{"id":26799,"date":"2014-10-16T19:41:21","date_gmt":"2014-10-16T23:41:21","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26799"},"modified":"2014-10-16T19:41:21","modified_gmt":"2014-10-16T23:41:21","slug":"fbi-cellphone-encryption-would-impede-criminal-investigations","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/fbi-cellphone-encryption-would-impede-criminal-investigations.php","title":{"rendered":"FBI: cellphone encryption would impede criminal investigations"},"content":{"rendered":"<p><p>      Photo by Getty Images.    <\/p>\n<p>    Privacy advocates and technology experts called the concerns    exaggerated and little more than recycled arguments the    government has raised against encryption since the early 1990s.  <\/p>\n<p>    Likening encrypted data to a safe that cannot be cracked or a    closet door that wont open, Comey said the move by tech    companies to protect user communications in the name of privacy    is certain to impede a wide range of criminal investigations.    New legislation to allow law enforcement to intercept    communications is needed at a time of advancing technology and    new forms of communication, he said.  <\/p>\n<p>    We have the legal authority to intercept and access    communications from information pursuant to court order, but we    often lack the technical ability to do so, Comey said in a    Brookings Institution speech.    Comey cited particular cases in which he said access to cell    phone data aided in a criminal investigation. But in a    question-and-answer session after the speech, he said he could    not cite particular instances in which someone was rescued from    danger who wouldnt have been had law enforcement been blocked    from that information.  <\/p>\n<p>    Logic tells me there are going to be cases like that, Comey    said.  <\/p>\n<p>    The speech, which echoes concerns he and others in law    enforcement have previously made, comes soon after    announcements by Apple and Google that their new operating    systems will be encrypted, or protected with coding by default.    Law enforcement officials could still intercept conversations    but might not be able to access call data, contacts, photos and    email stored on the phone.  <\/p>\n<p>    While the companies actions are understandable, Comey said,    the place they are leading us is one we shouldnt go to    without careful thought and debate.  <\/p>\n<p>    Encryption isnt just a technical feature. Its a marketing    pitch. But it will have very serious consequences for law    enforcement and national security agencies at every level,    Comey said.  <\/p>\n<p>    The governments concerns may also center in part on the use of    Apples iMessage platform, which offers end-to-end encrypted    text messages that supersede traditional SMS messages. That    kind of encryption likely provides access to those messages on    users iPhones, of which Apple has sold more than 240 million    since 2013.  <\/p>\n<p>    He acknowledged a rise in public mistrust of government in the    year since former National Security Agency systems analyst    revealed NSA secret intelligence collection programs. But he    said the public was wrong to believe that law enforcement can    access any and all communications with the flip of a switch.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pbs.org\/newshour\/rundown\/fbi-cellphone-encryption-impede-criminal-investigations\" title=\"FBI: cellphone encryption would impede criminal investigations\">FBI: cellphone encryption would impede criminal investigations<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Photo by Getty Images. Privacy advocates and technology experts called the concerns exaggerated and little more than recycled arguments the government has raised against encryption since the early 1990s<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-26799","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26799"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26799"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26799\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}