Telecommunications networks are special—they are designed to enable wiretapping. Mandates such as the Communications Assistance for Law Enforcement Act (CALEA) in the U.S. and similar requirements elsewhere effectively require that the network operator use equipment that contains surveillance hooks to answer government requests.
Nicholas Weaver is a senior staff researcher focusing on computer security at the International Computer Science Institute in Berkeley, California, and a lecturer in the Computer Science department at the University of California at Berkeley. All opinions are his own.
Subscribe to this Lawfare contributor via RSS.
Julian Assange had to be the worst houseguest an embassy ever encountered.
It has now been two weeks without confirmation of Bloomberg’s reporting concerning a supply chain attack targeting SuperMicro motherboards from any news outlet.
According to Jordan Robertson and Michael Riley in Bloomberg Businessweek, China has recently engaged in bulk supply-chain sabotage, corrupting thousands of servers on computers that end up in the server rooms of major U.S. companies such as Amazon or Apple, government systems and other locations around the planet.
On Aug. 4, as Venezuelan President Nicolas Maduro gave a speech in front of the ranks of the Venezuelan National Guard, two DJI Matrice M600 drones took to the sky. Each drone was armed with a little less than a kilogram of explosives, their operators seemingly intent on assassinating Maduro.
Glenn Greenwald released a photograph from the Snowden documents in May 2014 showing the National Security Agency covertly installing an implant in a Cisco router intercepted during shipping.
On May 13, the president tweeted:
President Xi of China, and I, are working together to give massive Chinese phone company, ZTE, a way to get back into business, fast. Too many jobs in China lost. Commerce Department has been instructed to get it done!