backtop


Print 22 comment(s) - last by Noya.. on Apr 7 at 5:51 AM

The FBI is looking to amend a 1994 law so that it includes Internet companies

U.S. government agencies are upset that they can't spy on suspects' who are using Apple's iMessage service for texting. 

According to government agencies like the Drug Enforcement Administration (DEA) and the Federal Bureau of Investigation (FBI), messages sent between iPhone users with the iMessage chat service are "impossible" to access because of iMessage's heavy encryption. 

CNET managed to get its hands on a DEA document, which describes a criminal investigation from February of this year. The document said that "it is impossible to intercept iMessages between two Apple devices" because of the encryption -- even with a federal court order.

Apple's iMessage chat service works a lot like a text message, but is transmitted through the internet rather than SMS messages by wireless carriers. It's an encrypted chat program that has become wildly successful. Apple CEO Tim Cook said 300 billion iMessages had been exchanged as of fall 2012. 



However, the DEA and FBI are having troubles keeping an eye on suspects who use the chat service. For instance, in a case where the DEA drafted a request for a court order to carry out electronic surveillance under Title III of the Federal Wiretap Act, it found that text messages from Verizon Wireless were incomplete because the suspect was an iMessage user.

"There is a growing and dangerous gap between law enforcement's legal authority to conduct electronic surveillance, and its actual ability to conduct such surveillance," said FBI director Robert Mueller. "We must ensure that the laws by which we operate and which provide protection to individual privacy rights keep pace with new threats and new technology."

The FBI is pushing for legislation on the topic, but even if that doesn't go through, government agencies can employ other methods -- such as obtain a warrant allowing them to go into someone's house/office, install keystroke-logging software and record passphrases. They can also send malware to take control of the suspect's device. 

One year ago today, it was reported that the U.S. Department of Homeland Security (DHS) and the U.S. Navy had launched a new research initiative to explore ways of allowing the government to hack into gaming consoles like the Xbox 360, Wii, or PlayStation 3 to obtain information on gamers.

Source: CNET



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Chat Logging
By WoWCow on 4/4/2013 11:12:43 AM , Rating: 4
I thought by now ALL text messaging are logged by their service providers.

Facebook does it, Google does it, MSN, every provider does it. Because of the 5th in the US, suspects do not providing self-damning evidences; their service providers do and they usually only do so at the order of a judge.

And to quote
quote:
... obtain a warrant allowing them to go into someone's house/office, install keystroke-logging software and record passphrases. They can also send malware to take control of the suspect's device.


There should really be no reason for them to CHANGE the law when they have so many options already.




RE: Chat Logging
By Jeffk464 on 4/4/2013 11:39:06 AM , Rating: 2
I thought criminals use burner phones.


RE: Chat Logging
By quiksilvr on 4/4/2013 12:01:15 PM , Rating: 1
They do, but this is regards to texting. Get the burner's phone number (something that can be obtained with a signal sniffer), and you got their text logs.

Most criminals now just use burners to call as a beeper. Someone calls, simply close the phone. Initiating the phone call is all you need for messages for certain phone numbers.


RE: Chat Logging
By Solandri on 4/4/2013 6:45:55 PM , Rating: 4
quote:
I thought by now ALL text messaging are logged by their service providers.

The problem with logging iMessage chats is that the encryption is endpoint-to-endpoint. That is, the plaintext is encrypted by the sender's phone, and decrypted by the recipient's phone. The only version of the message the service provider and Internet sees is the encrypted version. Even if Apple or your phone carrier were logging the messages (which apparently they are since the Feds were able to get copies to try to decrypt), they're still encrypted.

What we're seeing here is a fundamental shift in the concept of sending a message. In the old days, it was always possible to intercept a message. Modern cryptography and advances in computing power now mean that it's possible to send messages whose plaintext simply can't be intercepted (at least not in a realistic timeframe). The early salvos were strong encryption ciphers like DES, then RSA (public-private key). But iMessage is probably the widest-implemented due to the popularity of iPhones.

All this stuff about wiretaps and warrants is based on the premise that messages can be intercepted. But they go out the window if you're using messages which can't be intercepted. Even if you ban endpoint-to-endpoint encryption, it's still possible for anyone to manually write a program that implements it.

This is the brave new world we're heading towards, whether law enforcement likes it or not. One where wiretaps are impossible. You can no longer intercept a message; you have to get a copy of it either from the source or the recipient. (Phones can still be remotely hacked, and encryption keys surreptitiously copied.)


RE: Chat Logging
By WinstonSmith on 4/5/2013 10:35:22 AM , Rating: 3
"the plaintext is encrypted by the sender's phone, and decrypted by the recipient's phone. The only version of the message the service provider and Internet sees is the encrypted version"

Sounds basically the same as public key encryption, like PGP. Must be idiot proof and super easy to use or it wouldn't be on iPhones. Why hasn't this been a standard feature of every email application for years?


"The Space Elevator will be built about 50 years after everyone stops laughing" -- Sir Arthur C. Clarke














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki