US Gov't Considers New Internet Wiretap Rules
The United States government is said to be considering plans that would force all communications firms to make their systems available for "wiretapping" in the event of a court order.
A Federal Bureau of Investigation (FBI) lawyer says the idea would not mean expanding the ability of law enforcement and security officials to demand access to data through the court system.
Instead, the changes would deal with cases where court orders are effectively meaningless because the communications firms concerned are unable to hand over the relevant data, either because it can't be intercepted or it is in an encrypted form that can't be unlocked by anyone but the sender and recipient.
Issue Could Become International Incident
The issue has caused problems for Canadian firm Research In Motion (RIM), makers of BlackBerry smartphones, in several countries in the Middle East and Asia. If RIM came under the new US rules, which would appear to be the case, the public and media reaction would be interesting given that many accounts have portrayed the issue as one of government snooping. (Source: computerworld.com)
In theory, all broadband providers already come under a 1994 law that says they must have intercept capabilities. In practice, it appears many only put such systems in place when they receive a court order for a specific case. (Source: nytimes.com)
Careful Legislative Drafting Required
While the proposals appear simple, they are likely to have some major stumbling blocks. One is the non-geographic nature of the Internet. It's possible the new rules could mean foreign firms doing business in the US would have to put the relevant systems in place, but it's not clear if or how the rules could affect those companies that have no physical presence in the country.
Another concern is that by modifying systems to allow officials easy access where needed, communications firms could make themselves open to attack from hackers.
Any legislation would also have to be very carefully worded to avoid people finding loopholes, but without the rules having unintended consequences. One particular issue is whether the rules would only affect companies offering specific services, or if it applied to software created and used by individuals, such as peer-to-peer filesharing.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.