By Jake Edge
September 11, 2013
A paper
presented at the Privacy Law
Scholars Conference in June asks an interesting question: what
are the implications of allowing law enforcement to use existing
vulnerabilities to wiretap the internet? In some sense, current events
have outrun the paper's focus as we now know that the NSA has been using
vulnerabilities in its quest for every last bit of internet traffic, but
there are legitimate questions raised by the paper. If, someday, the US
returns to the idea of actual oversight of domestic (at least) internet
surveillance, it will be worth considering the tradeoffs described in the
paper.
The paper starts by pointing out that critics of the Communications
Assistance for Law Enforcement Act (CALEA), which mandated wiretap-friendly
interfaces for telephony equipment, were fully justified by later events.
Those interfaces were illegally used in a number of different ways,
including wiretapping
a large number of Greek politicians in 2005.
Extending CALEA to the internet, which is something the FBI has been
advocating, will predictably lead to similar abuses, so it is worthwhile to
look at alternatives.
The authors, Steven M. Bellovin, Matt Blaze, Sandy Clark, and Susan Landau,
instead propose that the FBI be authorized to use existing
vulnerabilities for wiretapping. Rather than requiring vendors to insert
vulnerabilities into their code so that the FBI can wiretap voice-over-IP
(VoIP) and other communications, just recognize that there are already
vulnerabilities available that allow the required access. But, there are a
number of consequences—along with ethical questions—that stem from allowing
that behavior.
The wide-ranging paper covers a lot of ground. Some of the more
interesting technical discussion has to do with vulnerabilities
themselves. The authors' argument, essentially, is that there will always be
vulnerabilities available that will allow the capabilities needed by law
enforcement. It is simply a matter of finding or obtaining them, then
using them against the target for whom a warrant has been issued. Even if
a CALEA-style law were passed for internet communications, they argue,
there would still be a need for vulnerability-based wiretapping. There is
existing software that doesn't implement the interfaces and targets may be
using end-to-end encryption, for example.
But in order to gain access to the "right" vulnerabilities for the target
(which would need to be determined by some kind of "technical
reconnaissance"), the FBI would need to access the vulnerability "black
market". Since the goal of wiretapping is different than that of typical
attackers, any exploit would likely need to be modified to have a
"wiretapping payload" rather than the usual spambot, remote-access, or
credential-stealing payloads. There is, in short, quite a bit of work that
would need to be done before bits of VoIP data start flowing to the cops.
From what we know now, it would be far easier to just ask the NSA.
But, assuming the NSA option closes down at some point, the ethical
dilemmas surrounding this whole idea still pose some significant hurdles.
For example, if the FBI knows about a highly useful vulnerability that is
also being exploited by botnet herders or other criminals, will it report
the hole? Or if a company is about to release an update that closes a hole
being actively used, will pressure be applied to delay (or subvert) the
release? How does the FBI ensure that its wiretapping tools aren't
disseminated to the underworld? There are, of course, plenty more
questions beyond just those.
Overall, it is an interesting quandary. On the one hand, routing around a
"CALEA for the internet" is certainly attractive. The harm to both
innovation and privacy that could be caused by such legislation is huge.
On the other hand, though, turning the FBI and other law enforcement
organizations into players on the malware stage has its own set of
dangers. The authors conclude that those dangers (or "uncomfortable
issues" as they call them) are less of a concern than the legislative
solution. Unfortunately for all of us, legislators and law enforcement
rarely grasp the idea that there might be solutions outside of new laws.
In fact, the NSA revelations may have shown an entirely different way to
operate without any new laws.
(
Log in to post comments)