Scientist urges new look at government 'Web-tapping'

Dec 02, 2008

The technology of government surveillance has changed dramatically, and the rules governing surveillance should be changed accordingly. Chris Bronk, a fellow in technology, society and public policy at Rice University's Baker Institute for Public Policy, makes that argument in a paper published in First Monday, a free, openly accessible, peer–reviewed journal devoted to the Internet.

The article, "Web-tapping: Securing the Internet to Save Us From Transnational Terror?," appears in the November issue, firstmonday.org/htbin/cgiwrap/… hp/fm/issue/view/271.

The concept of wiretapping is obsolete, Bronk said, because Voice over Internet Protocol (VoIP) allows two-way voice communications over the Internet. "Effective wiretapping," Bronk wrote in the article, "is Web-tapping, listening to (and reading and watching) everything transmitted in digital form."

Bronk traced the evolution of eavesdropping from attaching a listening device to a telephone wire to computer-enabled listening to efforts to monitor the latest Internet communications. Technological progress, according to Bronk, often leaves government snoops playing catch-up.

"For an intelligence establishment created to pull back the veil and peer inside the Iron Curtain when human spy networks were rolled up with surprising ease by Soviet counterintelligence forces, the new tasking is to watch, read and listen for cues emanating from al-Qaida and its regional franchises, largely on the Internet," he said.

In addition to tracking potential threats, Bronk noted, U.S. officials are also charged with defending cyberspace from infiltration. "If scanning the digital communications of the world's telecommunications grid for actionable intelligence information isn't enough work for any government agency, then protecting that telecommunications grid along with every important piece of national infrastructure connected to it fills the plate considerably," Bronk wrote. He advocates an update of that aspect of communications law as well.

The U.S. government has been debating how best to protect its interests in cyberspace for more than a decade, Bronk wrote. Much of that debate remains classified, but Bronk described the challenge as "establishing firm boundaries for the cyberinitiative, a secret mandate that ostensibly covers potentially immense quantities of unclassified data." Bronk questioned whether it covers all government networks. "What about those of contractors or subcontractors? How about those of the companies who create computer hardware and software purchased off-the-shelf by government agencies?"

Bronk said the current debate on government surveillance is "bogged down in descriptive terminology from another time, nearly a century old." Regardless of what direction any new legal framework takes, clear, openly stated policies adapted to the latest technology are needed, Bronk said. "With skepticism of government in the United States clearly part of the political terrain, the wiretapping/information-security issue requires greater scrutiny, albeit in a manner that does not compromise the all-important sources and methods of intelligence collection or cyberdefense," he wrote.

Source: Rice University

Explore further: Local media have positive slant toward local businesses, Rice University expert finds

add to favorites email to friend print save as pdf

Related Stories

Baker Institute paper looks at electronic money trail

Aug 31, 2011

A dramatic growth in technologies, combined with older methods of money transfers, has helped create new opportunities for criminals to cover their financial tracks. A new report by Rice University's Baker Institute for Public ...

'What if?' scenario: Cyberwar between US and China in 2020

Mar 23, 2011

As Iran's nuclear plant attack and Chinese-based hackers attacking Morgan Stanley demonstrate how the Internet can wreak havoc on business and governments, a new paper by a fellow at Rice University's Baker Institute for ...

Recommended for you

Barclays to allow payments by using Twitter handles

Feb 27, 2015

The next chapter in banks moving into the digital age is a stretch beyond reminding customers over phone lines that they can also bank online. Barclays has launched Twitter payments through Pingit.

QR codes engineered into cybersecurity protection

Feb 27, 2015

QR, or Quick Response, codes – those commonly black and white boxes that people scan with a smartphone to learn more about something – have been used to convey information about everything from cereals ...

Australian laws on storing phone, Internet records to change

Feb 27, 2015

(AP)—A parliamentary committee on Friday recommended a major rewrite of draft laws that would force Australian telcos and Internet providers to store customers' personal data for the convenience of law enforcement agencies. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.