ISPs rush to enable online spies for police

 

Today is the last day for American ISPs, cable companies and some universities to install equipment that will make it easier for the police and intelligence agencies to monitor surfers' web habits.

Internet providers will have to comply from today with the Federal Communications Commission's expanded interpretation of the Communications Assistance for Law Enforcement Act passed in 1994.

The Act was originally designed to allow law enforcement agencies to monitor an individual's mobile phone calls, and has led to a dramatic increase in the tapping of mobile phones.

Five years ago the FCC successfully lobbied to have the Act extended to internet connections, and the courts agreed last June.

While the equipment ISPs have to install does not automatically monitor everyone continuously, it makes it much simpler for taps to be set up.

The new equipment should allow surveillance to begin almost immediately after a court order is issued.

Analysing the data can be done by the police or third parties, a move which has had privacy groups up in arms.

"VeriSign offers a legal intercept service to ISPs which requires the providers to pipe all their data to VeriSign," said the Electronic Frontier Foundation.

"Then the company's employees analyse the data, extract information relevant to the court order, and send it to law enforcement.

"This transaction leaves personal data potentially vulnerable when it travels from the service provider's network to VeriSign's. It also places the personal data of innocent people in the hands of a third party without customer consent."

Copyright ©v3.co.uk


ISPs rush to enable online spies for police
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 762

Vote