Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 14 submissions in the queue.
posted by takyon on Monday October 23 2017, @10:10PM   Printer-friendly
from the world's-tiniest-violin-ringtone dept.

FBI failed to access 7,000 encrypted mobile devices

Agents at the US Federal Bureau of Investigation (FBI) have been unable to extract data from nearly 7,000 mobile devices they have tried to access, the agency's director has said.

Christopher Wray said encryption on devices was "a huge, huge problem" for FBI investigations. The agency had failed to access more than half of the devices it targeted in an 11-month period, he said.

One cyber-security expert said such encryption was now a "fact of life". Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data. Such encryption is different to end-to-end encryption, which prevents interception of communications on a large scale.

Cyber-security expert Prof Alan Woodward at the University of Surrey said device encryption was clearly frustrating criminal investigations but it would be impractical and insecure to develop "back doors" or weakened security.

In a time when the government is committing criminal acts, is it not advisable for citizens to do what they can to protect themselves from that crime?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by urza9814 on Wednesday October 25 2017, @01:30PM

    by urza9814 (3954) on Wednesday October 25 2017, @01:30PM (#587354) Journal

    Not telling the whole story is exactly what I was thinking. They don't even have to be lying -- they're only saying they couldn't get into the phones, they aren't saying how hard they tried. "Tried to access" could be an agent hitting the unlock button and seeing if they get a password prompt.

    Are these phones that couldn't be accessed by their top IT security experts, or are these phones that couldn't be accessed by the field agent making the arrest? It's not like every single agent is an expert in cryptography. So how many do they bother to send for analysis? Probably not 100%. Maybe the 50% that get unlocked? Maybe only 1%, and 49% just have no security at all? Without that information this headline means nothing.

    Starting Score:    1  point
    Moderation   +1  
       Insightful=1, Total=1
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3