Your Source for Leaks Around the World!

Backdoors, Government Hacking, and the Next Crypto Wars – Christopher Soghoian @ 30c3

In Archive, FBI, Malware, Surveillance, Technology on December 31, 2013 at 4:48 AM

12/29/2013

@csoghoian

Law enforcement agencies claim they are “going dark”. Encryption technologies have finally been deployed by software companies, and critically, enabled by default, such that emails are flowing over HTTPS, and disk encryption is now frequently used. Friendly telcos, who were once a one-stop-shop for surveillance can no longer meet the needs of our government. What are the FBI and other law enforcement agencies doing to preserve their spying capabilities?

The FBI is rallying political support in Washington, DC for legislation that will give it the ability to fine Internet companies unwilling to build surveillance backdoors into their products. Even without such legislation, the US government has started to wage war against companies that offer secure communications services to their users.

As the FBI’s top lawyer said in 2010, “[Companies] can promise strong encryption. They just need to figure out how they can provide us plain text.”

At the same time, law enforcement agencies in the United States and elsewhere are acquiring the tools to hack into the computers of their own citizens. The FBI has purchased custom-built software, while other law enforcement agencies in the US and elsewhere use off-the-shelf spyware from companies like Gamma and Hacking Team. Regardless of the software they use, the capabilities are generally similar: They can enable a computer’s webcam and microphone; collect real-time location data; and copy emails, web browsing records, and other documents.

Related Links:

Law Enforcement & Hacking: When Cops Control Your Webcam

To Protect and Infect: The Militarization of the Internet – Claudio Guarnieri, Morgan Marquis-Boire, Jacob Appelbaum @ 30c3

WikiLeaks: The Spy Files

Privacy International’s Surveillance Industry Index: 338 Vendors, 35 Countries, 1203 Documents, 97 Technologies

You Only Click Twice: FinFisher’s Global ProliferationFor Their Eyes Only: The Commercialization of Digital Spying

Mapping Hacking Team’s “Untraceable” Spyware / Hacking Team’s US Nexus

“Network Investigative Techniques”: Court Documents Show How FBI Uses Malware for Surveillance

FBI’s “Wireless Intercept & Tracking Team” Revealed in Declassified Documents

Law Enforcement Using Methods From NSA Playbook

  1. […] Backdoors, Government Hacking, and the Next Crypto Wars – Christopher Soghoian @ 30c3 Law Enforcement & Hacking: When Cops Control Your […]

    Like

  2. […] Christopher Soghoian, Principal Technologist, ACLU Related: Backdoors, Government Hacking, and the Next Crypto Wars – Christopher Soghoian @ 30c3 […]

    Like

  3. […] Backdoors, Government Hacking, and the Next Crypto Wars – Christopher Soghoian @ 30c3 […]

    Like

  4. […] Christopher Soghoian, Principal Technologist, ACLU (Related: Backdoors, Government Hacking, and the Next Crypto Wars – Christopher Soghoian @ 30c3) […]

    Like

  5. […] Backdoors, Government Hacking, and the Next Crypto Wars – Christopher Soghoian @ 30c3 […]

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: