A new method of communicating is creating intriguing services that beat old ways of sending information. But law enforcement makes a somber claim: These new networks will become a boon to criminals and terrorists unless the government can easily listen in.
This was the story line in the mid-1990s when then US president Bill Clinton's administration sought to have electronic communications encrypted only by a National Security Agency-developed "Clipper Chip," for which the feds would have a key.
The Clipper Chip eventually went the way of clipper ships after industry balked and researchers showed its cryptographic approach was flawed anyway. But while the Clipper Chip died, the dilemma it illuminated remains.
With each new advance in communications, the government wants the same level of snooping power that authorities have exercised over phone conversations for a century. Technologists recoil, accusing the government of micromanaging -- and potentially limiting -- innovation.
Today, this tug of war is playing out over the Federal Communications Commission's demands that a phone-wiretapping law be extended to voice-over-Internet services and broadband networks.
Opponents are trying to block the ruling on various grounds: that it goes beyond the original scope of the law, that it will force network owners to make complicated changes at their own expense, or that it will have questionable value in improving security.
No matter who wins the battle over this law -- the Communications Assistance for Law Enforcement Act, known as CALEA -- this probably won't be the last time authorities raise hackles by seeking a bird's eye view over the freewheeling information flow created by new technology.
Authorities are justified in trying to reduce the ways that technology helps dangerous people operate in the shadows, said Daniel Solove, author of The Digital Person.
But a parallel concern is that technology can end up increasing the government's surveillance power rather than just maintaining it.
"We have to ask ourselves anew the larger question: What surveillance power should the government have?" said Solove, an assistant professor at George Washington University Law School. "And to what extent should the government be allowed to manage the development of technology to embody its surveillance capability?"
Wiretapping -- so named because eavesdropping police placed metal clips on the analog wires that carried conversations -- has a complex legal history. A 1928 case, Olmstead v. United States, legitimized the practice, when the Supreme Court ruled it was acceptable for police to monitor the private calls of a suspected bootlegger. Behind that 5-4 ruling, however, a seminal debate was raging. The dissenting opinion by Justice Louis Brandeis argued, among other things, that the government had no right to open someone's mail, so why should a phone -- or other technologies that might emerge -- carry different expectations about privacy?
In 1967, as the dawn of the digital age was fulfilling Brandeis' fears that other forms of technological eavesdropping would become possible, the Supreme Court reversed Olmstead. After that, authorities had to get a search warrant before setting wiretaps, even on payphones.
That apparently hasn't been much of a hindrance. State and federal authorities have had 30,975 wiretap requests authorized since 1968, with only 30 rejections, according to the Electronic Privacy Information Center. Some 1,710 wiretaps were authorized last year, the most ever, with zero denied.
Since 1980, authorities also have been able to set secret wiretaps with the approval of the Foreign Intelligence Surveillance Court, which privacy watchdogs say requires a lower standard of evidence than the general warrant process. For the first two decades FISA orders numbered less than 1,000 annually; 2003 and 2004 each saw more than 1,700. Only four FISA applications have been rejected, all in 2003.
But technology began to pose obstacles in the 1980s. Suddenly some wiretaps had to become virtual, using "packet sniffing" programs that spy on the splintered packets of data that make up network traffic.
Congress passed CALEA in 1994, requiring telecom carriers to ensure that their networks left it relatively easy for law enforcement to set wiretaps. The law applied to landline and cell phone networks but essentially exempted the Internet.
The FBI also was developing Carnivore, a program that agents could tailor to grab specific e-mails and other Internet communications defined in a court order.
And all the while the NSA was harvesting the fruits of a system called Echelon, intercepting millions of international telephone calls and feeding them into the agency's humungous maw for analysis.
A Chinese freighter that allegedly snapped an undersea cable linking Taiwan proper to Penghu County is suspected of being owned by a Chinese state-run company and had docked at the ports of Kaohsiung and Keelung for three months using different names. On Tuesday last week, the Togo-flagged freighter Hong Tai 58 (宏泰58號) and its Chinese crew were detained after the Taipei-Penghu No. 3 submarine cable was severed. When the Coast Guard Administration (CGA) first attempted to detain the ship on grounds of possible sabotage, its crew said the ship’s name was Hong Tai 168, although the Automatic Identification System (AIS)
An Akizuki-class destroyer last month made the first-ever solo transit of a Japan Maritime Self-Defense Force ship through the Taiwan Strait, Japanese government officials with knowledge of the matter said yesterday. The JS Akizuki carried out a north-to-south transit through the Taiwan Strait on Feb. 5 as it sailed to the South China Sea to participate in a joint exercise with US, Australian and Philippine forces that day. The Japanese destroyer JS Sazanami in September last year made the Japan Maritime Self-Defense Force’s first-ever transit through the Taiwan Strait, but it was joined by vessels from New Zealand and Australia,
SECURITY: The purpose for giving Hong Kong and Macau residents more lenient paths to permanent residency no longer applies due to China’s policies, a source said The government is considering removing an optional path to citizenship for residents from Hong Kong and Macau, and lengthening the terms for permanent residence eligibility, a source said yesterday. In a bid to prevent the Chinese Communist Party (CCP) from infiltrating Taiwan through immigration from Hong Kong and Macau, the government could amend immigration laws for residents of the territories who currently receive preferential treatment, an official familiar with the matter speaking on condition of anonymity said. The move was part of “national security-related legislative reform,” they added. Under the amendments, arrivals from the Chinese territories would have to reside in Taiwan for
CRITICAL MOVE: TSMC’s plan to invest another US$100 billion in US chipmaking would boost Taiwan’s competitive edge in the global market, the premier said The government would ensure that the most advanced chipmaking technology stays in Taiwan while assisting Taiwan Semiconductor Manufacturing Co (TSMC, 台積電) in investing overseas, the Presidential Office said yesterday. The statement follows a joint announcement by the world’s largest contract chipmaker and US President Donald Trump on Monday that TSMC would invest an additional US$100 billion over the next four years to expand its semiconductor manufacturing operations in the US, which would include construction of three new chip fabrication plants, two advanced packaging facilities, and a research and development center. The government knew about the deal in advance and would assist, Presidential