Feeds

US wiretap plan will leave door open for spooks and hackers

Congress should think again

Using blade systems to cut costs and sharpen efficiencies

A top-drawer American cryptography boffin has expressed grave doubts about Bush administration plans to let spooks build wiretapping capabilities into the US comms infrastructure.

Writing in the Washington Post, Susan Landau, distinguished engineer at Sun Labs, described the capabilities sought by the National Security Agency (NSA) as a serious security vulnerability for America.

"Grant the NSA what it wants and within 10 years the United States will be vulnerable to attacks from hackers across the globe, as well as the militaries of China, Russia and other nations," she writes.

The NSA has recently been awarded temporary powers to conduct massive automated wiretapping in the United States without benefit of a warrant from the secret surveillance court, provided that at least one end of the communication is thought to be outside the USA. In order to carry out its analysis, the spook agency needs to be permanently plugged into most of the American comms backbone.

"NSA will need to build massive automatic surveillance capabilities into telephone switches," says Landau.

"Here things get tricky: Once such infrastructure is in place, others could use it... Intercept capabilities are likely to be managed remotely, and vulnerabilities are as likely to be global as local. In simplifying wiretapping for US intelligence, we provide a target for foreign intelligence agencies and possibly rogue hackers."

In the old days, a lot of voice and data went wirelessly - via microwave, line-of-sight, or satellite. The NSA could listen in on foreigners using expensive hardware which nobody else had: Landau says this was safe enough, as nobody could gain access to America's own comms by these means.

Nowadays, however, bulk info goes mainly by fibre, which needs to be physically tapped into. This is occasionally done overseas; certain parts of the US special forces, for instance, are reputed to have specialists who can sneak into a country of interest and place undetectable taps on fibre lines without being noticed. But a lot of foreign comms passes through America - where it can be tapped safely and simply.

To some degree, the NSA must have already put the systems that so worry Landau in place; the NSA's massive automated trawling of voice and data in and out of the USA began not long after 9/11 and is thought to have ceased only in recent months, when a secret-surveillance judge refused to renew a key warrant. That led to the recent change in the law.

Landau's argument isn't about the wrongness or rightness of spooks listening in on any conversation that any American has with a foreigner - or perhaps, at least in some cases, conversations between Americans. She's simply saying the technology itself will open up a backdoor into US communications which could be used by America's enemies.

"In its effort to provide policymakers with immediate intelligence, the NSA forgot the critical information security aspect of its mission: protecting US communications against foreign interception."

When a heavyweight security brain like Landau says that, you have to pay attention.

This isn't just an American issue. The UK intelligence community doesn't have the computer resources to do massive automated surveillance on an NSA scale, but it does wiretap its own people a lot - and in the case of the UK the warrants have always been signed by politicians rather than (relatively) trustworthy judges. Telecoms companies provide official backdoors in the UK and many another country. These too will be vulnerabilities to a greater or lesser degree.

But Landau suggests that constant massive access, potentially over a period of years, has to be a lot worse than relatively limited and targeted taps, and that does sound reasonable. Noted security heavyweight Bruce Schneier - who provides services to our own British Telecom - agrees with her too, saying:

"Last week, Congress gave President Bush new wiretapping powers. I was going to write an essay on the security implications of this, but Susan Landau beat me to it."

Landau recommends that Washington politicos think hard before rubberstamping the blanket wiretap warrant again.

"Lawmakers granted the warrantless wiretapping only for six months," she says. "They need to look carefully before it endangers US national security for the long term."

The full text is here. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.