hyppocritical abuse of power?
BTW.. calea is not a new law, and the rule itself is not a "law" it's a regulation. There are subtle differences.
And what makes you think (Score:1)
Re:And what makes you think (Score:3, Funny)
It's obvious what will happen (Score:2, Interesting)
All the tools required to do this are already availabl
Re:It's obvious what will happen (Score:1)
Re:It's obvious what will happen (Score:2)
Re:It's obvious what will happen (Score:2)
If Alice and Bob are trying to communicate securely, and need to exchange keys, Alice can't simply send the key to Bob, cos Trudy can intercept it, and send out a DIFFERENT key to Bob, who is then replying to Trudy not Alice. Unless Bob knows that the key he received was indeed sent by Alice, the whole system just went out the door.
Re:It's obvious what will happen (Score:2)
US Only Skype Version (Score:1)
Re:US Only Skype Version (Score:1)
"Safe haven for criminals" (Score:1)
Aren't There Commercial Products to Snoop This? (Score:4, Informative)
Re:Aren't There Commercial Products to Snoop This? (Score:2)
Time for Open Source (Score:1)
Mod Parent Way Up (Score:2)
Right on!
-kgj
Re:Time for Open Source (Score:1)
With that in mind, the FCC could just force ISP's to block any non-compliant solutions that crop up, regardless of wether they are closed or open sourced.
Idiots (Score:5, Informative)
Has the ACLU setup CALEA on these systems? I highly doubt it, but I have. At least with broadsoft it is a trivial matter to keep the softswitch entirely firewalled off the internet that unless someone finds a buffer overflow in the sip protocol or rtp protocol that the system is using there is no opportunity for a hacker to get in.
Furthermore, the system supporting CALEA doesn't increase the risk.. IE if someone hacks the SIP protocol stack on a softswitch and takes control of it, well who cares if the box supports CALEA they just got access to all the phonecalls going through that box.
Do you really thing that up til now the FBI et al has had no power to wire tap a VoIP phone? That more than 5 million people in the US are totally able to break whatever law they want (wire fraud, telemarketing scams, plan bank robberies, etc) notice I didn't mention terrorism, just because they have Vonage? Right.
PGP? (Score:2)
similar solution with the key input by the enduser? Of course
that would cost money and be opposed by the government, but
you would think the market could provide such equipment for
those who feel they need/want it
I hope Vonage stands up to this... (Score:2)
Re:UK... (Score:2)
Thankfully nothing like that would ever happen in Australia. We haven't invented the telephone yet.
Re:Skype security (Score:1)
Re:Skype security (Score:2)
Correction: any cryptography that relies on being closed-source is not at all secure. A commercial implementation of RSA can be just as secure as an open-source version, modulo the risk of dumb programmer errors.
Re:Skype security (Score:1)
Not necessarily. It could have all manner of nasties in it. How do you know it isn't sending your plaintext to the company's headquarters, at the same time as generating the correct cyphertext?
The only way to verify the integrity of any software -- especially, but not just security software -- is to read and understand the source code. Software vendors know this too, so if the
Re:Skype security (Score:2)
How does Skype protect my privacy?
Skype is encrypted end-to-end because it uses the public Internet to transport your voice calls and text messages and sometimes these calls are routed through other peers. Skype encryption ensures that no other party can eavesdrop on your call or read your instant messages.
Skype uses the Advanced Encryption Standard (AES, also known as Rijndael) which is used by U.S. Government organizations to protect sensitive information. Skype uses 256-bit
Bullshit (Score:2)
Terrorism and war has existed for as long as society. It exists in the US, outside the US, before the US existed and will continue to exist long after the US ceases to.
Occasionally some group will blame a certain action of another group for their behaviour.
But the following excuses are just excuses and don't in themselves always justify the reaction.
Their br
Feed the troll (Score:1, Offtopic)
Have fun explaining all that, then.
Re:Feed the troll (Score:3, Interesting)
Genesis 24:2-3,9 : Grope sexual organs of one swearing oaths
Read the text. Putting a hand under a thigh is hardly "groping sexual organs". Putting it on top of the thigh would be closer to what they describe it as. Besides, I think this was a cultural thing. Nowadays we shake
Re:Feed the troll (Score:2)
I hope you didn't take to long to write all that
Re:Phil Zimmerman to the rescue ( VOIP / PGP ) (Score:2)
That being said, I hope that Zimmerman does not wind up being classified as a Dubya regime "person of interest", (or worse).