Feeds

Easy VoIP wiretaps coming soon

FCC poised to require CALEA compliance

  • alert
  • submit to reddit

Boost IT visibility and business value

Virtually everything done via TCP/IP, with the (for now) exception of instant messaging, is on its way to becoming wiretap-friendly, thanks to a tentative 5-0 decision by the US Federal Communications Commission (FCC) on Wednesday.

Thanks to relentless lobbying and fear-mongering by law enforcement outfits and the companies that sell surveillance equipment to them, all broadband communications, including VoIP, will have to be modified to allow the Feds to patch in easily and immediately, in order to comply with the 1994 Communications Assistance to Law Enforcement Act (CALEA).

VoIP schemes that work only between computers will not be affected. Only so-called 'managed' services - those that allow VoIP and PSTN to communicate - will have to comply. Instant messaging is also exempt, although the Feds lobbied ruthlessly for its inclusion, and will no doubt continue until the government finally gives it to them.

Encrypted VoIP is available, but only through pricey services geared towards corporate clients. It is possible that the FCC action might result in the development of inexpensive encryption solutions for more basic VoIP services, perhaps via TLS (Transport Layer Security), though it is difficult to imagine extending encryption to calls where VoIP and PSTN are communicating.

Other regulatory disputes involving VoIP were not considered in Wednesday's vote. Additionally, 'push to talk' walkie-talkie mobile phone services are equally affected by the CALEA, the FCC has decided. It does not appear that broadband and VoIP providers will receive assistance with the costs of implementing CALEA compliance, unless Congress decides to come to their rescue.

The public comment period for VoIP CALEA compliance is still open, but with such a strong bias visible in Wednesday's preliminary vote, it is highly unlikely that anything can alter the FCC's direction. Final approval is all but certain. ®

Thomas C Greene is the author of Computer Security for the Home and Small Office, a comprehensive guide to system hardening, malware protection, online anonymity, encryption, and data hygiene for Windows and Linux.

Boost IT visibility and business value

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Trying to sell your house? It'd better have KILLER mobile coverage
More NB than transport links to next-gen buyers - study
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Speak your brains on SIGNAL-FREE mobile comms firm here
Is goTenna tech a goer? Time to grill CEO, CTO
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.