FBI Failed To Access 7,000 Encrypted Mobile Devices

FBI director Christopher WrayImage copyright AFP
Image caption Christopher Wray said more than half of the devices the FBI had tried to access in 11 months had been impenetrable

Agents at the US Federal Bureau of Investigation (FBI) have been unable to extract data from nearly 7,000 mobile devices they have tried to access, the agency's director has said.

Christopher Wray said encryption on devices was "a huge, huge problem" for FBI investigations.

The agency had failed to access more than half of the devices it targeted in an 11-month period, he said.

One cyber-security expert said such encryption was now a "fact of life".

Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data.

Such encryption is different to end-to-end encryption, which prevents interception of communications on a large scale.

Cyber-security expert Prof Alan Woodward at the University of Surrey said device encryption was clearly frustrating criminal investigations but it would be impractical and insecure to develop "back doors" or weakened security.

Trade-off

"Encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies," he said.

"Even if the equipment manufacturers didn't build in such encryption it would be possible to obtain software that encrypted data in the same way."

Referring to the trade-off between cyber-security and investigative hacking, the FBI director said: "I get it, there's a balance that needs to be struck between encryption and the importance of giving us the tools we need to keep the public safe."

Mr Wray was speaking at the International Association of Chiefs of Police conference in Philadelphia on Sunday.

In 2016, the FBI asked Apple to unlock an iPhone used by San Bernardino killer Syed Rizwan Farook.

Apple refused, explaining that its phones had been designed so that even their manufacturer could not access them once encrypted.

The FBI later said a third party firm had discovered a way of breaking into Farook's device.

Earlier this month, a federal judge ruled that the FBI did not have to reveal the identity of the firm or how much the agency paid for its services.

The ruling followed freedom of information requests filed by journalists.

RECENT NEWS

From Chip War To Cloud War: The Next Frontier In Global Tech Competition

The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more

The High Stakes Of Tech Regulation: Security Risks And Market Dynamics

The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more

The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics

Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more

The Data Crunch In AI: Strategies For Sustainability

Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more

Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser

After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more

LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue

In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more