Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

iOS 19: All the rumor changes that Apple could bring to the new operating system

June 7, 2025

The Trump administration is aiming for Biden and Obama's cybersecurity rules

June 7, 2025

WWDC 2025: What to expect from this year's meeting

June 7, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    iOS 19: All the rumor changes that Apple could bring to the new operating system

    June 7, 2025

    WWDC 2025: What to expect from this year's meeting

    June 7, 2025

    Trump Mask feud was perfect for X and jumped on the app store chart

    June 6, 2025

    iOS 19: All the rumor changes that Apple could bring to the new operating system

    June 6, 2025

    WWDC 2025: What to expect from this year's meeting

    June 6, 2025
  • Crypto

    xNotify Polymarket as partner in the official forecast market

    June 6, 2025

    Circle IPOs are giving hope to more startups waiting to be published to more startups

    June 5, 2025

    GameStop bought $500 million in Bitcoin

    May 28, 2025

    Vote for the session you want to watch in 2025

    May 26, 2025

    Save $900 + 90% from 2 tickets to destroy 2025 in the last 24 hours

    May 25, 2025
  • Security

    The Trump administration is aiming for Biden and Obama's cybersecurity rules

    June 7, 2025

    After data is wiped out, Kiranapro co-founders cannot rule out external hacks

    June 7, 2025

    Humanity appoints national security experts to governing trusts

    June 6, 2025

    Italian lawmakers say Italy used spyware to target immigrant activists' mobile phones, but not for journalists

    June 6, 2025

    Humanity unveils custom AI models for US national security customers

    June 5, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Why investing in a growing AI startup is risky and more complicated

    June 6, 2025

    Startup Battlefield 200: Only 3 days left

    June 6, 2025

    Book all TC Stage Exhibitor Tables before ending today

    June 6, 2025

    Less than 48 hours left until display at TC at all stages

    June 5, 2025

    TC Session: AI will be on sale today at Berkeley

    June 5, 2025
TechBrunchTechBrunch

The 30-year-old Internet backdoor law is back again

TechBrunchBy TechBrunchOctober 7, 20246 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Last weekend, news broke that Chinese-backed hackers had penetrated the eavesdropping systems of several U.S. telecommunications and internet providers, presumably to collect information about Americans.

Required by a 30-year-old U.S. federal law, wiretapping systems are among the most secretive systems within a telecommunications or Internet provider's network, typically allowing a select few employees to monitor Internet traffic. Allows nearly unlimited access to information about customers, including: and browsing history.

But for technologists who have long been sounding the alarm about the security risks of backdoors, news of the breach is the “I told you so” moment they hoped would never come, but knew would come.

“I think this was absolutely inevitable,” Matt Blais, a Georgetown Law professor and secure systems expert, told TechCrunch about the latest breach of telecom and internet providers. .

The Wall Street Journal reported Friday that a Chinese government hacking group called Salt Typhoon had breached three of the largest U.S. internet providers, including AT&T, Lumen (formerly CenturyLink), and Verizon, and made customer data available to law enforcement agencies and others. It was the first to report that the company had accessed a system used to provide information to law enforcement agencies. government. The hack reportedly resulted in “massive harvesting of internet traffic” from telecom and internet giants. CNN and the Washington Post also confirmed the breach and said a U.S. government investigation was in its early stages.

The purpose of China's operation is not yet fully clear, but the Journal cited national security officials who believe the breach was “potentially catastrophic.” The hacker in question, Salt Typhoon, is believed to be laying the groundwork for a devastating cyberattack in preparation for an expected future conflict between China and the United States over Taiwan. One of the related hacking units.

Blaze told TechCrunch that China's infiltration of US eavesdropping systems is the latest example of malicious misuse of backdoors intended for ostensibly lawful and lawful purposes. The security community has long advocated against backdoors, arguing that it is technically impossible to have a “secure backdoor” that cannot be exploited or exploited by malicious actors.

