Feeds

US wiretap plan will leave door open for spooks and hackers

Congress should think again

The essential guide to IT transformation

A top-drawer American cryptography boffin has expressed grave doubts about Bush administration plans to let spooks build wiretapping capabilities into the US comms infrastructure.

Writing in the Washington Post, Susan Landau, distinguished engineer at Sun Labs, described the capabilities sought by the National Security Agency (NSA) as a serious security vulnerability for America.

"Grant the NSA what it wants and within 10 years the United States will be vulnerable to attacks from hackers across the globe, as well as the militaries of China, Russia and other nations," she writes.

The NSA has recently been awarded temporary powers to conduct massive automated wiretapping in the United States without benefit of a warrant from the secret surveillance court, provided that at least one end of the communication is thought to be outside the USA. In order to carry out its analysis, the spook agency needs to be permanently plugged into most of the American comms backbone.

"NSA will need to build massive automatic surveillance capabilities into telephone switches," says Landau.

"Here things get tricky: Once such infrastructure is in place, others could use it... Intercept capabilities are likely to be managed remotely, and vulnerabilities are as likely to be global as local. In simplifying wiretapping for US intelligence, we provide a target for foreign intelligence agencies and possibly rogue hackers."

In the old days, a lot of voice and data went wirelessly - via microwave, line-of-sight, or satellite. The NSA could listen in on foreigners using expensive hardware which nobody else had: Landau says this was safe enough, as nobody could gain access to America's own comms by these means.

Nowadays, however, bulk info goes mainly by fibre, which needs to be physically tapped into. This is occasionally done overseas; certain parts of the US special forces, for instance, are reputed to have specialists who can sneak into a country of interest and place undetectable taps on fibre lines without being noticed. But a lot of foreign comms passes through America - where it can be tapped safely and simply.

To some degree, the NSA must have already put the systems that so worry Landau in place; the NSA's massive automated trawling of voice and data in and out of the USA began not long after 9/11 and is thought to have ceased only in recent months, when a secret-surveillance judge refused to renew a key warrant. That led to the recent change in the law.

Landau's argument isn't about the wrongness or rightness of spooks listening in on any conversation that any American has with a foreigner - or perhaps, at least in some cases, conversations between Americans. She's simply saying the technology itself will open up a backdoor into US communications which could be used by America's enemies.

"In its effort to provide policymakers with immediate intelligence, the NSA forgot the critical information security aspect of its mission: protecting US communications against foreign interception."

When a heavyweight security brain like Landau says that, you have to pay attention.

This isn't just an American issue. The UK intelligence community doesn't have the computer resources to do massive automated surveillance on an NSA scale, but it does wiretap its own people a lot - and in the case of the UK the warrants have always been signed by politicians rather than (relatively) trustworthy judges. Telecoms companies provide official backdoors in the UK and many another country. These too will be vulnerabilities to a greater or lesser degree.

But Landau suggests that constant massive access, potentially over a period of years, has to be a lot worse than relatively limited and targeted taps, and that does sound reasonable. Noted security heavyweight Bruce Schneier - who provides services to our own British Telecom - agrees with her too, saying:

"Last week, Congress gave President Bush new wiretapping powers. I was going to write an essay on the security implications of this, but Susan Landau beat me to it."

Landau recommends that Washington politicos think hard before rubberstamping the blanket wiretap warrant again.

"Lawmakers granted the warrantless wiretapping only for six months," she says. "They need to look carefully before it endangers US national security for the long term."

The full text is here. ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?