Groups denounce FBI plan to require Internet backdoors for wiretaps
U.S. task force reportedly working on plan to severely penalize companies that fail to comply quickly with wiretap orders
Computerworld - Privacy groups are denouncing a federal government move to force Internet companies like Facebook and Google to build backdoors that would let the FBI and other agencies snoop in on real time online communications.
The Washington Post reported this week that a government task force is working on such a plan at the behest of the FBI and other law enforcement agencies that contend that they can't tap the Internet communications of terrorists and other criminals on such sites.
Privacy advocates say the plan could bankrupt smaller Internet companies and increase chances that hackers can access user data.
An FBI spokesman confirmed the agency is part of an interagency group considering legislation to address Going Dark concerns.
However, he added that the agency wouldn't comment on the specifics of the Post story.
The Post reported that the plan would subject Internet companies that failed to respond to federal wiretap requests to an automatic judicial review and fines starting at tens of thousands of dollars. Fines that remain unpaid after 90 days would double daily, the Post reported.
Internet companies would be free to implement any mechanism that would let law enforcement agencies tap Internet communications in real-time, the Post reported, citing unnamed sources.
Analysts say the agencies are proposing the changes due to a growing frustration over their inability to legally spy on communications carried on by suspects over Internet-based services such as webmail, and peer-to-peer services like chat, and social networks.
The Communications Assistance for Law Enforcement Act (CALEA) of 1994 already requires that telecommunications carriers provide government agencies with the ability to track traditional telephony and mobile communications on their networks when legally authorized to do so.
Over the years, the CALEA law has been expanded and interpreted by different courts to also cover broadband Internet service providers and Voice over IP services. Also, the federal government has long had the authority to legally obtain stored electronic communications from ISPs and telecommunication carriers in connection with criminal investigations.
However, the government's ability to monitor real-time email, chat and social network communications has been limited because providers of such services don't have intercept mechanisms in place or do not readily comply with wiretap requests.
The FBI describes such lack of easy access as the 'Going Dark" problem, a term used to describe the growing gap between the government's authority to conduct legal surveillance and their ability to actually do so.
In the past, the FBI has complained about a growing inability to collect evidence against online criminals, drug traffickers and terrorism suspects that use Internet-based communications services to communicate.
Such concerns are valid said Joseph Hall, senior staff technologist at the Center for Democracy and Technology (CDT). However, threatening Internet companies with financial penalties is wrong, Hall said.
- Cyberattacks could paralyze U.S., former defense chief warns
- The NSA blame game: Singling out RSA diverts attention from others
- Jury still out on FISA court
- Suspected China-based hackers 'Comment Crew' rises again
- Chinese hackers master the art of lying in wait
- Spy court OK'd all U.S. wiretap requests it received in 2012
- Groups denounce FBI plan to require Internet backdoors for wiretaps
- South Korea cyberattacks hold lessons for U.S.
- U.S. military networks not prepared for cyberthreats, report warns
- Return of CISPA: Cybersecurity boon or privacy threat?
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts