Chinese Access To AT&T/Verizon Wiretap System Shows Why We Cannot Backdoor Encryption

from the backdoors-can-be-opened-by-spies-too dept

Creating surveillance backdoors for law enforcement is just asking for trouble. They inevitably become targets for hackers and foreign adversaries. Case in point: the US just discovered its wiretapping system has been compromised for who knows how long. This should end the encryption backdoor debate once and for all.

The law enforcement world has been pushing for backdoors to encryption for quite some time now, using their preferred term for it: “lawful access.” Whenever experts point out that backdooring encryption breaks the encryption entirely and makes everyone less safe and less secure, you’ll often hear law enforcement say that it’s really no different than wiretapping phones, and note that that hasn’t been a problem.

Leaving aside the fact that it’s not even that much like wiretapping phones, this story should be thrown back in the faces of all of law enforcement folks believing that backdooring “lawful access” into encryption is nothing to worry about. Chinese hackers have apparently had access to the major US wiretapping system “for months or longer.”

A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests.

For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data, according to people familiar with the matter, which amounts to a major national security risk. The attackers also had access to other tranches of more generic internet traffic, they said.

According to the reporting, the hackers, known as “Salt Typhoon,” a known Chinese state-sponsored hacking effort, were able to breach the networks of telco giants Verizon and AT&T.

The Wall Street Journal says that officials are freaking out about this, saying that the “widespread compromise is considered a potentially catastrophic security breach.”

Here’s the thing: whenever you set up a system that allows law enforcement to spy on private communications, it’s going to become a massive target for all sorts of sophisticated players, from organized crime to nation states. So, this shouldn’t be a huge surprise.

But it should also make it clear why backdoors to encryption should never, ever be considered a rational decision. Supporters say it’s necessary for law enforcement to get access to certain information, but as we keep seeing, law enforcement has more ways than ever to get access to all sorts of information useful for solving crimes.

Putting backdoors into encryption, though, makes us all less safe. It opens up so many private communications to the risk of hackers getting in and accessing them.

And again, for all the times that law enforcement has argued for backdoors to encryption being just like wiretaps, it seems like this paragraph should destroy that argument forever.

The surveillance systems believed to be at issue are used to cooperate with requests for domestic information related to criminal and national security investigations. Under federal law, telecommunications and broadband companies must allow authorities to intercept electronic information pursuant to a court order. It couldn’t be determined if systems that support foreign intelligence surveillance were also vulnerable in the breach.

It’s also worth highlighting how this breach was only just discovered and has been in place for months “or longer” (meaning years, I assume). Can we not learn from this, and decide not to make encryption systems vulnerable to such an attack by effectively granting a backdoor that hackers will figure out a way to get into?

On an unrelated note, for all the talk of how TikTok is a “threat from China,” it seems like maybe we should have been more focused on stopping these kinds of actual hacks?

Filed Under: , , , , ,
Companies: at&t, verizon

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Chinese Access To AT&T/Verizon Wiretap System Shows Why We Cannot Backdoor Encryption”

Subscribe: RSS Leave a comment
37 Comments
That One Guy (profile) says:

If they cared about privacy and security they wouldn't be trying to break both

As much as this should be a huge warning for why mandating crippled encryption is a terrible idea the sad fact is that it’s not likely to change any minds because if those pushing for encryption to be broken cared about the privacy and security of the general public they wouldn’t be trying to mandate crippled encryption to begin with.

Arianity says:

On an unrelated note, for all the talk of how TikTok is a “threat from China,” it seems like maybe we should have been more focused on stopping these kinds of actual hacks?

So you’re saying we should maybe address potential security risks from China, before they actively exploit it? Perhaps we could do both.

Uriel-238 (profile) says:

Another tick for the simulation hypothesis

In sequence on my TD feed

Chinese Access To AT&T/Verizon Wiretap System Shows Why We Cannot Backdoor Encryption

and

EU’s Commission’s Anti-Encryption Plans On The Ropes (Again) After Rejection By The Dutch Gov’t

It’s almost as if I’m reading a cyberpunk dystopian story by Neal Stephenson.

Dan says:

Technically this isn’t a backdoor. Cellular connections are only encrypted on the wireless link. Once the signal is received by the BTS it is decrypted. It then moves through the wired portion of the network. Lawful intercept taps into audio in the wired portion of the network.

Ideally we’d have end to end encryption of the audio in phone calls. I’ve never seen any effort by 3GPP to achieve that.

Rocky says:

Re:

I have to ask, do you really think wiretaps are only used on cellular networks?

And it’s a backdoor if you engineer the function into the network for easy access, like you know, lawful intercept taps into audio in the wired portion of the network.

If this ease of access didn’t exist, the hackers wouldn’t have been able to use it to tap into the communications as easy as they did, could they?

Dan says:

Re: Re:

Lawful intercept is done in the core network which isn’t encrypted. Not even the control messages are encrypted (SS7 is very vulnerable).

The point was that it isn’t an encryption back door if only one part of the network is encrypted. And all communications are automatically decrypted when they enter the core network (everything behind the tower).

Anonymous Coward says:

Re: Re: Re:

Nobody stated this was an encryption backdoor. They stated that this is a communications intercept backdoor.

And then TD compared phone-based lawful intercept to the push for encryption lawful intercept because that’s what those who want encryption lawful intercept were doing — and this breach shows why it would be a horrible idea.

Anonymous Coward says:

Re:

Ideally we’d have end to end encryption of the audio in phone calls. I’ve never seen any effort by 3GPP to achieve that.

It’s not for them to solve. Legally, their hands are kind of tied; too many of the countries in which their standards are used have “lawful intercept” laws that make it explicitly illegal for telcos to provide end-to-end-encryption.

