Risk
2/18/2011
12:48 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Seeks Expanded Web Wiretapping Capability

The agency said it's unable to legally intercept many forms of electronic communication in a timely and efficient manner.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The FBI is seeking better technology and more authority to improve its Internet wiretapping capability, saying that its current inability to intercept electronic communication in a timely and efficient fashion is a threat to public safety.

Calling the issue "going dark" because the agency is shut out of obtaining potentially important evidence, Valerie Caproni, the FBI's general counsel, outlined both technical and legal problems hindering the bureau's current legal ability to intercept Internet communications even with a court order. Her statements were made in testimony (PDF) before the House Judiciary Committee.

"In the ever-changing world of modern communications technologies … the FBI and other government agencies are facing a potentially widening gap between our legal authority to intercept electronic communications pursuant to court order and our practical ability to actually intercept those communications," she said.

Caproni said the FBI is not seeking to change the way the Internet is designed, but that technology exists to improve the situation that can be deployed "within the current architecture of the Internet."

She said the agency also is not calling for fundamental changes in encryption technologies, although in the past the FBI has suggested that manufacturers of those technologies create a way for the agency gain access to encrypted communications.

Specifically, Caproni said the FBI often faces service providers that don't fully comply with court orders "in a timely and efficient manner," while others do comply but only after "considerable effort and expense by the provider and the government." Others never comply at all, she said.

The main problem is there is no uniform compliance mandate for service providers, according to Caproni. Some are obligated to have the technology in place to comply with Internet wiretapping court orders, while others don't and must develop capabilities as a result of an order.

"In our experience, some providers actively work with the government to develop intercept solutions while others do not have the technical expertise or resources to do so," she said.

The result of these differences in capability is that the FBI is unable to obtain communications and related data "on a regular basis," even when it has the legal authority to do so, Caproni said.

Her testimony outlined two examples of when the "going dark" problem hindered FBI investigation efforts, one in the case of drug trafficking between South America and the United States and the other in a child pornography case.

The Communications Assistance for Law Enforcement Act (CALEA) of 1994 allows service providers to intercept electronic data, but it does not cover Web-based email, social networking, and peer-to-peer services. Caproni did not specifically call for an expansion of the act, but suggested that it is not sufficient to cover the kinds of communications the FBI needs to access to do its job properly.

Not everyone is enthusiastic about letting the agency expand its Internet wiretapping authority.

TechFreedom, a non-profit, technology-policy think tank, issued a "Statement of Concern about the Expansion of CALEA" (PDF) noting that the balance of allowing the government to lawfully protect national security and fight crime "must be reconciled with other important societal values, including cybersecurity, privacy, free speech, innovation, and commerce."

A host of industry groups and other organizations signed the statement, including TechAmerica, the Business Software Alliance, the Center for Democracy and Technology, and the Software and Information Industry Association.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5104
Published: 2014-07-28
Multiple SQL injection vulnerabilities in ol-commerce 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) a_country parameter in a process action to affiliate_signup.php, (2) affiliate_banner_id parameter to affiliate_show_banner.php, (3) country parameter in a process action ...

CVE-2014-5105
Published: 2014-07-28
Multiple cross-site scripting (XSS) vulnerabilities in ol-commerce 2.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) a_country parameter in a process action to affiliate_signup.php or (2) entry_country_id parameter in an edit action to admin/create_account.php.

CVE-2014-5106
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in Invision Power IP.Board (aka IPB or Power Board) 3.4.x through 3.4.6 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header to admin/install/index.php.

CVE-2014-5107
Published: 2014-07-28
concrete5 before 5.6.3 allows remote attackers to obtain the installation path via a direct request to (1) system/basics/editor.php, (2) system/view.php, (3) system/environment/file_storage_locations.php, (4) system/mail/importers.php, (5) system/mail/method.php, (6) system/permissions/file_types.ph...

CVE-2014-5108
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in single_pages\download_file.php in concrete5 before 5.6.3 allows remote attackers to inject arbitrary web script or HTML via the HTTP Referer header to index.php/download_file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.