A bill that the Obama administration plans to submit sometime next year would require all communication services, even smart phones, Facebook and Skype, to be “technically capable of complying if served with a wiretap order,” including “being able to intercept and unscramble encrypted messages.”
The reasoning behind the proposed bill, federal officials claim, is as society uses modern communication technology more frequently and departs from relying on phones for their communicative needs, this leads to an “erosion of their investigative powers.”
The Federal Bureau of Investigation doesn’t view the proposed bill as an expansion of authority, but more as keeping up with expanding technology and avenues of communication. Valerie E. Caproni, general counsel for the FBI explains, “We’re not talking expanding authority. We’re talking about preserving our ability to execute our existing authority in order to protect the public safety and national security.”
Though the FBI, the Justice Department, the National Security Agency and the White House have all met to discuss and develop a solution to the problem of “dwindling surveillance,” certain important facets of the proposed plan are lacking details, such as what exactly classifies a company as a provider of communication.
Some of the proposal’s likely requirements include:
- Communications services that encrypt messages must have a way to unscramble them.
- Foreign-based providers that do business inside the United States must install a domestic office capable of performing intercepts.
- Developers of software that enables peer-to-peer communication must redesign their service to allow interception.
People are finding other issues with internet wiretaps that aren’t even related to privacy, such as Columbia University computer science professor Steven M. Bellovin, who suggests that if communications technology is legally required to contain backdoors for government surveillance, hackers would have no problem finding and exploiting said backdoors.
If the bill is passed, one begins to wonder if more and more people will turn to software generally associated with protecting one’s identify in the peer-to-peer world with programs widely associated with blocking one’s own identity in regards to software piracy, and if those programs can even withstand government interference.
Have a tip we should know? firstname.lastname@example.org