Arguing Against CALEA - Schneier on Security

At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in today’s threat environment and should be rethought: In other words, while the legally-mandated CALEA capability requirements have changed little over the last three decades, the infrastructure that must implement and protect it has changed radically. This has greatly expanded the “attack surface” that must be defended to prevent unauthorized wiretaps, especially at scale. The job of the illegal eavesdropper has gotten significantly easier, with many more options and opportunities for them to exploit. Compromising our telecommunications infrastructure is now little different from performing any other kind of computer intrusion or data breach, a well-known and endemic cybersecurity problem. To put it bluntly, something like Salt Typhoon was inevitable, and will likely happen again unless significant changes are made...

Schneier on Security
A poignant reminder from @pluralistic of the toxic legacy left us by the Clinton administration. Does anyone seriously believe the Trump admin won’t weaponize #CALEA backdoors against political opponents? https://pluralistic.net/2024/10/07/foreseeable-outcomes/#calea
Pluralistic: China hacked Verizon, AT&T and Lumen using the FBI’s backdoor (07 Oct 2024) – Pluralistic: Daily links from Cory Doctorow

Misconfigurations in #GammaGroup's #FinFisher #FinSpy #Finsky sold as ' targeted investigations software ' but used by these #TransnationalCartels taking advantage of misconfigured & unaudited #UnlimitedClientLicenses, led to this #CALEA software configurations blocking their detection of their hacked #LEOCredentials being used.
👀
🔬
#LEO admins have not detected this spoofing of their own credentials used by this #Transnational criminal cartel either by being paid, a quid pro quo / leverage of said people, or just incompetence teaming up with willful ignorance (a deadly combination) using ( #Meta's #FacebookForums , a #KiwiFarm clone ) for use as a coordinated low to high profile #BreakingAndEntering heists & harassment #cult using #COINTELPRO & 🤝Cartel like stalking techniques & campaigns before, during & after the pandemic, for the past 19+ years.

This misconfigured client targeting investigations software is being used for illegal #MassSuveillence, unchecked & #unaudited, & is currently _not audited_ nor reviewable for #LicenseAndRegistration checking, as a perfect cover for this #Transnational #UnlimitedClientInstalls & targeting proxies which is installed from the #appleappstore & #GooglePlayStore.

#TransnationalCrimeSyndicate, a #KiwiFarmsClone site called #Meta in #infosec #CALEA #masssurveillance #investigations #infosec #kakistocracy #RTNDA #BreakingNews #news

@mttaggart It is impossible for this not to be abused by criminals and enemy spies. Talk sense into your Members of Parliament, urgently, #UK citizens.

It's like they learned nothing from #SaltTyphoon breaching the #CALEA network. It's quite possible they learned exactly the wrong lesson from the use of #NSO spyware against the political opponents in Poland.

@samirx @TechCrunch

It's for mass surveillance, use of felons coordinating of Meta to target someone for assaults/murder/theft type targeting, physical property theft ( like WaterGate), breaking & entering coordination, targeting by gps the targeting of vehicle car wrecks, etc, as a used by felons type of non-law enforcement kind of thing in the #CALEA #CALEAGreyMarket, when used against ' the press ' or anyone else they target.

#GammaGroup #FinFisher #FinSpy #Finsky

#Meta #GangStalkers & use this software.

It's installed via #GooglePlayStore & #AppleAppStore with #MITM targeting as well as with a phone call or text message from an infected device.
#StateSponsoredMalware

Currently there are some REALLY misconfigured #GammaGroup clients which when called will infect EVERYTHING from you phone to your computer to tablet. It's basically digital rape & slavery. Basically.

Luckily on #Android OS it's super easy to detect without software because it is so overt, not covert.

#RTDNA #infosec #StateSponsoredMalware

#NSOGroup & #GammaGroup are the most commonly used varieties in USA.

BOLO for #OfficerProxy

#OfficerProxy has been known to hide #IdentityTheftRings & #GangStalkers using #OfficerProxies access to this #CALEA #StateSponsoredMalware access to #GammaGroup's #FinFisher #FinSpy #Finsky #malware by #FacebookGroups organizing their targeted #IdentityTheft using #FakeProfiles of their targets.

Be aware that some #OfficerProxies are getting thousands of dollars of ' kickbacks for access ' for their criminal #Facebook leverage #OrganizedCrimeRings in multiple states and cities.

#InternalAffairs #investigations

#infosec #Fortune1000 #CorporateEspionage #CISO #TCPDUMP #MetaUsers 👨‍⚖️👩‍⚖️⚖️👮

Trump Disbands Cybersecurity Board Investigating Massive Chinese Phone System Hack (“the worst hack in US history”).

> While some have speculated that this move is an attempt to cover up the extent of the breach or even deliberately assist the Chinese, a more likely explanation is simple incompetence

https://www.techdirt.com/2025/01/23/trump-disbands-cybersecurity-board-investigating-massive-chinese-phone-system-hack/

#calea #csrb

Trump Disbands Cybersecurity Board Investigating Massive Chinese Phone System Hack

For all the hype and warnings about how TikTok is clearly a “national security threat” from China, the Trump administration has effectively kneecapped the investigation into one of the most serious…

Techdirt

You know you can dedicate an #AI to #DataMine a #DomesticTerrorist via pervasive #surveillance & actively #harrass them via #FeedbackLoops illegally, since, forever ago, right?

Best believe that the 1975 #ChurchCommittee ( Next Door, perhaps? 🤔) propagandist who #targets with their #FakeBook #IdentityTheftAccounts at #Meta can be reviewed. 🔬👀

#NatSec #CALEA #malware