{"id":24560,"date":"2014-07-05T02:43:33","date_gmt":"2014-07-05T06:43:33","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24560"},"modified":"2014-07-05T02:43:33","modified_gmt":"2014-07-05T06:43:33","slug":"crypto-thwarts-tiny-minority-of-feds-snooping-efforts","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/crypto-thwarts-tiny-minority-of-feds-snooping-efforts.php","title":{"rendered":"Crypto thwarts TINY MINORITY of Feds&#8217; snooping efforts"},"content":{"rendered":"<p><p>        The Essential Guide to IT Transformation  <\/p>\n<p>    US government court-sanctioned wiretaps were sometimes defeated    by encryption, according to     official figures on law enforcement eavesdropping released    this week.  <\/p>\n<p>    State police were unable to circumvent the encryption used by    criminal suspects in nine cases last year, while plain text was    recovered in 32 of 41 cases where use of cryptography was a    factor last year. By comparison, law enforcement was stymied by    crypto in four cases during 2012.  <\/p>\n<p>    Prior to two years ago, crypto had never prevented cops from    snooping on a criminal suspect, Wired     reports. Crypto had been used by criminal suspects in cases    dating back as early as 2004 but its use had never been    successful until much more recently.  <\/p>\n<p>    Federal and state police snooped on US suspects phone calls,    text messages, and other communications 3,576 times in 2013, an    increase of five per cent from 2012. This means that crypto was    a factor in just one in 100 cases. The vast majority of    investigations (87 per cent) involved drugs.  <\/p>\n<p>    Only one wiretap application in a domestic criminal case was    denied during the whole of 2013.  <\/p>\n<p>    Most court orders covered the interception of mobile phone or    pager traffic. The average length of an order was 40 days.  <\/p>\n<p>    US and British intel agencies and the FBI have warned that the    internet was liable to \"going dark\" because of the wider use of    cryptography by criminal and terrorist suspects in the wake of    the Snowden leaks. This dystopian scenario has failed to play    out as predicted, at least on the basis of these figures.  <\/p>\n<p>    This report omits data on interceptions regulated by the    Foreign Intelligence Surveillance Act of 1978, so it doesn't    cover the work of the NSA. That also means that the figures are    skewed towards the use of wiretaps in investigating    conventional crimes rather than national security or    terrorism-related investigations, where the use of crypto might    be expected to figure as a factor more frequently.  <\/p>\n<p>    The cost of surveillance is falling, possibly due to advances    in technology as much as anything else. The average cost of    intercept devices in 2013 was $41,119, down 18 per cent from    the average cost in 2012. For federal wiretaps the average cost    in reported cases was $43,361, a 25 per cent decrease from    2012.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2014\/07\/04\/us_wiretap_stats_show_crypto_doesnt_stop_law_enforcement\" title=\"Crypto thwarts TINY MINORITY of Feds' snooping efforts\">Crypto thwarts TINY MINORITY of Feds' snooping efforts<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Essential Guide to IT Transformation US government court-sanctioned wiretaps were sometimes defeated by encryption, according to official figures on law enforcement eavesdropping released this week. State police were unable to circumvent the encryption used by criminal suspects in nine cases last year, while plain text was recovered in 32 of 41 cases where use of cryptography was a factor last year. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-24560","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24560"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24560"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24560\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}