Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Greek revival you haven't seen (probably should)

May 11, 2025

A flock of Whitney Wolf burns out – and bounces back

May 10, 2025

Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

May 10, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    A flock of Whitney Wolf burns out – and bounces back

    May 10, 2025

    Google I/O 2025: What to expect including Gemini and Android 16 updates?

    May 9, 2025

    Epic Games and Spotify Test Apple's new app store rules

    May 9, 2025

    X Timeline is not updated for many users

    May 9, 2025

    AppFigures: Apple earned more than $10 billion from its US App Store commission last year

    May 8, 2025
  • Crypto

    Stripe unveils AI Foundation model for payments, revealing a “deeper partnership” with Nvidia

    May 7, 2025

    Movie Pass explores the daily fantasy platform of film buffs

    May 1, 2025

    Speaking on TechCrunch 2025: Application is open

    April 24, 2025

    Revolut, a $45 billion Neobank, recorded a profit of $1 billion in 2024

    April 24, 2025

    The new kids show will come with a crypto wallet when it debuts this fall

    April 18, 2025
  • Security

    Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

    May 10, 2025

    FBI and Dutch police seize and shut down hacked router botnets

    May 9, 2025

    Florida bill calling for encryption backdoors for social media accounts failed

    May 9, 2025

    Korean telephone giant SKT data breaches timeline

    May 8, 2025

    Powerschool paid the hacker ransom, but now the school says it's being forced

    May 8, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Greek revival you haven't seen (probably should)

    May 11, 2025

    A comprehensive list of 2025 tech layoffs

    May 9, 2025

    One of Elon Musk's longtime VCS is suing his former employer after allegedly fired

    May 8, 2025

    Sequoia leads a $1.5 billion tender offer for sales automation startup clay

    May 8, 2025

    Bosch Ventures is turning attention to North America with a new $270 million fund

    May 8, 2025
TechBrunchTechBrunch

The 30-year-old Internet backdoor law is back again

TechBrunchBy TechBrunchOctober 7, 20246 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Last weekend, news broke that Chinese-backed hackers had penetrated the eavesdropping systems of several U.S. telecommunications and internet providers, presumably to collect information about Americans.

Required by a 30-year-old U.S. federal law, wiretapping systems are among the most secretive systems within a telecommunications or Internet provider's network, typically allowing a select few employees to monitor Internet traffic. Allows nearly unlimited access to information about customers, including: and browsing history.

But for technologists who have long been sounding the alarm about the security risks of backdoors, news of the breach is the “I told you so” moment they hoped would never come, but knew would come.

“I think this was absolutely inevitable,” Matt Blais, a Georgetown Law professor and secure systems expert, told TechCrunch about the latest breach of telecom and internet providers. .

The Wall Street Journal reported Friday that a Chinese government hacking group called Salt Typhoon had breached three of the largest U.S. internet providers, including AT&T, Lumen (formerly CenturyLink), and Verizon, and made customer data available to law enforcement agencies and others. It was the first to report that the company had accessed a system used to provide information to law enforcement agencies. government. The hack reportedly resulted in “massive harvesting of internet traffic” from telecom and internet giants. CNN and the Washington Post also confirmed the breach and said a U.S. government investigation was in its early stages.

The purpose of China's operation is not yet fully clear, but the Journal cited national security officials who believe the breach was “potentially catastrophic.” The hacker in question, Salt Typhoon, is believed to be laying the groundwork for a devastating cyberattack in preparation for an expected future conflict between China and the United States over Taiwan. One of the related hacking units.

Blaze told TechCrunch that China's infiltration of US eavesdropping systems is the latest example of malicious misuse of backdoors intended for ostensibly lawful and lawful purposes. The security community has long advocated against backdoors, arguing that it is technically impossible to have a “secure backdoor” that cannot be exploited or exploited by malicious actors.

