Dear All,
This report in Ars Technica might be of interest to some in this list.

Regards,
Pranesh

-- 
Pranesh Prakash
Programme Manager
Centre for Internet and Society

T: +91 80 40926283
W: http://cis-india.org

---------
http://arstechnica.com/tech-policy/news/2009/02/eu-group-aims-to-eavesdrop-on-skype-calls.ars

EU group aims to eavesdrop on Skype calls

The EU's judicial coordination group says criminals are increasingly
turning to encrypted VoIP tools like Skype to evade surveillance???and
is launching an effort to ensure that European law enforcement can
listen in.
By Julian Sanchez | Last updated February 23, 2009 8:15 PM CT

As high-tech tools expand the ability of intelligence and law enforcement
agencies to sweep up and sort vast quantities of communications traffic,
European Union officials worry that encrypted Voice over IP technologies like
Skype are leaving criminals with a digital hole in the telecom dragnet. In a
[statement released this weekend][32], the Italian arm of the European Union's
judicial cooperation agency, Eurojust, announced it would lead an
international effort to "overcome the technical and judicial obstacles to the
interception of internet telephony systems."

   [32]: http://www.eurojust.europa.eu/press_releases/2009/20-02-2009.htm

The statement singled out Luxembourg-based Skype as presenting particular
problems, because "Skype's encryption system is a secret which the company
refuses to share with the authorities." Eurojust officials [told
reporters][33] that the new initiative comes at the request of Italian
authorities concerned that organized crime was resorting to encrypted Skype
communications to evade eavesdropping.

   [33]: http://www.goodgearguide.com.au/article/277460/skype_calls_immunity_p
olice_phone_tapping_threatened

Skype, however, disputes that characterization, saying that the company has
"extensively briefed" EU law enforcement agencies. "It's unfortunate that they
chose to release this report without contacting us," spokesman Brian
O'Shaughnessy told Ars, "because I think it's pretty clear that we have
capabilities and we have programs in place and they're aware of them."

O'Shaughnessy says that the company's policy is to cooperate with law
enforcement "where legally and technically possible." Last year, however,
Skype's director of corporate communications [told CNET][34] that it might
_not_ be technically possible in many cases. "We have not received any
subpoenas or court orders asking us to perform a live interception or wiretap
of Skype-to-Skype communications," Skype's Jennifer Caukin told the news site.
"In any event, because of Skype's peer-to-peer architecture and encryption
techniques, Skype would not be able to comply with such a request."

   [34]: http://news.cnet.com/8301-13578_3-9963028-38.html

That doesn't mean police are without recourse: in 2008, a German online
advocacy group called the Pirate Party [leaked documents][35] suggesting that
Bavarian authorities had employed (dubiously legal) trojan horse programs to
capture Skype conversations in the clear at the client's end. And [press
reports earlier this month][36] quoted anonymous sources suggesting that the
American National Security Agency has offered "billions" to hackers able to
provide back-door access to Skype. Of course, even if intelligence agencies
already enjoyed such access, it would be in their interest to promote the
impression that Skype calls were untappable.

   [35]: http://translate.google.com/translate?u=http%3A%2F%2Fwww.golem.de%2F0
809%2F62474.html&hl=en&ie=UTF-8&sl=de&tl=en

   [36]:
http://www.theregister.co.uk/2009/02/12/nsa_offers_billions_for_skype_pwnage/


#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mail.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: [email protected]

Reply via email to