U.S. To Seek Broad Wiretap Laws for Internet
						September 27, 2010
						
		Share this post
9 Comments

Law Bytes
Episode 247: My Senate Appearance on the Bill That Could Lead to Canada-Wide Blocking of X, Reddit and ChatGPT
byMichael Geist

October 27, 2025
							Michael Geist
					October 20, 2025
							Michael Geist
					October 6, 2025
							Michael Geist
					September 22, 2025
							Michael Geist
					September 15, 2025
							Michael Geist
					Search Results placeholder
Recent Posts
 We Need More Canada in the Training Data: My Appearance Before the Standing Committee on Canadian Heritage on AI and the Creative Sector We Need More Canada in the Training Data: My Appearance Before the Standing Committee on Canadian Heritage on AI and the Creative Sector
 The Law Bytes Podcast, Episode 247: My Senate Appearance on the Bill That Could Lead to Canada-Wide Blocking of X, Reddit and ChatGPT The Law Bytes Podcast, Episode 247: My Senate Appearance on the Bill That Could Lead to Canada-Wide Blocking of X, Reddit and ChatGPT
 The Law Bytes Podcast, Episode 246: Mohamed Zohiri on the Rise and Emerging Regulation of Stablecoins The Law Bytes Podcast, Episode 246: Mohamed Zohiri on the Rise and Emerging Regulation of Stablecoins
 Senate Bill Would Grant Government Regulatory Power to Mandate Age Verification For Search, Social Media and AI Services Accompanied By Threat of Court Ordered Blocking of Lawful Content Senate Bill Would Grant Government Regulatory Power to Mandate Age Verification For Search, Social Media and AI Services Accompanied By Threat of Court Ordered Blocking of Lawful Content
 Government Reverses on Bill C-2: Removes Lawful Access Warrantless Demand Powers in New Border Bill Government Reverses on Bill C-2: Removes Lawful Access Warrantless Demand Powers in New Border Bill

Oh this is rich. They basically want to change how the entire Internet functions. Yeah, good luck with that boys.
“”And their envisioned decryption mandate is modest, they contended, because service providers — not the government — would hold the key. “”
This is just a hilarious line to hear from the bureau issuing “National Security Letters” rather than classic subpoenas.
The real target here is US citizens, not criminals/terrorists.
Criminals/terrorists will be secure using their own home-brew encryption technologies. Meanwhile, law-abiding citizens who use this new “government-authorized” encryption technologies will be less secure from criminals/terrorists due to the required introduction of a back-door (even though supposedly only usable by the government). It’s a step backwards for US security.
It *could* however be useful to the GOP for suppressing political dissent. Mostly though, this is a political move to grab votes from the right-wing demographic.
Misleading Headline
Legal intercept authority exists under CALEA. There is also the ongoing illegal wiretapping started under prior administration. What is new is the requirement to break *all* encryption, a priori. (At least the UK makes it a crime to not provide your key on demand.)
@AC – likely, the intent all along is for US law enforcement to “compromise” and “grudgingly” accept the UK law.
…
This will herald in the age of the end of Internet privacy. 1984 is getting closer and closer. Soon enough, big brother will indeed be watching. This is simply the first step toward making the private use of encryption illegal, such as it is in China. EVERYTHING will be tracked. This has HUGE future implications for e-business. It’s corporatist, facist thinking…put the entire population at risk to try and catch the 1 person in a million who is a bad seed…who is probably smart enough to evade such tracking techniques. If demanded, what happens if you refuse to give up your encryption key? They can thow you in jail indefinately as a suspected terrorist… Realistically, we all know that even if the driving force is terrorism, so they say, the primary use will end up being commercial and civil enforcement of illegal file sharing. The American way…cow-tow to big business, sue everyone, and ask questions later!!! It’s a step in the wrong direction, forever entrenching out of date business models!!!
I can see the **AAs foaming at the mouth in anticipation, even more so than the army of hackers and identity theifs that will have a field day with this. Governments really don’t have a clue!!!
How do you break encryption?
How are they supposed to intercept email traffic if the email is encrypted using PGP, or even more secure, one time pads. As Jim R said, in the UK they can arrest you for not handing over the encryption key. However, I don’t know how that would work in the US, as it would be similar to saying you have to testify against yourself. It would essentially remove your “right to remain silent”. There isn’t really a precedent for anything like this in legal history. Historically, if they wanted into your locked vault, and you didn’t want to give them the key, they could just break it with brute force. This becomes almost, if not completely impossible once you consider that the locked vault may be an encrypted file. I can understand why they are clamouring around trying to come up with solution. There is much evidence that can be gained to put real criminals in jail, if they had the ability to read internet traffic, However, I think they are going in the wrong direction, as they are likely to catch a lot of petty thieves, and the more dangerous/sophisticated criminals will just use unbreakable encryption.
Re: How do you break encryption?
Eric, you may be surprised to learn that there is at least one piece of Canadian legislation where there is no need for a warrant, and that there is a requirement for you to assist in the investigation of yourself (save for private dwellings). See the Firearms Act of 1995, section 102.1 (warrantless inspection) and section 103.
The slope is very slippery.
…And so it shall be…
Congress passed the bill.
http://www.crikey.com.au/2010/10/01/the-internet-filter-coming-to-the-us-with-barely-any-dissent/