Leiden Law Blog

Wiretapping Internet Communications

Wiretapping Internet Communications

An important report from the Dutch governmental judicial organization ‘WODC’ (Research and Documentation Centre) about wiretapping was published yesterday. For this report I wrote about ‘the possibilities and limitations of wiretapping internet communications' (.pdf (in Dutch)). In this blog post I will give a brief overview of my research findings. Some readers might be surprised that Internet communications can be legitimately wiretapped, but what might surprise even more is that this  relatively new investigatory technique is rapidly getting less effective with regard to the interception of the contents of data sent over the Internet.

Workings of an internet wiretap

More and more people are communicating with each other by using the Internet. Not only are most telephones connected over the Internet, many people use alternative ways to communicate via the Internet. Think of modern services like Skype, Whatsapp, e-mail and the sending of private messages through chat programs and other services. It is important for investigative authorities to be able to wiretap the content of certain information or messages that is sent over the Internet during criminal investigations. The intercepted internet traffic can hold important (mostly indirect) evidence. Intercepting the content of this data is however more of a challenge than intercepting telephone conversations.

In practice, internet traffic data is usually intercepted at the Internet Service Provider, more specifically at the ‘access provider’. Access providers provide internet connections for their clients. All incoming and outgoing traffic of a certain IP address is intercepted and this can be analyzed and made visible by law enforcement authorities. This means that for example search terms in Google are visible to the investigative authorities and also chat conversations that are sent unencrypted over the Internet through programs (like MSN Messenger), or private messages send through certain apps (such as Whatsapp) or the communications through certain social media services (such as Hyves). The problem is that only unencrypted traffic can be made visible by law enforcement agencies.

Encryption and mobile devices

Lately, more and more online services began using certain encryption. Sometimes the use of encryption for internet services is an option for users (like with Facebook and Hotmail) and sometimes it is standard (when using Twitter or Gmail for instance). In this context, encryption scrambles data so that the content of the intercepted data from a certain IP address cannot be made visible by law enforcement. For example, it is suspected investigative authorities are unable to decrypt ‘telephone conversations’ that are send over Skype. Internet users can also make the conscious decision to use strong encryption in their communications, for example by using the e-mail program ‘Pretty Good Privacy’. In addition, the possibilities of wiretapping internet connections is undermined by mobile devices that connect to the Internet (using WiFi connections for example). Many people use different Internet connections in a single day and since wiretaps can only be placed at specific IP-addresses, it is often impossible to intercept all communications.

Possible solutions

A solution would be to intercept traffic from internet communication service providers. However, it is unclear for many of these services if they fall under the broad definition of ‘public telecommunications service provider’ in our Telecommunications law. But even if they do, it’s often impossible to enforce our laws, because their main offices are situated in territories outside of the Netherlands. The Dutch government could take action and provide more clarity about which services fall under the definition of a ‘public telecommunications provider’ and force them to facilitate in wiretapping (at least with regard to services within the Dutch territories). An obligation to wiretap involves costs and privacy implications. Some internet communication services might not be able to comply with the obligation or it might create too much of a burden which impedes on innovation.

Not all is lost for law enforcement authorities however. Besides the availability of many other investigative powers to collect useful information about suspects and their internet communications, law enforcement can still deduce important data from so called ‘traffic data’ of wiretaps. This information shows for example at which time (and place to a certain extent) a suspect connects to computers. A wiretap might show a suspect using an anomization service or connecting to a service such as Gmail in the United States. This information may provide important leads for law enforcement.


In short, the effectiveness of internet wiretaps deteriorated over the last decade due the increased use of encryption and mobile internet. At the same time the necessity of wiretapping Internet communications increased, because many people started using different means of communication besides telephones. Before amendments are made to wiretapping laws in order to wiretap on more services, it must be considered whether those amendments are absolutely necessary and what consequences it might have for privacy en innovation.

1 Comment

Posted by Lubosdaf on August 22, 2017 at 05:35

Hello there, just became alert to your blog through Google, and found that it is truly informative. I am going to watch out for brussels. I will appreciate if you continue this in future. A lot of people will be benefited from your writing. Cheers!

<a >purchase zetia 10 mg</a>
<a >purchase zocor</a>
<a >buy zyban online</a>
<a >purchase altace</a>
<a >purchase paxil</a>
<a >purchase effexor</a>
<a >cheap celexa 20 mg</a>
<a >buy generic lexapro 20 mg</a>
<a >buy generic celebrex</a>
<a >propecia 1 mg cost</a>
<a >buy generic avandia 4 mg</a>
<a >purchase avandia</a>
<a >buy levaquin</a>
<a >zithromax price</a>
<a >buy zithromax 250 mg</a>
<a >buy generic keflex 500 mg</a>
<a >zetia 10 mg low price</a>
<a >achat Baclofen</a>
<a >buy zovirax</a>
<a >acheter zovirax en ligne</a>
<a >Acyclovir pillen apotheke online</a>
<a >Acyclovir basso prezzo</a>
<a >comprar genérico Acyclovir</a>
<a >discount Acyclovir</a>
<a >zovirax bas prix</a>
<a >Acyclovir preiswert</a>
<a >ordine zovirax online</a>
<a >farmacia online zovirax</a>
<a >buy Proventil</a>
<a >Combivent bas prix</a>
<a >bestellen Proventil online</a>
<a >comprare pillole online Albuterol</a>
<a >orden Combivent</a>
<a >bestellen Albuterol</a>
<a >discount Alendronate sodium</a>
<a >acheter fosamax</a>
<a >fosamax preis online</a>
<a >comprare generico fosamax</a>
<a >comprar fosamax</a>
<a >order Fexofenadine</a>
<a >elavil low price</a>
<a >au rabais elavil</a>
<a >kaufen Amitriptyline</a>
<a >comprare pillole online elavil</a>
<a >barato elavil</a>
<a >purchase Amlodipine</a>
<a >commande norvasc</a>
<a >Amlodipine preis online</a>
<a >Amlodipine medica farmaci</a>
<a >Amlodipine precio bajo</a>
<a >order Amoxicillin online</a>
<a >amoxil bas prix</a>
<a >bestellen amoxil online</a>
<a >ordine Amoxicillin</a>
<a >descuento Amoxicillin</a>
<a >amoxil cost</a>
<a >Amoxicillin bas prix</a>
<a >bestellen medikamente Amoxicillin</a>
<a >ordine amoxil</a>
<a >comprar Amoxicillin online</a>
<a >order amoxil online</a>
<a >orden Arimidex</a>
<a >Antibiotics information</a>
<a >Antibiotics bactericidal</a>
<a >Tetracyclines bacteriostatic</a>
<a >penicillins chloramphenicol</a>
<a >antibiotic laboratory trial</a>
<a >Penicillin review</a>
<a >Erythromycin tablets</a>
<a >Azithromycin information</a>
<a >Tetracycline antibiotics</a>
<a >Amoxicillin</a>
<a >order Ashwagandha</a>
<a >discount atarax</a>
<a >purchase strattera</a>
<a >pharmacie acheter Atomoxetine</a>
<a >billige Atomoxetine</a>
<a >ordine strattera online</a>
<a >barato strattera</a>
<a >Atomoxetine pillen apotheke online</a>
<a >Atorvastatin pastillas online</a>
<a >discount augmentin</a>
<a >order augmentin</a>
<a >avodart precio bajo</a>
<a >Azithromycin low price</a>
<a >pharmaci

Add a Comment

Name (required)

E-mail (required)

Please enter the word you see in the image below (required)

Your own avatar? Go to www.gravatar.com

Remember me
Notify me by e-mail about comments