Speculation over the existence of a back door in Skype!

on . Posted in Articles of Interest


VIENNA, Austria - July 25, 2008 - According to reports, there may be a back door built into Skype, which allows connections to be bugged. The company has declined to expressly deny the allegations. At a meeting with representatives of ISPs and the Austrian regulator on lawful interception of IP based services held on 25th June, high-ranking officials at the Austrian interior ministry revealed that it is not a problem for them to listen in on Skype conversations.


This has been confirmed by a number of the parties present at the meeting. Skype declined to give a detailed response to specific enquiries as to whether Skype contains a back door and whether specific clients allowing access to a system or a specific key for decrypting data streams exist. The response from the eBay subsidiary's press spokesman was brief, "Skype does not comment on media speculation. Skype has no further comment at this time." There have been rumors of the existence of a special listening device, which Skype is reported to offer for sale to interested states.

There has long been speculation that Skype may contain a back door. Because the vendor has not revealed details of its proprietary Skype protocol or of how the client works, questions as to what else Skype is capable of and what risks are involved in deploying it in an enterprise environment remain open.

Last week, Austrian broadcaster ORF, citing minutes from the meeting, reported that the Austrian police are able to listen in on Skype connections. Interior ministry spokesman Rudolf Gollia declined to provide a comment on the matter. He did, however, offer general comments on the meeting, which were, however, contradicted by other attendees.

In contrast to statements from the interior ministry, the meeting was not attended solely by technical staff; those present included lawyers, regulatory experts and staff at the regulator. Neither were the ministry representatives mere technicians, rather they were high-ranking officials in management positions. They demanded from the ISP representatives present an "Austrian industry solution" for accessing data traffic. They called for ISPs to allow the interior ministry to install network bridges and Linux computers in their network centers. These would be used to copy and filter data traffic and forward it to the interior ministry via an encrypted connection. To facilitate filtering, ISPs should assign fixed IP addresses to customers being monitored.

It was made clear that should ISPs oppose these demands, monitoring legislation would be revised at some future time-point to prescribe the use of the ETSI ES 201 671 Version 3.1.1. monitoring standard. This would be legally binding and would require significantly more time and effort and be more expensive to implement. The reason given for not updating the legislation right away was that, in view of the present absence of terrorist activity, it would not currently be possible to mobilize political support for such a move.

The officials are reported to have made clear that they were well aware that their monitoring plans would only catch the more gauche end of the criminal spectrum. Professionally organized criminals would utilize encryption algorithms that would not allow easy decryption.

It was also put about that two major ISPs had already succumbed to this pressure. The network bridges requested by the interior ministry have reportedly already been installed on their systems. Both companies, off the record, confirmed this. UPC/Inode was willing to "definitively deny" that a network bridge had been installed on its network and stated that there were also no plans to do so. Monitoring was carried out in individual cases only and only when instructed by a court order.

According to Mobilkom Austria, "the authorities have no access and will not be granted access." Likewise its fixed line affiliate, Telekom Austria. Mobilkom said that, in response to a court order, on a single occasion it stored the total data traffic for one customer over a number of days and forwarded it to the police. In such cases, the interior ministry now wants to replace the use of physical media, with the inevitable delays this entails, with an encrypted connection. ISPs will, however, remain responsible for separating the monitored data stream from overall traffic.

For reasons of redundancy, Mobilkom's network does not have a central point from which all traffic can be accessed. Because the plan has now been made public, the money-saving idea of assigning fixed IP addresses to customers who are to be monitored is unlikely to be able to be implemented. More expensive solutions are likely to be required, though it remains unclear who will bear the ensuing costs.

Eulogies

Eulogy for an Angel
1992-Dec. 20, 2005

Freedom
2003-2018

Freedom sm

My Father
1918-2010

brents dad

Dr. Stan Dale
1929-2007

stan dale

MICHAEL BADNARIK
1954-2022

L Neil Smith

A. Solzhenitsyn
1918-2008

solzhenitsyn

Patrick McGoohan
1928-2009

mcgoohan

Joseph A. Stack
1956-2010

Bill Walsh
1931-2007

Walter Cronkite
1916-2009

Eustace Mullins
1923-2010

Paul Harvey
1918-2009

Don Harkins
1963-2009

Joan Veon
1949-2010

David Nolan
1943-2010

Derry Brownfield
1932-2011

Leroy Schweitzer
1938-2011

Vaclav Havel
1936-2011

Andrew Breitbart
1969-2012

Dick Clark
1929-2012

Bob Chapman
1935-2012

Ray Bradbury
1920-2012

Tommy Cryer
1949-2012

Andy Griffith
1926-2012

Phyllis Diller
1917-2012

Larry Dever
1926-2012

Brian J. Chapman
1975-2012

Annette Funnicello
1942-2012

Margaret Thatcher
1925-2012

Richie Havens
1941-2013

Jack McLamb
1944-2014

James Traficant
1941-2014

jim traficant

Dr. Stan Monteith
1929-2014

stan montieth

Leonard Nimoy
1931-2015

Leonard Nimoy

Stan Solomon
1944-2015

Stan Solomon

B. B. King
1926-2015

BB King

Irwin Schiff
1928-2015

Irwin Schiff

DAVID BOWIE
1947-2016

David Bowie

Muhammad Ali
1942-2016

Muhammed Ali

GENE WILDER
1933-2016

gene wilder

phyllis schlafly
1924-2016

phylis schafly

John Glenn
1921-2016

John Glenn

Charles Weisman
1954-2016

Charles Weisman

Carrie Fisher
1956-2016

Carrie Fisher

Debbie Reynolds
1932-2016

Debbie Reynolds

Roger Moore
1917-2017

Roger Moore

Adam West
1928-2017

Adam West

JERRY LEWIS
1926-2017

jerry lewis

HUGH HEFNER
1926-2017

Hugh Hefner

PROF. STEPHEN HAWKING
1942-2018

Hugh Hefner 

ART BELL
1945-2018

Art Bell

DWIGHT CLARK
1947-2018

dwight clark

CARL MILLER
1952-2017

Carl Miller

HARLAN ELLISON
1934-2018

Harlan Ellison

STAN LEE
1922-2018

stan lee

CARL REINER
1922-2020

Carl Reiner

SEAN CONNERY
1930-2020

dwight clark

L. NEIL SMITH
1946-2021

L Neil Smith

JOHN STADTMILLER
1946-2021

L Neil Smith