2013
DOI: 10.1109/msp.2012.138
|View full text |Cite
|
Sign up to set email alerts
|

Going Bright: Wiretapping without Weakening Communications Infrastructure

Abstract: Mobile IP-based communications and changes in technologies have been a subject of concern for law enforcement, which seeks to extend current wiretap design requirements for digital voice networks. Such an extension would create considerable security risks as well as seriously harm innovation. Exploitation of naturally occurring bugs in the platforms being used by targets may be a better alternative.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…As for whether this change creates a "threat to public safety," Bellovin et al [15] observe that the digital revolution goes both ways. While "accessing communications content through traditional means could be getting harder," law enforcement's increased access to metadata combined with CALEA's low-cost phone wiretapping capabilities yield a telephony system that is too easy for law enforcement to intercept and that is inherently too vulnerable for users.…”
Section: Are the Benefits Greater Than The Costs?mentioning
confidence: 99%
See 2 more Smart Citations
“…As for whether this change creates a "threat to public safety," Bellovin et al [15] observe that the digital revolution goes both ways. While "accessing communications content through traditional means could be getting harder," law enforcement's increased access to metadata combined with CALEA's low-cost phone wiretapping capabilities yield a telephony system that is too easy for law enforcement to intercept and that is inherently too vulnerable for users.…”
Section: Are the Benefits Greater Than The Costs?mentioning
confidence: 99%
“…Furthermore, we recognize that other societies have less direct influence over their governments, who might mimic any power that is asserted by other nations. For example, "the 1994 US solution of building wiretapping capabilities into switches was rapidly taken up in many other parts of the world under the generic name 'lawful intercept"' [15]. Additionally, participants in an Access Now panel about encryption noted that "officials in [a few countries] are, either purposefully or not, using factually inaccurate information about U.S. law to justify their own laws and policies" and that the citizens of those countries "would not be able to rely on protections in U.S. law or the Constitution" [4].…”
Section: Who Can Be Trusted With Such Power?mentioning
confidence: 99%
See 1 more Smart Citation
“…For instance the intercept target can launch denial of service (DoS) attacks (Sherr et al, 2009) that prevent the accurate collection of not only the call contents, but even the metadata recorded by the law enforcement agency. These problems motivate other researchers to propose improvements to lawful interception systems, or even completely different alternatives (Bellovin et al, 2013) for LI. In (Bates et al, 2012), Bates et al proposed a more accountable CALEA wiretapping system that enables secure audits.…”
Section: Related Workmentioning
confidence: 99%
“…Investigators were struggling to conduct electronic surveillance and obtain electronic evidence, because they were increasingly encountering encryption that online services and device vendors could not bypass. Comey's remarks tapped into an existing debate [2,30,217] and set the stage for another decade of encryption policy tussles, initially centered on law enforcement access to data stored on devices and more recently emphasizing child exploitation that uses E2EE messaging and storage [92,113,188,256,275].…”
Section: Introductionmentioning
confidence: 99%