The FBI wants communications companies to create a back door so they can spy on Americans whenever they desire

The FBI is unhappy that there are communications technologies that it cannot intercept and wants to require that software makers and communications companies create a back door so they can listen in when they desire.
But a team of technology experts warns the move would hand over to the nation’s enemies abilities they are not capable of developing for themselves.
The Washington Post reported the issue is being raised by the FBI because “there is currently no way to wiretap some of these communications methods easily, and companies effectively.”
The solution, according to the FBI, is to fine companies when they fail to comply with wiretap orders, essentially requiring all companies to build a back door for wiretap capabilities into all their communications links.
“The importance to us is pretty clear,” FBI general counsel Andrew Weissman said in the report. “We don’t have the ability to go to court and say, ‘We need a court order to effectuate the intercept.’”
But a report by the Center for Democracy & Technology warns of unintended consequences.
“Wiretap functionality allows covert access to communications that can be exploited not only by law enforcement, but by criminals, terrorists, and foreign military and intelligence agencies,” the report said. “Wiretap endpoints will be vulnerable to exploitation and difficult to secure.”
It cited a report called “CALEA II: Risks of Wiretap Modifications to Endpoints.”
The report came just as the U.S. government was caught accessing telephone records for the Associated Press and describing a prominent Fox News journalist as a potential criminal.
It was compiled by high-profile leaders in the field such as Matt Blaze from the University of Pennsylvania, Edward Felten of Princeton, Matthew D. Green of Johns Hopkins and J. Alex Halderman of the University of Michigan.
The report said there are some drawbacks to expanding wiretap design laws to Internet services.
“Mandating wiretap capabilities in endpoints poses serious security risks,” the report said. “Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences for the economic well-being and national security of the United States.”
Just what kind of “serious consequences”?
CALEA is the Communications Assistance for Law Enforcement Act, which already requires some electronic surveillance possibilities. It’s the plan the FBI wants to expand to all digital forms of communication, including Skype and VoIP services.
“This proposal is a non-starter that would drive innovators overseas and cost American jobs,” Greg Nojeim, a senior counsel at the Center for Democracy and Technology, told the Post.
“They might as well call it the Cyber Insecurity and Anti-Employment Act.”
http://www.wnd.com/2013/06/now-fbi-wants-back-door-to-all-software/
CIA say's they'll spy on Americans using dishwashers and other smart appliances:
More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.
Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”
All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.
“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”
Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.
The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.
That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.
“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”
It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.
Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier.
http://www.wired.com/dangerroom/2012/03/petraeus-tv-remote/