Liana Pfefferkorn, a scholar and encryption policy expert at Stanford University, said, “The law requires carriers to make calls available for eavesdropping (unless they encrypt the calls); “Systems are always a target for bad actors,” he said in a Blue Sky thread. “This hack exposes the lies America has told.” [government] To protect yourself, you need to be able to read every message you send and listen to every call you make. This system is not protecting you, it is putting you at risk. ”

“The only solution is to strengthen the encryption,” Pfefferkorn said.

The 30-year-old law that is the setting for the latest backdoor fraud is the Communications Assistance for Law Enforcement Act (CALEA). CALEA became law in 1994, when cell phones were rare and the internet was still in its infancy.

CALEA requires “telecommunications providers” such as telephone companies and internet providers to provide the government with all necessary assistance to access their customers' information if lawfully ordered to do so. In other words, if there is a way to access customer data, phone companies and internet providers must provide it.

Eavesdropping became big business after 2000, following the 9/11 attacks in 2001. The subsequent introduction of post-9/11 legislation, such as the Patriot Act, significantly expanded U.S. surveillance and intelligence collection, including of American citizens. CALEA and other surveillance laws around this time created an entire industry of wiretapping companies that help phone and internet companies comply with the law by wiretapping on their behalf.

Much of how these expanded wiretapping laws and provisions worked in practice, and what access the government had to American citizens' personal data, was revealed in 2013 by former NSA contractor Edward・It was largely kept secret until Mr. Snowden leaked thousands of classified U.S. documents and exposed government secrets on a large scale. Surveillance technologies and practices over the past decade, including vast collections of Americans' personal data.

While much of the Snowden surveillance scandal focused on how the U.S. government and its closest allies collected sensitive data about key foreign intelligence targets such as foreign terrorists and hostile government hackers, the U.S. government 's spying revelations led to an uproar in Silicon Valley. The tech giant's systems were, in some cases, unwittingly eavesdropped by U.S. intelligence agencies. Silicon Valley banded together to fight back, which led, in part, to peel back years of secrecy and general cover-up of government-mandated wiretapping.

In the years that followed, tech giants realized they couldn't force them to hand over customer data they didn't have access to, so they began encrypting as much customer data as possible (though there are still a number of untested legal exceptions). or exist). Tech giants once accused of facilitating U.S. surveillance have begun publishing “transparency reports” detailing how many times they were forced to hand over customer data over a given period of time.

While tech companies have begun to lock down their products and prevent outside prying eyes (and in some cases even the tech companies themselves) from accessing their customers' data, phone and internet companies have begun to lock down their customers' phones. and rarely encrypted Internet traffic. Therefore, much of the United States' Internet and telephone traffic is still available for eavesdropping under CALEA.

The United States isn't the only country interested in backdoors. There are ongoing and persistent efforts by governments around the world to push laws that undermine, circumvent, or violate encryption. Across the European Union, member states are working to legally require messaging apps to scan citizens' private communications for suspected child abuse material. Security experts argue that no technology exists that can accomplish what the law requires without risking nefarious abuse by malicious parties.

Signal, an end-to-end encrypted messaging app, has been one of the most vocal critics of encryption backdoors, citing Chinese claims as why the European proposal poses a serious threat to cybersecurity. He cited recent breaches of U.S. internet providers.

“There is no way to build a backdoor that only the 'good guys' can use,” Signal president Meredith Whitaker wrote about Mastodon.

“CALEA should be seen as a cautionary tale, not a backdoor success story,” Blaise said of some of the more advanced backdoor proposals that have come out in recent years.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

May 10, 2025

FBI and Dutch police seize and shut down hacked router botnets

May 9, 2025

Florida bill calling for encryption backdoors for social media accounts failed

May 9, 2025

Korean telephone giant SKT data breaches timeline

May 8, 2025

Powerschool paid the hacker ransom, but now the school says it's being forced

May 8, 2025

VC Company Insight Partners Review Personal Data Stolen During a January Hack

May 8, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Greek revival you haven't seen (probably should)

May 11, 2025

A flock of Whitney Wolf burns out – and bounces back

May 10, 2025

Five Things We Learned from WhatsApp vs. NSO Group Spyware Litigation

May 10, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.