Wiretap Law May Create 'Backdoors' For Hackers, Experts Warn

Experts Warn: Wiretap Law Could Create 'Backdoors' For Hackers
|

As the Obama administration considers supporting a proposal to help law enforcement eavesdrop on Internet communications, experts warn the measure could have an unintended consequence: creating digital "backdoors" for cybercriminals to exploit.

The FBI has been pushing for legislation that would force companies like Google and Facebook to create ways for law enforcement to conduct court-approved surveillance on their networks. The Obama administration is "on the verge of backing" a measure that would fine Silicon Valley companies that refuse to build wiretapping capabilities into their systems, according to The New York Times.

But security experts and at least one lawmaker say it could make the Internet less safe by requiring tech companies to essentially design a security flaw into their products.

"The government should be doing everything in its power to increase the security of our communications networks, not riddling them with interception backdoors that will likely be exploited by criminals and foreign governments," Chris Soghoian, a policy analyst for the American Civil Liberties Union, said in a statement. "History has shown time and time again that interception backdoors are fundamentally at odds with good cybersecurity."

Rep. Hank Johnson (D-Ga.), a member of the House Judiciary committee where wiretapping legislation would be considered, said he opposes the FBI's proposal.

“At a time when we need sensible legislation to confront cyber threats, the F.B.I. proposal is a step in the wrong direction on security and privacy," Johnson said in a statement. "Forcing companies to engineer backdoors for information requests would increase the risk of hacking, identify theft, and mass surveillance.”

The proposal comes amid growing debate over how to combat terrorism and cybercrime. The Boston bombings have heightened awareness over national security and whether law enforcement should conduct surveillance on suspected terrorists who communicate online. At the same time, hackers are increasingly breaking into computer networks of major corporations and government agencies, raising alarm about the need to combat cyber threats.

The FBI argues the wiretapping mandate is needed because new forms of Internet-based communication have outpaced the Communications Assistance for Law Enforcement Act, or CALEA. The 1994 law requires telecommunications companies to make their networks wiretap-friendly, but does not apply to most Internet companies.

If the law is overhauled to include providers of Internet-based communications services, it could create a new target for hackers looking to exploit weaknesses in those networks, according to Susan Landau, a fellow at the Radcliffe Institute for Advanced Study at Harvard University.

Two years ago, Landau warned a congressional committee of a "serious risk" that wiretaps built into communications networks "will be subverted either by trusted insiders or skilled outsiders, including foreign governments, hackers, identity thieves and perpetrators of economic espionage."

It has happened before. In 2004, for example, hackers gained access to the wiretapping capabilities built into the network of Greece's largest cellular service provider and eavesdropped on more than 100 Greek government officials, including the prime minister.

"Rather than securing us, such capabilities endanger us," Landau said in written testimony.

At the same hearing, Valerie Caproni, who was the FBI's general counsel at the time, insisted that the bureau "doesn't want backdoors" and that "the security of the Internet is extremely important to the FBI."

"But I also get kept up by worrying that we have got criminals running around that we can’t arrest and can’t prosecute because we can’t actually execute a wiretap order," she said, according to a transcript of the hearing.

In an op-ed on Wired.com earlier this year, Matt Blaze, professor of computer science at the University of Pennsylvania, argued against creating mandatory wiretaps for Internet services. Instead, he suggested that law enforcement should conduct surveillance through another controversial method: hacking into suspects' computers.

"Instead of changing the law, they can use specialized, narrowly targeted exploit tools to do the tapping," Blaze wrote.

The FBI is already attempting to use this surveillance technique, but the courts have not always approved. Last month, a judge in Texas rejected a request by the FBI to remotely hack into a computer to obtain emails, chat-messaging logs and other documents to investigate a bank fraud and identity-theft case that began earlier this year.

In a written opinion, U.S. Magistrate Judge Stephen Smith said the FBI needed to ensure that such techniques didn't allow law enforcement to also gather information on people not suspected of committing a crime.

"This is not to say that such a potent investigative technique could never be authorized," Smith wrote in his opinion. "But the extremely intrusive nature of such a search requires careful adherence" to the rules.

This story has been updated to include comment from Rep. Hank Johnson (D-Ga.).

Our 2024 Coverage Needs You

As Americans head to the polls in 2024, the very future of our country is at stake. At HuffPost, we believe that a free press is critical to creating well-informed voters. That's why our journalism is free for everyone, even though other newsrooms retreat behind expensive paywalls.

Our journalists will continue to cover the twists and turns during this historic presidential election. With your help, we'll bring you hard-hitting investigations, well-researched analysis and timely takes you can't find elsewhere. Reporting in this current political climate is a responsibility we do not take lightly, and we thank you for your support.

to keep our news free for all.

