{"id":608,"date":"2004-12-22T00:00:00","date_gmt":"2004-12-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/22\/groups-fight-internet-wiretap-push\/"},"modified":"2021-12-30T11:37:47","modified_gmt":"2021-12-30T11:37:47","slug":"groups-fight-internet-wiretap-push","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/22\/groups-fight-internet-wiretap-push\/","title":{"rendered":"Groups fight Internet wiretap push"},"content":{"rendered":"<p>Companies and advocacy groups opposed to the FBI&#8217;s plan to make the Internet more accommodating to covert law enforcement surveillance are sharpening a new argument against the controversial proposal: that law enforcement&#8217;s Internet spying capabilities are just fine as it is.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In comments filed with the FCC, advocates with the Center for Democracy and Technology argue the government hasn&#8217;t offered any evidence that law enforcement agencies face obstacles in conducting Internet wiretaps under current regulations &#8212; which obligate ISPs and other companies to cooperate with court-authorized surveillance, but do not force them to retrofit their networks with special surveillance gear, as the government is asking.<\/p>\n<p>&#8220;In the absence of evidence of any problem, it is impossible for the Commission to act,&#8221; wrote CDT, representing a handful of technology companies, industry associations and advocacy groups, including the Computer and Communications Industry Association, Dialpad Communications, the Electronic Frontier Foundation, the Information Technology Association of America, and others.<\/p>\n<p>At issue is the 1994 Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates surveillance backdoors in U.S. telephone networks, allowing the FBI to start listening in on a target&#8217;s phone line within minutes of receiving court approval.<\/p>\n<p>At the same time the FCC ruled that &#8220;managed&#8221; Internet telephony providers like Vonage must also become wiretap friendly.<\/p>\n<p>The FCC opened the matter to public comment, specifically seeking guidance on some implementation details, including the issue of how much time to allow service providers to wire their networks for spying.<\/p>\n<p>But many of the flurry of comments that followed challenged the fundamentals of the FCC&#8217;s ruling, including the commission&#8217;s authority to expand CALEA to the Internet in the first place.<\/p>\n<p>http:\/\/www.securityfocus.com\/news\/10192<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-608","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=608"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/608\/revisions"}],"predecessor-version":[{"id":3095,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/608\/revisions\/3095"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}