Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Benchmark raises $225 million in special funding to double Cerebras

February 7, 2026

How Elon Musk is rewriting the rules about founder power

February 6, 2026

Reddit says it's considering further acquisitions in ad tech and other areas

February 6, 2026
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    YC startups can now receive stablecoin investment

    February 3, 2026

    TC Founder Summit 2026 tickets are on sale at the lowest price

    January 28, 2026

    SEC drops lawsuit against Winklevoss twins' Gemini cryptocurrency exchange

    January 24, 2026

    Bitfinex hacker Ilya Lichtenstein appreciates President Trump's early release

    January 3, 2026

    According to data, hackers stole over $2.7 billion in cryptocurrencies in 2025

    December 23, 2025
  • Security

    A senator who has repeatedly warned about secret surveillance by the U.S. government issues a new alarm over “CIA activities''

    February 6, 2026

    Chinese Salt Typhoon hackers infiltrate Norwegian company

    February 6, 2026

    One of Europe's largest universities goes offline for several days after cyber attack

    February 5, 2026

    Data breach at government tech giant Conduent balloon affects millions more Americans

    February 5, 2026

    Substack confirms data breach affects users' email addresses and phone numbers

    February 5, 2026
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Benchmark raises $225 million in special funding to double Cerebras

    February 7, 2026

    How Elon Musk is rewriting the rules about founder power

    February 6, 2026

    Reddit says it's considering further acquisitions in ad tech and other areas

    February 6, 2026

    How far will Elon Musk take his “everything” business with the SpaceX and xAI merger?

    February 6, 2026

    Sapiom raises $15M to help AI agents buy their own technology tools

    February 5, 2026
TechBrunchTechBrunch

The 30-year-old Internet backdoor law is back again

TechBrunchBy TechBrunchOctober 7, 20246 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Last weekend, news broke that Chinese-backed hackers had penetrated the eavesdropping systems of several U.S. telecommunications and internet providers, presumably to collect information about Americans.

Required by a 30-year-old U.S. federal law, wiretapping systems are among the most secretive systems within a telecommunications or Internet provider's network, typically allowing a select few employees to monitor Internet traffic. Allows nearly unlimited access to information about customers, including: and browsing history.

But for technologists who have long been sounding the alarm about the security risks of backdoors, news of the breach is the “I told you so” moment they hoped would never come, but knew would come.

“I think this was absolutely inevitable,” Matt Blais, a Georgetown Law professor and secure systems expert, told TechCrunch about the latest breach of telecom and internet providers. .

The Wall Street Journal reported Friday that a Chinese government hacking group called Salt Typhoon had breached three of the largest U.S. internet providers, including AT&T, Lumen (formerly CenturyLink), and Verizon, and made customer data available to law enforcement agencies and others. It was the first to report that the company had accessed a system used to provide information to law enforcement agencies. government. The hack reportedly resulted in “massive harvesting of internet traffic” from telecom and internet giants. CNN and the Washington Post also confirmed the breach and said a U.S. government investigation was in its early stages.

The purpose of China's operation is not yet fully clear, but the Journal cited national security officials who believe the breach was “potentially catastrophic.” The hacker in question, Salt Typhoon, is believed to be laying the groundwork for a devastating cyberattack in preparation for an expected future conflict between China and the United States over Taiwan. One of the related hacking units.

Blaze told TechCrunch that China's infiltration of US eavesdropping systems is the latest example of malicious misuse of backdoors intended for ostensibly lawful and lawful purposes. The security community has long advocated against backdoors, arguing that it is technically impossible to have a “secure backdoor” that cannot be exploited or exploited by malicious actors.

Liana Pfefferkorn, a scholar and encryption policy expert at Stanford University, said, “The law requires carriers to make calls available for eavesdropping (unless they encrypt the calls); “Systems are always a target for bad actors,” he said in a Blue Sky thread. “This hack exposes the lies America has told.” [government] To protect yourself, you need to be able to read every message you send and listen to every call you make. This system is not protecting you, it is putting you at risk. ”

“The only solution is to strengthen the encryption,” Pfefferkorn said.

