A new method of communicating is creating intriguing services that beat old ways of sending information. But law enforcement makes a somber claim: These new networks will become a boon to criminals and terrorists unless the government can easily listen in.
This was the story line in the mid-1990s when then US president Bill Clinton's administration sought to have electronic communications encrypted only by a National Security Agency-developed "Clipper Chip," for which the feds would have a key.
The Clipper Chip eventually went the way of clipper ships after industry balked and researchers showed its cryptographic approach was flawed anyway. But while the Clipper Chip died, the dilemma it illuminated remains.
With each new advance in communications, the government wants the same level of snooping power that authorities have exercised over phone conversations for a century. Technologists recoil, accusing the government of micromanaging -- and potentially limiting -- innovation.
Today, this tug of war is playing out over the Federal Communications Commission's demands that a phone-wiretapping law be extended to voice-over-Internet services and broadband networks.
Opponents are trying to block the ruling on various grounds: that it goes beyond the original scope of the law, that it will force network owners to make complicated changes at their own expense, or that it will have questionable value in improving security.
No matter who wins the battle over this law -- the Communications Assistance for Law Enforcement Act, known as CALEA -- this probably won't be the last time authorities raise hackles by seeking a bird's eye view over the freewheeling information flow created by new technology.
Authorities are justified in trying to reduce the ways that technology helps dangerous people operate in the shadows, said Daniel Solove, author of The Digital Person.
But a parallel concern is that technology can end up increasing the government's surveillance power rather than just maintaining it.
"We have to ask ourselves anew the larger question: What surveillance power should the government have?" said Solove, an assistant professor at George Washington University Law School. "And to what extent should the government be allowed to manage the development of technology to embody its surveillance capability?"
Wiretapping -- so named because eavesdropping police placed metal clips on the analog wires that carried conversations -- has a complex legal history. A 1928 case, Olmstead v. United States, legitimized the practice, when the Supreme Court ruled it was acceptable for police to monitor the private calls of a suspected bootlegger. Behind that 5-4 ruling, however, a seminal debate was raging. The dissenting opinion by Justice Louis Brandeis argued, among other things, that the government had no right to open someone's mail, so why should a phone -- or other technologies that might emerge -- carry different expectations about privacy?
In 1967, as the dawn of the digital age was fulfilling Brandeis' fears that other forms of technological eavesdropping would become possible, the Supreme Court reversed Olmstead. After that, authorities had to get a search warrant before setting wiretaps, even on payphones.
That apparently hasn't been much of a hindrance. State and federal authorities have had 30,975 wiretap requests authorized since 1968, with only 30 rejections, according to the Electronic Privacy Information Center. Some 1,710 wiretaps were authorized last year, the most ever, with zero denied.
Since 1980, authorities also have been able to set secret wiretaps with the approval of the Foreign Intelligence Surveillance Court, which privacy watchdogs say requires a lower standard of evidence than the general warrant process. For the first two decades FISA orders numbered less than 1,000 annually; 2003 and 2004 each saw more than 1,700. Only four FISA applications have been rejected, all in 2003.
But technology began to pose obstacles in the 1980s. Suddenly some wiretaps had to become virtual, using "packet sniffing" programs that spy on the splintered packets of data that make up network traffic.
Congress passed CALEA in 1994, requiring telecom carriers to ensure that their networks left it relatively easy for law enforcement to set wiretaps. The law applied to landline and cell phone networks but essentially exempted the Internet.
The FBI also was developing Carnivore, a program that agents could tailor to grab specific e-mails and other Internet communications defined in a court order.
And all the while the NSA was harvesting the fruits of a system called Echelon, intercepting millions of international telephone calls and feeding them into the agency's humungous maw for analysis.
RETHINK? The defense ministry and Navy Command Headquarters could take over the indigenous submarine project and change its production timeline, a source said Admiral Huang Shu-kuang’s (黃曙光) resignation as head of the Indigenous Submarine Program and as a member of the National Security Council could affect the production of submarines, a source said yesterday. Huang in a statement last night said he had decided to resign due to national security concerns while expressing the hope that it would put a stop to political wrangling that only undermines the advancement of the nation’s defense capabilities. Taiwan People’s Party Legislator Vivian Huang (黃珊珊) yesterday said that the admiral, her older brother, felt it was time for him to step down and that he had completed what he
Taiwan has experienced its most significant improvement in the QS World University Rankings by Subject, data provided on Sunday by international higher education analyst Quacquarelli Symonds (QS) showed. Compared with last year’s edition of the rankings, which measure academic excellence and influence, Taiwanese universities made great improvements in the H Index metric, which evaluates research productivity and its impact, with a notable 30 percent increase overall, QS said. Taiwanese universities also made notable progress in the Citations per Paper metric, which measures the impact of research, achieving a 13 percent increase. Taiwanese universities gained 10 percent in Academic Reputation, but declined 18 percent
CHINA REACTS: The patrol and reconnaissance plane ‘transited the Taiwan Strait in international airspace,’ the 7th Fleet said, while Taipei said it saw nothing unusual The US 7th Fleet yesterday said that a US Navy P-8A Poseidon flew through the Taiwan Strait, a day after US and Chinese defense heads held their first talks since November 2022 in an effort to reduce regional tensions. The patrol and reconnaissance plane “transited the Taiwan Strait in international airspace,” the 7th Fleet said in a news release. “By operating within the Taiwan Strait in accordance with international law, the United States upholds the navigational rights and freedoms of all nations.” In a separate statement, the Ministry of National Defense said that it monitored nearby waters and airspace as the aircraft
UNDER DISCUSSION: The combatant command would integrate fast attack boat and anti-ship missile groups to defend waters closest to the coastline, a source said The military could establish a new combatant command as early as 2026, which would be tasked with defending Taiwan’s territorial waters 24 nautical miles (44.4km) from the nation’s coastline, a source familiar with the matter said yesterday. The new command, which would fall under the Naval Command Headquarters, would be led by a vice admiral and integrate existing fast attack boat and anti-ship missile groups, along with the Naval Maritime Surveillance and Reconnaissance Command, said the source, who asked to remain anonymous. It could be launched by 2026, but details are being discussed and no final timetable has been announced, the source