Liana Pfefferkorn, a scholar and encryption policy expert at Stanford University, said, “The law requires carriers to make calls available for eavesdropping (unless they encrypt the calls); “Systems are always a target for bad actors,” he said in a Blue Sky thread. “This hack exposes the lies America has told.” [government] To protect yourself, you need to be able to read every message you send and listen to every call you make. This system is not protecting you, it is putting you at risk. ”

“The only solution is to strengthen the encryption,” Pfefferkorn said.

The 30-year-old law that is the setting for the latest backdoor fraud is the Communications Assistance for Law Enforcement Act (CALEA). CALEA became law in 1994, when cell phones were rare and the internet was still in its infancy.

CALEA requires “telecommunications providers” such as telephone companies and internet providers to provide the government with all necessary assistance to access their customers' information if lawfully ordered to do so. In other words, if there is a way to access customer data, phone companies and internet providers must provide it.

Eavesdropping became big business after 2000, following the 9/11 attacks in 2001. The subsequent introduction of post-9/11 legislation, such as the Patriot Act, significantly expanded U.S. surveillance and intelligence collection, including of American citizens. CALEA and other surveillance laws around this time created an entire industry of wiretapping companies that help phone and internet companies comply with the law by wiretapping on their behalf.

Much of how these expanded wiretapping laws and provisions worked in practice, and what access the government had to American citizens' personal data, was revealed in 2013 by former NSA contractor Edward・It was largely kept secret until Mr. Snowden leaked thousands of classified U.S. documents and exposed government secrets on a large scale. Surveillance technologies and practices over the past decade, including vast collections of Americans' personal data.

While much of the Snowden surveillance scandal focused on how the U.S. government and its closest allies collected sensitive data about key foreign intelligence targets such as foreign terrorists and hostile government hackers, the U.S. government 's spying revelations led to an uproar in Silicon Valley. The tech giant's systems were, in some cases, unwittingly eavesdropped by U.S. intelligence agencies. Silicon Valley banded together to fight back, which led, in part, to peel back years of secrecy and general cover-up of government-mandated wiretapping.

In the years that followed, tech giants realized they couldn't force them to hand over customer data they didn't have access to, so they began encrypting as much customer data as possible (though there are still a number of untested legal exceptions). or exist). Tech giants once accused of facilitating U.S. surveillance have begun publishing “transparency reports” detailing how many times they were forced to hand over customer data over a given period of time.

While tech companies have begun to lock down their products and prevent outside prying eyes (and in some cases even the tech companies themselves) from accessing their customers' data, phone and internet companies have begun to lock down their customers' phones. and rarely encrypted Internet traffic. Therefore, much of the United States' Internet and telephone traffic is still available for eavesdropping under CALEA.

The United States isn't the only country interested in backdoors. There are ongoing and persistent efforts by governments around the world to push laws that undermine, circumvent, or violate encryption. Across the European Union, member states are working to legally require messaging apps to scan citizens' private communications for suspected child abuse material. Security experts argue that no technology exists that can accomplish what the law requires without risking nefarious abuse by malicious parties.

Signal, an end-to-end encrypted messaging app, has been one of the most vocal critics of encryption backdoors, citing Chinese claims as why the European proposal poses a serious threat to cybersecurity. He cited recent breaches of U.S. internet providers.

“There is no way to build a backdoor that only the 'good guys' can use,” Signal president Meredith Whitaker wrote about Mastodon.

“CALEA should be seen as a cautionary tale, not a backdoor success story,” Blaise said of some of the more advanced backdoor proposals that have come out in recent years.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The Trump administration is aiming for Biden and Obama's cybersecurity rules

June 7, 2025

After data is wiped out, Kiranapro co-founders cannot rule out external hacks

June 7, 2025

Humanity appoints national security experts to governing trusts

June 6, 2025

Italian lawmakers say Italy used spyware to target immigrant activists' mobile phones, but not for journalists

June 6, 2025

Humanity unveils custom AI models for US national security customers

June 5, 2025

Unlock phone company Cellebrite to acquire mobile testing startup Corellium for $170 million

June 5, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

iOS 19: All the rumor changes that Apple could bring to the new operating system

June 7, 2025

The Trump administration is aiming for Biden and Obama's cybersecurity rules

June 7, 2025

WWDC 2025: What to expect from this year's meeting

June 7, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.