2013
DOI: 10.2139/ssrn.2312107
|View full text |Cite
|
Sign up to set email alerts
|

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Abstract: For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications-there was no longer just "Ma Bell" to talk to-and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technologies would no longer suffice. In response, Congress passed the Communications Assistance for Law Enforcement Act (CALEA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Given their popularity, IM services are being increasingly used not only for legitimate activities, but also for illicit ones [20]: criminals may indeed use them either to communicate with potential victims, or with other criminals to escape interception [3]. Therefore, IM applications have the potential of being a very rich source of evidentiary information in most investigations.…”
Section: Introductionmentioning
confidence: 99%
“…Given their popularity, IM services are being increasingly used not only for legitimate activities, but also for illicit ones [20]: criminals may indeed use them either to communicate with potential victims, or with other criminals to escape interception [3]. Therefore, IM applications have the potential of being a very rich source of evidentiary information in most investigations.…”
Section: Introductionmentioning
confidence: 99%
“…The work specifically focused on the Boko Haram insurgency between 2015 to 2018. In another work prepared and presented by [54], the history of the US laws mandating legal wiretap was expatriated. Also, wiretapping concepts and a few of its devices were mentioned.…”
Section: Related Workmentioning
confidence: 99%
“…Where vulnerabilities do not exist -for instance when criminals use end-to-end encryption -then lawful interception methods will not be able to analyse the intercepted communications anyway, which requires other methods to be used (such as hacking). This approach may have perverse consequences, such as creating an incentive for the state not to report vulnerabilities, although exploiting a vulnerability and reporting it are not necessarily mutually exclusive, as the agencies can report after exploiting them (Bellovin et al 2014).…”
Section: Considering Alternatives To Lawful Interceptionmentioning
confidence: 99%