Risk
2/18/2011
12:48 PM
50%
50%

FBI Seeks Expanded Web Wiretapping Capability

The agency said it's unable to legally intercept many forms of electronic communication in a timely and efficient manner.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The FBI is seeking better technology and more authority to improve its Internet wiretapping capability, saying that its current inability to intercept electronic communication in a timely and efficient fashion is a threat to public safety.

Calling the issue "going dark" because the agency is shut out of obtaining potentially important evidence, Valerie Caproni, the FBI's general counsel, outlined both technical and legal problems hindering the bureau's current legal ability to intercept Internet communications even with a court order. Her statements were made in testimony (PDF) before the House Judiciary Committee.

"In the ever-changing world of modern communications technologies … the FBI and other government agencies are facing a potentially widening gap between our legal authority to intercept electronic communications pursuant to court order and our practical ability to actually intercept those communications," she said.

Caproni said the FBI is not seeking to change the way the Internet is designed, but that technology exists to improve the situation that can be deployed "within the current architecture of the Internet."

She said the agency also is not calling for fundamental changes in encryption technologies, although in the past the FBI has suggested that manufacturers of those technologies create a way for the agency gain access to encrypted communications.

Specifically, Caproni said the FBI often faces service providers that don't fully comply with court orders "in a timely and efficient manner," while others do comply but only after "considerable effort and expense by the provider and the government." Others never comply at all, she said.

The main problem is there is no uniform compliance mandate for service providers, according to Caproni. Some are obligated to have the technology in place to comply with Internet wiretapping court orders, while others don't and must develop capabilities as a result of an order.

"In our experience, some providers actively work with the government to develop intercept solutions while others do not have the technical expertise or resources to do so," she said.

The result of these differences in capability is that the FBI is unable to obtain communications and related data "on a regular basis," even when it has the legal authority to do so, Caproni said.

Her testimony outlined two examples of when the "going dark" problem hindered FBI investigation efforts, one in the case of drug trafficking between South America and the United States and the other in a child pornography case.

The Communications Assistance for Law Enforcement Act (CALEA) of 1994 allows service providers to intercept electronic data, but it does not cover Web-based email, social networking, and peer-to-peer services. Caproni did not specifically call for an expansion of the act, but suggested that it is not sufficient to cover the kinds of communications the FBI needs to access to do its job properly.

Not everyone is enthusiastic about letting the agency expand its Internet wiretapping authority.

TechFreedom, a non-profit, technology-policy think tank, issued a "Statement of Concern about the Expansion of CALEA" (PDF) noting that the balance of allowing the government to lawfully protect national security and fight crime "must be reconciled with other important societal values, including cybersecurity, privacy, free speech, innovation, and commerce."

A host of industry groups and other organizations signed the statement, including TechAmerica, the Business Software Alliance, the Center for Democracy and Technology, and the Software and Information Industry Association.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0176
Published: 2015-04-27
Cross-site scripting (XSS) vulnerability in MQ XR WebSockets Listener in WMQ Telemetry in IBM WebSphere MQ 8.0 before 8.0.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URI that is included in an error response.

CVE-2015-1886
Published: 2015-04-27
The Remote Document Conversion Service (DCS) in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 through 7.0.0.2 CF29, 8.0.0 before 8.0.0.1 CF16, and 8.5.0 through CF05 allows remote attackers to cause a denial of service (memory consumption) via crafted requests.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.