Apple's iMessage encryption trips up feds' surveillance
Source: CNET
Encryption used in Apple's iMessage chat service has stymied attempts by federal drug enforcement agents to eavesdrop on suspects' conversations, an internal government document reveals.
An internal Drug Enforcement Administration document seen by CNET discusses a February 2013 criminal investigation and warns that because of the use of encryption, "it is impossible to intercept iMessages between two Apple devices" even with a court order approved by a federal judge.
The DEA's warning, marked "law enforcement sensitive," is the most detailed example to date of the technological obstacles -- FBI director Robert Mueller has called it the "Going Dark" problem -- that police face when attempting to conduct court-authorized surveillance on non-traditional forms of communication.
When Apple's iMessage was announced in mid-2011, Cupertino said it would use "secure end-to-end encryption." It quickly became the most popular encrypted chat program in history: Apple CEO Tim Cook said last fall that 300 billion messages have been sent so far, which are transmitted through the Internet rather than as more costly SMS messages carried by wireless providers.
Read more: http://news.cnet.com/8301-13578_3-57577887-38/apples-imessage-encryption-trips-up-feds-surveillance
Maybe Apple should just give the feds full backdoor access, like Google and the big telecoms that sell Android do.
ret5hd
(20,482 posts)This looks like planned mininfo to to me.
ProgressiveProfessor
(22,144 posts)Dreamer Tatum
(10,926 posts)Apple.
Wow, dude. You are some piece of work.
Comrade Grumpy
(13,184 posts)awoke_in_2003
(34,582 posts)when Bush was in office. I guess it has gone out of style since our guy got in office.
Orsino
(37,428 posts)It's a low-tech device called a fucking warrant.
Comrade Grumpy
(13,184 posts)Berlum
(7,044 posts)cprise
(8,445 posts)I thought that was the whole reason for warrantless surveillance-- Its not easy enough to first obtain warrants so that cops can fuel their fishing expeditions.
If most people casually use strong encryption, then the police can't go on warrantless fishing expeditions against whoever they prefer to make a target this week.
bemildred
(90,061 posts)Our present LEO comunity is full of people who consider gathering evidence an onerous imposition.
cprise
(8,445 posts)Skype is not one of these apps, and they have been refusing questions from the computer press about whether they have put backdoors into their system. (The Feds used to complain about Skype, too, but not anymore.)
iMessage is no different than Skype in that its a proprietary, close source program. Therefore, it is an easy target for the US government to corrupt.
Here is a quick guide to OTR messaging:
https://ssd.eff.org/tech/im
Proletariatprincess
(718 posts)Bravo for Apple and down with the stupid, counter productive, criminally motivated Drugwar.
awoke_in_2003
(34,582 posts)and every other member of our police state
AndyTiedye
(23,500 posts)Use open-source encryption tools. They are free and can run on any kind of computer or smartphone.
If you want to make REALLY sure, inspect the source code and compile it yourself.
Carriers are required to provide lawful intercept. Skype would have been forced to give law enforcement a back door.
Apple is not a carrier, so that law does not apply to them. It is possible that they may have been persuaded to do it
anyway, someone would have to disassemble the code to find out.
hughee99
(16,113 posts)quadrature
(2,049 posts)nt
PSPS
(13,580 posts)Yes, even when we're compelled against our will to follow the law, says the thoroughly corrupt DEA.