- Gentlemen, start your drones: Judge’s ruling opens door for commercial use
- Soldier who hid, bragged about not saluting flag to be punished — in secret
- ‘Maverick’ of the seas: ‘Top Gun’ school for U.S. ship officers to launch
- Putin declares Sochi Paralympics open amid Ukrainian protest
- ‘In Jesus name, we pray’ sparks ire at Ohio council meeting
- Navy’s first laser weapon ready for prime time; drone killer to deploy this summer
- Billionaire backer: Rick Santorum ‘needs to be heard’ in 2016
- Obamacare fallout: 49 percent pessimistic; 45 percent ‘scared’
- DHS accused of holding U.S. citizen at airport, using emails to pry into her sex life
- Seattle socialist: Minimum-wage discussion skewed by ‘right-wing’ GAO analysis
New weapon in the terror tool kit? Encryption software blocks all eavesdropping
A cheap new encryption technology for mobile phones completely blocks eavesdropping, even from warrant-wielding law enforcement agents – raising fears the technology could fall into the hands of terrorists or criminals.
The software poses a growing problem that U.S. law enforcement agencies call "going dark" – the spread of communications technologies that cannot be intercepted even with a warrant because agencies lack the technical capabilities.
But experts say the feds' proposed solution to get around the blackout – by legally mandating the insertion of "back doors" into such software to allow eavesdropping – creates an opening which could be exploited by hackers, online criminals or cyberspies.
The issue is not unique to the United States. Intelligence and counter-terrorism officials in the United Kingdom are concerned about the new mobile phone application, called Seecrypt, according the London Mail on Sunday.
The app provides individual users with military grade encryption -- sending voice and text over the Internet in an a scrambled data stream that can only be deciphered by another user.
The new application, which is free to download and will cost $3 a month, is made by a South African-based company, Porton Group, that boasts "we don't comply" with such mandates, said CEO Harvey Boulter. The program does not have a "Legal Intercept" capability, said Mr. Boulter.
"Seecrypt is about empowering people to take back their own privacy," he added in an email to The Washington Times. Even so-called meta-data -- information about which numbers called in or were called, and when and for how long -- is stored in a secure private network to which only users have the key.
But he promised the company "would work with law enforcement agencies to make sure this does not get misused.
"Simply put if asked by the authorities the license can be revoked instantaneously," he said, effectively cutting the user off from the service.
Last year, the U.S. company Silent Circle caused consternation in law enforcement circles when they launched a similar package here.
U.S. law enforcement responded by renewing its push for an update of the 1994 Communications Assistance for Law Enforcement Act, or CALEA.
The law currently applies only to telecommunications providers, though the Federal Communications Commission extended it in 2004 to apply to many Internet service and Web-based phone service providers. It requires covered service providers to make their products "wiretap ready."
In a series of meetings with industry executives, reported earlier this month by CNet news, FBI director Robert Mueller has been urging Internet companies not to oppose an update to CALEA, which would extend the "wiretap ready" mandate to all kinds of Internet-based realtime communications services like instant messaging and chat, Skype, Google Hangouts and even Xbox Live.
But the installation of special software "backdoors" in to allow law enforcement to conduct court-authorized wiretaps creates an obvious vulnerability that can be exploited by anyone with the requisite skills, found a report last week by a group of leading encryption experts and other engineers.
"Building holes and backdoors into widely-available software and services creates vulnerabilities that can be exploited by a range of bad actors, including hackers, individual employees at the software companies and government officials in the numerous countries that will expect the same access afforded to the FBI," wrote Ohio State law Professor and privacy scholar Peter P. Swire.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Senator's memo shows Iran links in Homeland Security's troubled immigration program
- Help wanted: Homeland Security plagued by vacancies at the top
- Dems back bill to fix problems in investor visa program
- Democrats proceed with Mayorkas vote despite pending investigation
- Game players don't think peace has a chance in Syria
Latest Blog Entries
TWT Video Picks
Taxpayers must pay the freight for over-budget train projects
- Kim Jong-un calls for execution of 33 Christians
- Rand Paul wins 2014 CPAC straw poll, Ted Cruz finishes a distant second
- U.S. deploys 12 F-16 fighter jets to Poland as exercise in response to Ukraine situation
- High schooler suing parents for money shot down by judge
- Senate Democrats, Republicans spar over restoring unemployment benefits
- Six Senate seats could hinge on Keystone pipeline
- Russias Putin nominated for Nobel Peace Prize
- Italy outraged over U.S. gun dealer's 'David' ad
- CURL: The modern GOP really is Reagan's 'Big Tent' party
- U.S. pilot scares off Iranians with 'Top Gun'-worthy stunt: 'You really ought to go home'
Pope Francis meets his 'mini-me'
Celebrity deaths in 2014
Winter storm hits states — again