Support HuffPost

Before You Go

9 Gadgets To Help You Avoid Surveillance
Fingerprint Gel(01 of09)
Open Image Modal
The Japanese government counter-terrorism practice of fingerprinting foreigners who enter the country may have inspired Doctor Tsutomu Matsumoto to invent "fingerprinting gels", a way of faking fingerprints for scanners.Learn how to make your own here. (credit:AP)
White Noise Generator(02 of09)
Open Image Modal
Worried someone around you is secretly recording everything you do? No fear! There's a relatively low-tech way to defeat such snoops, via white-noise-producing audio jammers. These tiny devices use good ol' white noise to blur the sound picked up by hidden microphones and other surreptitious recording devices. (credit:<a href="http://www.flickr.com/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name="Flickr:" data-vars-item-type="text" data-vars-unit-name="5bb364cce4b0fa920b979f0b" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="29" data-vars-position-in-unit="41">Flickr:</a><a href="http://www.flickr.com/people/anonymous9000/" role="link" class=" js-entry-link cet-external-link" data-vars-item-name=" Anonymous9000" data-vars-item-type="text" data-vars-unit-name="5bb364cce4b0fa920b979f0b" data-vars-unit-type="buzz_body" data-vars-target-content-id="http://www.flickr.com/people/anonymous9000/" data-vars-target-content-type="url" data-vars-type="web_external_link" data-vars-subunit-name="before_you_go_slideshow" data-vars-subunit-type="component" data-vars-position-in-subunit="30" data-vars-position-in-unit="42"> Anonymous9000</a>)
Phonekerchief(03 of09)
Open Image Modal
MIT's Technology Review calls it the newest, hottest Thanksgiving accessory -- but you can use phone-size "Faraday cages" like this (sold by uncommongoods) to block your cellphone's call signal, WiFi and GPS. Handy now that federal courts are ruling that cops can track suspects via cellphone sans warrant, and Apple can remotely disable your phone camera with a click. As security researcher Jacob Appelbaum said in an interview with N+1 back in April, "Cell phones are tracking devices that make phone calls." So shouldn't you be prepared for when you don't want to be tracked? (credit:uncommongoods)
LED-Lined Hat(04 of09)
Open Image Modal
Hidden cameras got you down? Blind them all with a simple baseball cap lined with infrared LEDs. Amie, a hacker on WonderHowTo, shows the world how to make one, while this German art exhibition lays out how these ingenious devices work. (credit:AP)
Bug Detector(05 of09)
Open Image Modal
These receivers reveal the telltale electronic crackle of hidden mics and cameras. Strangely enough, they were around long before "surveillance culture" became a common phrase. Today they're sold in all sorts of shops for surveillance paranoids. (credit:Gadget Playground)
Camera Map(06 of09)
Open Image Modal
Sometimes hiding your face isn't enough; sometimes you don't want to be seen at all. For those days, there's camera maps. The NYC Surveillance Camera Project is currently working to document the location of and working status of every security camera in New York City. This project has been replicated by others in Boston, Chicago and Bloomington, Indiana. Notbored.org has even published a guide to making your own surveillance camera maps (here). (credit:AP)
Dazzle Camouflage(07 of09)
Open Image Modal
Credit to artist Adam Harvey for this one. Inspired by the "dazzle camouflage" used on submarines and warships during World War I, he designed a series of face paint principles meant to fool the facial recognition schemas of security cameras. Check out The Perilous Glamour of Life Under Surveillance for some tips on designing your own camera-fooling face paint. (credit:Adam Harvey)
Throwaway Cellphone(08 of09)
Open Image Modal
Walmart may be the premier symbol of corporate America, but its disposable cellphone selection can help you start a thoroughly maverick lifestyle. $10 TracFones work on most major networks, including AT&T, T-Mobile, Sprint and Verizon, and come with minutes prepaid so you can dispose of the devices when you're done. (credit:AP)
RFID-Blocking Wallet(09 of09)
Open Image Modal
Radio-Frequency Identification (RFID) chips are now regularly implanted in passports, ID cards, credit cards and travel papers. These tiny chips make machine-reading your documents easier -- but could also let anyone with the right type of scanner scrape your information and track your whereabouts. Luckily, gadget geeks have come to the rescue again, this time with RFID-blocking wallets. Working on the same principle as the "phonekerchief", these wallets create a Faraday cage around your items, keeping their data secure until you take them out to be scanned where they're supposed to be scanned. Destroying the chip is simpler: just nuke it in the microwave for five seconds. Of course, whatever you're microwaving might burst into flames first... (credit:AP)