Monday, 06 December 2021 06:01

US govt, other state actors can access your messages on WhatsApp, Telegram, iMessage, others despite encryption. This is how

Rate this item
(0 votes)

Having end-to-end encryption may not be enough cover for privacy when using popular encrypted messaging applications, because law enforcement can access your data when they want to.

A Federal Bureau of Investigation (FBI) document prepared on January 7 has provided the kinds of user data various secure messaging apps can share at the request of law enforcement agencies.

Titled “Lawful Access,” the one-page document detailed the “FBl’s ability to legally access secure messaging app content and metadata.”

The “unclassified” document designated as “for official use only” and “law enforcement sensitive” was prepared by the FBI’s science and technology branch and operational technology division.

According to Rolling Stone, which first reported on it, the document was obtained by a group called Property of the People through an FOIA request.

It is an internal guide to how the FBI can snoop on targets using data requested from nine companies and their services: Apple’s iMessage, Line, Signal, Telegram, Threema, Viber, Tencent’s WeChat, Meta’s WhatsApp and Wickr.

Information accessible include subscriber data, messenger sender-receiver data, device backup, IP address, encryption keys, date/time information, registration time information and user contacts. All but one (IP address) of iMessage can be accessed by the FBI.

For WhatsApp, Line and iMessage, the access to message content is limited, while in the remaining, the FBI said it has no access to message content.

Only the information on the last date of a user’s connectivity and the date and time a user registered can be accessed for Signal. Telegram provides only registration time data, but for confirmed terrorist investigation, it “may disclose IO address and phone number to relevant authorities.”

“As of November 2020, the FBI’s ability to legally access secure content on leading messaging applications is depicted below, including details on accessible information based on the applicable legal process,” the document read.

“Return data provided by the companies listed below, with the exception of WhatsApp, are actually logs of latent data that are provided to law enforcement in a non-real-time manner and may impact investigations due to delivery delays.”

Some of the information in the document is not new. For one, Apple could provide full texts sent via iMessage to law enforcement if they are backed up to iCloud.

Likewise, many social networks can collect metadata even if they can not share the contents of a message, according to PC Magazine.

Nonetheless, the document is a watershed on the long debate between privacy and security.

On one hand, there are those who feel content with end-to-end encrypted communications, irrespective of third party backend access. On the other are journalists and whistleblowers who need confidentiality to stay safe.

The FBI’s revelation showed that WhatsApp is the only popular secure messaging app that provides near-real-time data in response to law enforcement requests. WhatsApp confirmed this to Rolling Stone.

“If target is using an iPhone and iCloud backups enabled, iCloud returns may contain WhatsApp data to include message content,” the document’s footnote on the “limited” message content field indicates read.

WhatsApp might have provided a workaround for this, however.

In September, WhatsApp introduced the end-to-end encryption backups which enable users to store their data in a Backup Key Vault built based on a component called a hardware security module (HSM), a specialized, secure hardware, other than “cloud-based services like Google Drive and iCloud” which “WhatsApp does not have access to (as) they are secured by the individual cloud-based storage services.”

“We carefully review, validate, and respond to law-enforcement requests based on applicable law, and are clear about this on our website and in regular transparency reports.” WhatsApp told Rolling Stone.

“[The document] illustrates what we’ve been saying — that law enforcement doesn’t need to break end-to-end encryption to successfully investigate crimes.”

 

PT

November 21, 2024

How small businesses can leverage dark social to drive word-of-mouth marketing

Key Takeaways Dark social refers to sharing online content through private communication channels like email,…
November 21, 2024

Northern leaders say won’t support Tinubu for re-election due to president’s incompetence, bad policies

The Arewa Consultative Forum (ACF) has announced its decision to support northerners running for the…
November 18, 2024

The magic and the minefield of confidence: Self doubt, hubris and everything in between - The Economist

Confidence is contagious. Someone declaring a position with ringing certainty is more likely to inspire…
November 16, 2024

Influencer eats pig feed in extreme attempt to save money

Popular Douyin streamer Kong Yufeng recently sparked controversy in China by eating pig feed on…
November 21, 2024

50 terrorists killed as Boko Haram insurgents ambush security personnel guarding national grid in Niger…

At least 50 Boko Haram fighters were killed on Tuesday and seven members of Nigeria's…
November 21, 2024

What to know after Day 1001 of Russia-Ukraine war

WESTERN PERSPECTIVE US reopens Kyiv embassy after Ukraine firing of ATACMS missiles into Russia prompted…
November 21, 2024

Nigeria comes top in instant payment system inclusivity index in Africa

Nigeria’s instant payment system is projected to advance to the maturity inclusion spectrum ahead of…
October 27, 2024

Nigeria awarded 3-0 win over Libya after airport fiasco

Nigeria have been awarded a 3-0 victory over Libya, and three vital points, from their…

NEWSSCROLL TEAM: 'Sina Kawonise: Publisher/Editor-in-Chief; Prof Wale Are Olaitan: Editorial Consultant; Femi Kawonise: Head, Production & Administration; Afolabi Ajibola: IT Manager;
Contact Us: [email protected] Tel/WhatsApp: +234 811 395 4049

Copyright © 2015 - 2024 NewsScroll. All rights reserved.