A backdoor in all Internet products and services?

Why does your government want a backdoor in all popular Internet products and services? That’s like asking why a prostitute wants you to pay for her services, or why a politician wants a bribe (or is that a campaign contribution?).

A backdoor in all telecommunications devices and services is already made possible by CALEA, the Communications Assistance to Law Enforcement Act. (See also CALEA FAQ.) Now they want to step it up a notch and compel popular Internet companies and social networks like Facebook and Google to give law enforcement agencies real time monitoring capabilities of all online communication. It’s not enough that they can already get anything they want by just submitting a letter to these online services.

According to a Washington Post report, “a government task force is preparing legislation that would pressure companies such as Face­book and Google to enable law enforcement officials to intercept online communications as they occur.”

Joe Hall, a staff technologist at the Center for Democracy & Technology, said the “proposal has the potential to make our communications less secure,” because “once you build a wiretap capability into products and services, the bad guys will find a way to use it.”

That makes sense to me, but try telling that to a group that loves power. If this does not want you to always use Free Software services and applications, nothing will. And if these guys succeed in making this bad idea law, it will give service like Identi.ca an opportunity to be very popular, at least for folks like us.

Related Posts

The National Archives releases new version of file-identification software DROID On 7 March 2011, the National Archives launched the newest version of Digital Record Object Identification (DROID), an open source, file-identificatio...
Ubuntu Tweak: The first app to install on Ubuntu 13.10 Installing Ubuntu Tweak on Ubuntu 13.10 or any other supported version of Ubuntu gives you a simple utility that makes it very easy to customize diffe...
YotaPhone. Always-on dual screen, thicker than most, but not by much The YotaPhone is a smartphone from Yota Devices Ltd., a Russian company that also manufactures a portable LTE router called Ruby. YotaPhone is an ...
OPPO N1: CyanogenMod, Color ROM smartphone OPPO N1, CyanogenMod's smartphone, is the first original device specifically designed for the Android-based mobile OS. And it comes less than two week...
Open-Source Software Is Actually More Secure for Health Care IT Globally the sale of health care information systems is a multibillion dollar industry. The vast costs, frequent failed systems, and inability of syst...
Online Access With a Fingerprint A new service developed by a researcher at the University of Southampton makes it possible for users to maintain multiple online accounts using a scan...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


  1. SirBubbles

    Interesting that they want more powers, but they don’t properly use the powers they already have. In my mind, there’s nothing wrong with needing a court order before being required to hand over user info, or the equivalent of a “wiretap”.

    FYI, I don’t live in the U.S, I’m an Australian, but I don’t know what the situation even is here. We apparently were compelled to bring some of our laws “in line” with the U.S as part of our free trade agreement, so we’ve got some of the copyright and patent sillyness, but it’s not as eagerly pursued over here, and not as draconian yet, as far as I know.

  2. Mathematics will protect you! Encrypt everything you with a VPN that uses SSL encryption. Make sure that the VPN is truly private (i.e. separation between payment and support and usage) so that even a subpoena will not yield any useable information against you. Shop around and compare. Torrentfreak.com has a great comparison of VPN providers to get you started. Look into it today. Protect yourself and your family from government spies and potential prosecution in the future.

  3. Don’t the majority of social media services like Google and Facebook run on open source?

    Im all for bashing MS but this is seems more a political problem than a technical one.

    • They may run on “open source,” but their applications are proprietary. Note that I care or even want him to, but has Mark Zuck published the source code for Facebook?

  4. Law Enforcement also has unrestricted access to Skype and other Microsoft product’s, including but not limited to Windows.

    In my opinion, one of the two are logical:

    (a) Windows users are uninformed and/or ignorant.
    (b) Windows users have no expectation or need of privacy.

    As for me, I’ll stick to Linux. At least I can audit the code to and remove parts if some sneaky Politician pops some code in my binaries.

  5. Bob Robertson

    Not just “access”, not just “real time access”, but WARRANTLESS real-time access.

    Keep that in mind when you think about this. WARRANTLESS.

Leave a Comment

Your email address will not be published. Required fields are marked *