Feeds

Microsoft patent points to Skype snooping

Just what the government ordered

Combat fraud and increase customer satisfaction

A new Microsoft patent points towards Skype becoming equipped for lawful interception, which could be important as the service grows up to challenge traditional telcos.

The patent was filed back in 2009, but published* last week and picked up by Computerworld. Titled "Legal Intercept", it covers one way in which a VoIP-based communications system might enable a call to be intercepted and covertly recorded, naming Skype as one of the services to which it could be applied.

Microsoft bought Skype back in May, but only received approval for the deal in June – so hasn't had much time to do anything with the VoIP leader. Skype is hugely successful, with 170 million registered users, but it's been very secretive about its protocols and security, refusing interoperability and asking users to just trust in Skype for their security.

That won't wash in the real world, and neither will denying governments the right to listen in on their citizens. Most of us accept that security forces need to occasionally tap into phone lines, hopefully with suitable judicial oversight, but Skype's apparent reluctance to permit such taps has resulted in rumours of secret deals and government-backed attacks on the cryptography used to protect Skype calls.

The patent describes how client, or network, software can be surreptitiously alerted that incoming and/or outgoing calls are to be monitored for a specific user. Such calls are then copied (packet by packet) to the monitoring server without the user being aware. The patent suggests the interception software could be placed in a NAT or router, but also incorporated into the VoIP client itself.

India has made it clear that Skype risks being kicked out of the country unless it sorts out some sort of lawful intercept capability, and other countries will be quick to follow India's lead. So if Microsoft wants to see Skype spreading around the world then it will need to have just what's described in the Legal Intercept patent.

Citizens aghast that their VoIP calls could be intercepted might be annoyed, but they'd be better off petitioning their governments, rather than raging against the companies trying to obey the law. ®

* That's "published", not "granted" as we earlier stated - our mistake.

Top three mobile application threats

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.