Smartphone Encryption Frustrates Law Enforcement

Smartphone Encryption Frustrates Law Enforcement

smartphone encryption

This post is also available in: heעברית (Hebrew)

Many smartphones encrypt their contents when locked, as standard – a security feature that often prevents even the phones’ manufacturers from accessing data. Such encryption is different to end-to-end encryption, which prevents interception of communications on a large scale.

Agents at the US Federal Bureau of Investigation (FBI) have been unable to extract data from nearly 7,000 mobile devices they have tried to access, the agency’s director has said. Christopher Wray said encryption on devices was “a huge, huge problem” for FBI investigations. The agency had failed to access more than half of the devices it targeted in an 11-month period, he said in a conference.

Referring to the trade-off between cyber-security and investigative hacking, the FBI director said, according to bbc.com: “I get it, there’s a balance that needs to be struck between

encryption and the importance of giving us the tools we need to keep the public safe.”

Cyber-security expert Prof Alan Woodward at the University of Surrey said device encryption was clearly frustrating criminal investigations but it would be impractical and insecure to develop “back doors” or weakened security. “Encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies,” he said.

“Even if the equipment manufacturers didn’t build in such encryption it would be possible to obtain software that encrypted data in the same way.”

In 2016, the FBI asked Apple to unlock an iPhone used by San Bernardino California killer Syed Rizwan Farook during a mass shooting attack. Apple refused to unlock the phone, explaining that its phones had been designed so that even their manufacturer could not access them once encrypted. The FBI later said a third party firm had discovered a way of breaking into the device.