It’s usually not illegal to use end-to-end encryption (except maybe in France and China and an assortment of countries of minimal relevance). So, you could install some app; if the app-makers stopped trying to control the world and actually allowed for an open protocol, one might actually take over. Or Apple and Google could provide some encrypted voice-over-IP system, but until unlimited data is ubiquitous, I doubt it will replace voice calls (for which cheap unlimited plans are available, in many countries).

Rich Kulawiec says:

Pretty big "I told you so" moment

Quite a few people who actually built the Internet warned that this day was inevitable, but those warnings were dismissed as “naive” or “uninformed” or “anti-law enforcement”. Turns out, though, that the people who pulled the cables and wrote the code and built the systems were right.

Whenever something like CALEA is proposed, it’s always good to remember: “It’s a poor atom blaster that won’t point both ways.” (Isaac Asimov, “Foundation”)

Anonymous Coward says:

Re: Re:

Be grateful that the Clipper Chip was killed with fire (lest it regenerate). (See especially the technical vulnerabilities section of the wikipedia page for the chip.)

I have mixed feelings about that. Had Matt Blaze had the good sense to keep quiet about the vulnerability—which only compromised the backdoor, not the user’s privacy—we might have gotten used to the idea of encrypted phone calls. And then phone-makers could’ve started taking advantage of the flaw to close the backdoor, or could’ve used entirely different encryption chips, and what could the government have done? The legal requirements to use only backdoored crypto were struck down pretty quickly.

ECA (profile) says:

Not that it matters.

But the systems have been hacked for years. Its been known as it was Built into the system over time. And witht he installation of DIGITAL communications, it became abit easier.

Very easy to prove also. With Faked phone numbers and Scammers using them from around the world.
We dont even need to mention the time a USA gov. representative recorded the private backdoor into the system to record Private Un-encoded mdg. between nations leaders..Do we?

Anonymous Coward says:

Re:

You’re conflating things here. We’ve known that SS7 was compromised for years, especially with the US able to access all European and African SS7 data in an automated fashion. And we’ve known about the AT&T lawful intercept station for decades, so we’ve known that the domestic system was only as secure as that station.

The faked international exchanges and caller ID values are totally different, also insecure, components of the ITT telecoms system.

Just because it’s all insecure doesn’t mean it’s all the same thing; each of these flawed technologies has its own security implications when breached.

cashncarry (profile) says:

That's not what he said

I think you might have misread the article.

I think the argument Mike was making was that the people demanding “lawful access” to encrypted systems (via back-doors) are the same people who already have “lawful access” to telecommunications systems (wiretaps). They have been claiming that the wiretapping system has never been hacked as a justification for why they could also be trusted with back-doors into encrypted systems. That “never hacked” claim has just been proven to be false so their entire argument is destroyed.

Dan says:

Re:

They already knew that lawful intercept had been hacked. Because they did it.

A long time ago (20ish years) there were reports that telecom equipment sold to operators in other nations were used by NSA (or other three letter organization) for spying. They activated lawful intercept and listen to wired and cellular calls remotely. Without the knowledge of the foreign operator or foreign country.

Anonymous Coward says:

Re: Re:

“Surely brighter people than us can solve the issue such that traffic lights are always green for Law Enforcement, but have regular controls in place for everyone else!”

I’m not sure what you’re getting at with this comment. We have the technology for such traffic-light control. It’s deployed in a few areas near me—for the benefit of fire trucks rather than law enforcement, but that’s just a matter of configuration.

Anonymous Coward says:

Re: Re: Re:

Sure, but to get to a point where such intervention becomes necessary, you used to need extraordinary proof or a warrant or some similar procedure to merit such an override.

That process has been slowly chipped away because law enforcement increasingly thinks it can take a hammer to due process, on grounds that it thinks it is infallibly noble and altruistic and “the good guys” – despite NSA’s LOVEINT and all examples to the contrary. It will not surprise me in the slightest if similar requests be made for all industries to roll the red carpet out for law enforcement, regardless of ethics or practicality.

Anonymous Coward says:

Re: Re: Re:2

Sure, but to get to a point where such intervention becomes necessary, you used to need extraordinary proof or a warrant or some similar procedure to merit such an override.

I’m still not really seeing the comparison. What you write would generally be true for “lawful access” to encryption backdoors, in non-dystopian countries.

The traffic light systems, by contrast, often operate automatically, based on some communication between in-vehicle GPS, the dispatching system, and the city’s traffic control computers.

Anonymous Coward says:

A pessimist weighs in.

the US just discovered its wiretapping system has been compromised for who knows how long. This should end the encryption backdoor debate once and for all.

But it won’t.

  • Republicans take pride in their ignorance (“We may not know how many parts per million is bad, but we know when companies complain to us about safety regulations.”)
  • Republicans also demolished those institutions dedicated to providing congress with expert information (to give them the “but… I didn’t know” cover their ignorance demands). The ones that remain have been severely underfunded.
  • The Supreme Court demolished the Chevron Deference doctrine, pushing expert decisions from agencies back to a congress that has made itself ignorant.

So you’re expecting deliberately ignorant politicians to deliberately give up “Nerd Harder”?

Anonymous Coward says:

Re:

So you’re expecting deliberately ignorant politicians to deliberately give up “Nerd Harder”?

He said it’d end the debate, not that the government or politicians would do a thing about it.

But point taken. Ignorance for me, but not for thee has always been the privilege of the ruling class. Absolutely no lessons will be learned from this besides screaming at the tech sector for not protecting politicians from the consequences that they’d been repeatedly warned about.

Leave a Reply to Anonymous Coward Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Subscribe to Our Newsletter

Get all our posts in your inbox with the Techdirt Daily Newsletter!

We don’t spam. Read our privacy policy for more info.

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...