Risk
2/18/2011
12:48 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Seeks Expanded Web Wiretapping Capability

The agency said it's unable to legally intercept many forms of electronic communication in a timely and efficient manner.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The FBI is seeking better technology and more authority to improve its Internet wiretapping capability, saying that its current inability to intercept electronic communication in a timely and efficient fashion is a threat to public safety.

Calling the issue "going dark" because the agency is shut out of obtaining potentially important evidence, Valerie Caproni, the FBI's general counsel, outlined both technical and legal problems hindering the bureau's current legal ability to intercept Internet communications even with a court order. Her statements were made in testimony (PDF) before the House Judiciary Committee.

"In the ever-changing world of modern communications technologies … the FBI and other government agencies are facing a potentially widening gap between our legal authority to intercept electronic communications pursuant to court order and our practical ability to actually intercept those communications," she said.

Caproni said the FBI is not seeking to change the way the Internet is designed, but that technology exists to improve the situation that can be deployed "within the current architecture of the Internet."

She said the agency also is not calling for fundamental changes in encryption technologies, although in the past the FBI has suggested that manufacturers of those technologies create a way for the agency gain access to encrypted communications.

Specifically, Caproni said the FBI often faces service providers that don't fully comply with court orders "in a timely and efficient manner," while others do comply but only after "considerable effort and expense by the provider and the government." Others never comply at all, she said.

The main problem is there is no uniform compliance mandate for service providers, according to Caproni. Some are obligated to have the technology in place to comply with Internet wiretapping court orders, while others don't and must develop capabilities as a result of an order.

"In our experience, some providers actively work with the government to develop intercept solutions while others do not have the technical expertise or resources to do so," she said.

The result of these differences in capability is that the FBI is unable to obtain communications and related data "on a regular basis," even when it has the legal authority to do so, Caproni said.

Her testimony outlined two examples of when the "going dark" problem hindered FBI investigation efforts, one in the case of drug trafficking between South America and the United States and the other in a child pornography case.

The Communications Assistance for Law Enforcement Act (CALEA) of 1994 allows service providers to intercept electronic data, but it does not cover Web-based email, social networking, and peer-to-peer services. Caproni did not specifically call for an expansion of the act, but suggested that it is not sufficient to cover the kinds of communications the FBI needs to access to do its job properly.

Not everyone is enthusiastic about letting the agency expand its Internet wiretapping authority.

TechFreedom, a non-profit, technology-policy think tank, issued a "Statement of Concern about the Expansion of CALEA" (PDF) noting that the balance of allowing the government to lawfully protect national security and fight crime "must be reconciled with other important societal values, including cybersecurity, privacy, free speech, innovation, and commerce."

A host of industry groups and other organizations signed the statement, including TechAmerica, the Business Software Alliance, the Center for Democracy and Technology, and the Software and Information Industry Association.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.