ISPs rush to enable online spies for police

 

Today is the last day for American ISPs, cable companies and some universities to install equipment that will make it easier for the police and intelligence agencies to monitor surfers' web habits.

Internet providers will have to comply from today with the Federal Communications Commission's expanded interpretation of the Communications Assistance for Law Enforcement Act passed in 1994.

The Act was originally designed to allow law enforcement agencies to monitor an individual's mobile phone calls, and has led to a dramatic increase in the tapping of mobile phones.

Five years ago the FCC successfully lobbied to have the Act extended to internet connections, and the courts agreed last June.

While the equipment ISPs have to install does not automatically monitor everyone continuously, it makes it much simpler for taps to be set up.

The new equipment should allow surveillance to begin almost immediately after a court order is issued.

Analysing the data can be done by the police or third parties, a move which has had privacy groups up in arms.

"VeriSign offers a legal intercept service to ISPs which requires the providers to pipe all their data to VeriSign," said the Electronic Frontier Foundation.

"Then the company's employees analyse the data, extract information relevant to the court order, and send it to law enforcement.

"This transaction leaves personal data potentially vulnerable when it travels from the service provider's network to VeriSign's. It also places the personal data of innocent people in the hands of a third party without customer consent."

Copyright ©v3.co.uk


ISPs rush to enable online spies for police
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1052

Vote