Risking Communications Security: Potential Hazards of the Protect America Act

A new US law allows warrantless wiretapping whenever one end of the communication is believed to be outside national borders. This creates serious security risks: danger of exploitation of the system by unauthorized users, danger of criminal misuse by trusted insiders, and danger of misuse by government agents.

[1]  G. Hale,et al.  National Research Council , 1923, Journal of the American Institute of Electrical Engineers.

[2]  S. Resolution SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES , 1976 .

[3]  Matt Blaze,et al.  Protocol failure in the escrowed encryption standard , 1994, CCS '94.

[4]  F. Schneider Trust in Cyberspace , 1998 .

[5]  Susan Landau,et al.  Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 1998 .

[6]  Daniel J. Solove,et al.  Information Privacy Law , 2003 .

[7]  Corinna Cortes,et al.  Computational Methods for Dynamic Graphs , 2003 .

[8]  K. Leuven,et al.  Introducing Traffic Analysis Attacks , Defences and Public Policy Issues . . . ( Invited Talk ) , 2005 .

[9]  Richard Clayton,et al.  Anonymity and traceability in cyberspace , 2005 .

[10]  Susan Landau National Security on the Line , 2006, J. Telecommun. High Technol. Law.

[11]  E. Brickell,et al.  Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP , 2006 .

[12]  Diomidis Spinellis,et al.  The Athens Affair , 2007, IEEE Spectrum.

[13]  chearings Serial No. 110-21: Inspector General's Independent Report on the FBI's Use of National Security Letters: Hearing before the Committee on the Judiciary, U.S. House of Representatives, One Hundred Tenth Congress, First Session, March 20, 2007 , 2007 .

[14]  Kim-Kwang Raymond Choo Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition , 2008, The Computer Journal.