04:10 PM
John Foley
John Foley
Connect Directly

The Case For Wiretapping The Internet

The directors of National Intelligence and the FBI say tech-savvy extremists pose a growing threat, setting the stage for a national debate over the need for Internet eavesdropping.

Despite that growing threat, Mueller noted the challenge of meeting court-ordered communications "intercepts" during FBI investigations. In some cases, communications providers are unable to provide the electronic communications sought in a court order, in part because they're not required to build or maintain the capabilities to do so.

"Critical laws covering this area have not been updated since 1994, when we moved from a copper-wire phone system to digital networks and cell phones, but of course, technology has expanded exponentially in the past 16 years," Mueller said. "We want to ensure that our ability to intercept communications is not eroded by advances in technology—technology we all rely on to communicate." You can read Mueller's speech here.

We're fast approaching a point that will determine how, and how effectively, U.S. intelligence agencies will be able to tap into the din of terrorist chatter that travels over 21st century networks. According to the New York Times, new wiretapping legislation, described as "sweeping" in scope, will be submitted to lawmakers for action next year.

The challenge is to enable the mission of the U.S. Intelligence Community without compromising the privacy and civil liberties of Americans. Clapper and Mueller both voice a strong commitment to meeting that requirement. Says Mueller, "If we safeguard our civil liberties, but leave our country vulnerable to a terrorist attack, we have lost. If we protect America from terrorism, but sacrifice civil liberties, we have also lost. We must work to strike that balance, every day, in every case."

Seeking balance in the form of legislation will get contentious. Security expert Bruce Schneier, the chief security technology officer for BT, has already denounced the White House plan, and many of his readers are similarly critical and skeptical.

The status quo carries its own risks. Clapper says the number and pace of terrorist attempts in the U.S. by al-Qaida and its affiliates were at an all-time high during the past year. Among all the tough choices, inaction may be the worst.

2 of 2
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio