Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    FBI to Discuss Packet Tapping

    Written by

    eWEEK EDITORS
    Published November 5, 2001
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Senior FBI officials – responding to reports to the contrary – said they have no plans to expand packet data wiretapping capabilities beyond what is already authorized in the 1994 Communications Assistance for Law Enforcement Act .

      Rumors spread throughout the telecommunications industry last week, based in part on comments by a Washington, D.C., insider who suggested that the FBI was seeking broader wiretapping authority involving ISPs.

      Officials insisted that those reports were “speculation,” probably based on the FBIs continuing efforts to implement CALEA where it applies to surveillance of packet-mode transmissions. They said that no sweeping surveillance changes are being contemplated.

      “The concept of electronic surveillance is a very focused, surgical tool, aimed toward individual people,” said Mike Clifford, chief of the FBIs CALEA implementation section. “It is not about doing vast, large-scale interception. That is not going to change.

      “Our laws are structured that way for reasons, so we want to develop capabilities to meet the legal requirements. That does not mean . . . any architectural shift in the Internet,” he said.

      To that end, the agency and its consultant, Telcordia Technologies, are meeting behind closed doors with telecommunications carriers and vendors at an invitation-only symposium in Tucson, Ariz., on Tuesday, Nov. 6.

      The meeting precedes a scheduled meeting of the Federal Communications Commission on Wednesday, Nov. 7, at which standards for packet data interception under CALEA will be discussed in Washington D.C.

      The FBI and Telcordia will release a confidential document to participants in Tucson, outlining technological details of “law enforcement needs” in surveillance on the Internet. While that document is considered confidential, privacy advocates are expected to push for release of more detail of what the FBI wants.

      Marcus Thomas, head of the FBIs cybertechnology section, debunked published reports of a sweeping new wiretap initiative by the FBI, saying the confusion stirred up in the industry by those suggestions had even created some confusion within the agency itself.

      While the FBI is keeping the information under wraps, Clifford said that the Tucson initiative is simply part of implementing current law, not an expansion of Internet wiretapping authority because of the recent terrorist attacks.

      “Nothing is coming out of [Tucson] . . . that would in any way imply we have an interest in [mass surveillance],” Clifford said. “What we are interested in doing is developing – or having the industry develop – capabilities for identifying and isolating individual communications that are subject to guidelines of the law, which are very strict.”

      Thomas said that while ISPs are not covered directly under CALEA, packet data has become a focus for surveillance because of the “migration” from voice to packet-mode transmission by telecom carriers

      Although ISPs are not covered, they have obligations, Clifford said.

      “There is a requirement to provide assistance when it is legally authorized,” Thomas said. “It might be allowing us to use our equipment, or them providing the information. But electronic surveillance is strictly done by electronic surveillance order. There is also the pen registry-type trace. But everything we are talking about here is pursuant to court orders.”

      Thomas said that the agencys use of Carnivore – the FBI-developed technology that places wiretaps on suspects computers – wont change, except by evolution that makes it more efficient.

      “Nothing . . . would change the way this process works, with the exception that more and more, we will find ISPs having their own capability to perform interception service for law enforcement,” Thomas said. “Not because of any requirement on them to do that, but because of the issues raised in privacy and the issues raised about who is watching the watchers.

      “I think a lot of [ISPs] feel it is to their benefit to do this without relying so heavily on us. If they can do it, and choose to do it, its better for us because the information is all we are interested in anyway,” he said.

      Stewart Baker, former general counsel of the National Security Agency and a former member of the presidents commission on encryption, said last month that he believed that the FBI was preparing a new plan to expand wiretap activities that could more directly involve ISPs.

      Baker predicted that the FBI would meet with ISPs shortly, and suggested that the agency was interested in “pooling” information in order to facilitate wiretaps.

      Officials of Siemens who have worked closely with the FBI in developing CALEA-compliant software and hardware said that they are aware that the agency wants to regionalize and centralize data it receives from wiretaps. But that does not involve “pooling” data for mass surveillance, or architectural changes in the Internet, they said.

      Thomas said the FBI is hoping for and anticipating cooperation from ISPs, but only as those companies conduct their own normal surveillance of user activities. If they see something suspicious, Thomas said, he expects they will notify the FBI.

      “Were very adept at working with the industry,” Thomas said. “And I think they are much more inclined today, because of Sept. 11, to address lawful intercept needs. That is the purpose [of the meeting] . . . to identify those things that we need, and what may be too complicated or cost prohibitive to accomplish.”

      Baker said that he “does not disagree with anything the agency is saying,” but he cautioned that the FBI may be “underhyping” the impact that what it is doing will have on privacy and related issues.

      Baker said that if the impact is the setting of standards that the ISPs either follow or are forced to challenge in court, the result would be an environment in which ISPs may feel pressured to build systems that are not their preference, but are compatible with CALEA.

      “There are some out there who believe that CALEA does not apply to packet data surveillance at all,” Baker said. “And the FBI seems to believe that CALEA allows them to follow telecom carriers, wherever they go.”

      Ray Shedden and Erwin Hunter, who oversee CALEA-related products at Siemens, said they believe that telecommunications carriers affected by the law want to cooperate with the FBI, but are faced with greater complexity – and costs – to meet the FBIs packet surveillance needs than they faced for voice wiretap technology.

      “There are a variety of issues, but who is going to pay the costs?” said Shedden, who manages business switching products. “The FBI has not been given enough money to fund what it will cost telephone companies to [facilitate] these intercepts.”

      Hunter said that another concern of the FBI is the speed at which the agency would be able to receive intercepted communications, so that it can be acted upon in time to preserve public safety.

      The Department of Justices field guidance related to Carnivore specifically instructs agents to check with ISPs first, to see if they have the technology handy to lay the same wiretaps the FBI offers through Carnivore. Most carriers have such capability through regular billing, traffic monitoring and enforcement tools, and it appears to suffice.

      Trials to set up a snooping system that would isolate traffic generated by a particular user have been discussed within technical circles as far back as 1999. That year, a WorldCom engineer presented attendees of the quarterly North American Network Operators Group conference with a plan to “pool” traffic generated by hackers in the midst of an attack onto separate pipes equipped with technology to locate the offenders and shut them down.

      The technology, while operational, was later abandoned by WorldCom, supposedly because of costs associated with running it.

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×