The 30-year-old law that is the setting for the latest backdoor fraud is the Communications Assistance for Law Enforcement Act (CALEA). CALEA became law in 1994, when cell phones were rare and the internet was still in its infancy.

CALEA requires “telecommunications providers” such as telephone companies and internet providers to provide the government with all necessary assistance to access their customers' information if lawfully ordered to do so. In other words, if there is a way to access customer data, phone companies and internet providers must provide it.

Eavesdropping became big business after 2000, following the 9/11 attacks in 2001. The subsequent introduction of post-9/11 legislation, such as the Patriot Act, significantly expanded U.S. surveillance and intelligence collection, including of American citizens. CALEA and other surveillance laws around this time created an entire industry of wiretapping companies that help phone and internet companies comply with the law by wiretapping on their behalf.

Much of how these expanded wiretapping laws and provisions worked in practice, and what access the government had to American citizens' personal data, was revealed in 2013 by former NSA contractor Edward・It was largely kept secret until Mr. Snowden leaked thousands of classified U.S. documents and exposed government secrets on a large scale. Surveillance technologies and practices over the past decade, including vast collections of Americans' personal data.

While much of the Snowden surveillance scandal focused on how the U.S. government and its closest allies collected sensitive data about key foreign intelligence targets such as foreign terrorists and hostile government hackers, the U.S. government 's spying revelations led to an uproar in Silicon Valley. The tech giant's systems were, in some cases, unwittingly eavesdropped by U.S. intelligence agencies. Silicon Valley banded together to fight back, which led, in part, to peel back years of secrecy and general cover-up of government-mandated wiretapping.

In the years that followed, tech giants realized they couldn't force them to hand over customer data they didn't have access to, so they began encrypting as much customer data as possible (though there are still a number of untested legal exceptions). or exist). Tech giants once accused of facilitating U.S. surveillance have begun publishing “transparency reports” detailing how many times they were forced to hand over customer data over a given period of time.

While tech companies have begun to lock down their products and prevent outside prying eyes (and in some cases even the tech companies themselves) from accessing their customers' data, phone and internet companies have begun to lock down their customers' phones. and rarely encrypted Internet traffic. Therefore, much of the United States' Internet and telephone traffic is still available for eavesdropping under CALEA.

The United States isn't the only country interested in backdoors. There are ongoing and persistent efforts by governments around the world to push laws that undermine, circumvent, or violate encryption. Across the European Union, member states are working to legally require messaging apps to scan citizens' private communications for suspected child abuse material. Security experts argue that no technology exists that can accomplish what the law requires without risking nefarious abuse by malicious parties.

Signal, an end-to-end encrypted messaging app, has been one of the most vocal critics of encryption backdoors, citing Chinese claims as why the European proposal poses a serious threat to cybersecurity. He cited recent breaches of U.S. internet providers.

“There is no way to build a backdoor that only the 'good guys' can use,” Signal president Meredith Whitaker wrote about Mastodon.

“CALEA should be seen as a cautionary tale, not a backdoor success story,” Blaise said of some of the more advanced backdoor proposals that have come out in recent years.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

A senator who has repeatedly warned about secret surveillance by the U.S. government issues a new alarm over “CIA activities''

February 6, 2026

Chinese Salt Typhoon hackers infiltrate Norwegian company

February 6, 2026

One of Europe's largest universities goes offline for several days after cyber attack

February 5, 2026

Data breach at government tech giant Conduent balloon affects millions more Americans

February 5, 2026

Substack confirms data breach affects users' email addresses and phone numbers

February 5, 2026

Hackers release personal information stolen during Harvard, University of Pennsylvania data breaches

February 4, 2026

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Benchmark raises $225 million in special funding to double Cerebras

February 7, 2026

How Elon Musk is rewriting the rules about founder power

February 6, 2026

Reddit says it's considering further acquisitions in ad tech and other areas

February 6, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2026 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.