Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Monday October 23 2017, @10:10PM   Printer-friendly
from the world's-tiniest-violin-ringtone dept.

FBI failed to access 7,000 encrypted mobile devices

Agents at the US Federal Bureau of Investigation (FBI) have been unable to extract data from nearly 7,000 mobile devices they have tried to access, the agency's director has said.

Christopher Wray said encryption on devices was "a huge, huge problem" for FBI investigations. The agency had failed to access more than half of the devices it targeted in an 11-month period, he said.

One cyber-security expert said such encryption was now a "fact of life". Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data. Such encryption is different to end-to-end encryption, which prevents interception of communications on a large scale.

Cyber-security expert Prof Alan Woodward at the University of Surrey said device encryption was clearly frustrating criminal investigations but it would be impractical and insecure to develop "back doors" or weakened security.

In a time when the government is committing criminal acts, is it not advisable for citizens to do what they can to protect themselves from that crime?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by DeathMonkey on Tuesday October 24 2017, @06:15PM

    by DeathMonkey (1380) on Tuesday October 24 2017, @06:15PM (#586977) Journal

    Whenever you see the name "Clinton" on an internet forum you should take any statements of fact with a grain of salt.

    Bill Clinton banned the export of cryptographic techniques, on the basis that they were "arms". So, on the basis that I have the right to bear arms, I am encrypting everything.

    Surprise, you're wrong! [wikipedia.org]

    Since World War II, many governments, including the U.S. and its NATO allies, have regulated the export of cryptography for national security reasons, and, as late as 1992, cryptography was on the U.S. Munitions List as an Auxiliary Military Equipment.[2]

    Legal challenges by Peter Junger and other civil libertarians and privacy advocates, the widespread availability of encryption software outside the U.S., and the perception by many companies that adverse publicity about weak encryption was limiting their sales and the growth of e-commerce, led to a series of relaxations in US export controls, culminating in 1996 in President Bill Clinton signing the Executive order 13026[7] transferring the commercial encryption from the Munition List to the Commerce Control List. Furthermore, the order stated that, "the software shall not be considered or treated as 'technology'" in the sense of Export Administration Regulations. The Commodity Jurisdiction process was replaced with a Commodity Classification process, and a provision was added to allow export of 56-bit encryption if the exporter promised to add "key recovery" backdoors by the end of 1998. In 1999, the EAR was changed to allow 56-bit encryption and 1024-bit RSA to be exported without any backdoors, and new SSL cipher suites were introduced to support this (RSA_EXPORT1024 with 56-bit RC4 or DES). In 2000, the Department of Commerce implemented rules that greatly simplified the export of commercial and open source software containing cryptography, including allowing the key length restrictions to be removed after going through the Commodity Classification process.[8]

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2