Justice Department considers wiretapping fight with WhatsApp amid Apple-FBI row
The U.S. government is at odds with yet another Silicon Valley firm thanks to encrypted communications, this time targeting Facebook-owned messaging superpower WhatsApp over federal wiretapping statutes.
In the wake of WhatsApp's move to add end-to-end encryption to text messages and VoIP calls made through its service, law enforcement officials have been unable to execute wiretapping warrants on WhatsApp users. Though the Justice Department has yet to decide on a course of action, the government is contemplating legal proceedings similar to those in which it is currently embroiled with Apple, according to the New York Times.
As with the Apple case, investigators were able to execute warrants on WhatsApp exchanges until the company began adding encryption in 2014.
As noted by the Times, wiretapping has a long history as an important investigative tool and many in the law enforcement community are worried about losing these capabilities.
"You're getting useless data," former federal prosecutor Joseph DeMarco told the paper, referring to intercepting encrypted communications. "The only way to make this not gibberish is if the company helps."
Apple itself has been caught up in similar debates over its iMessage application. iMessage is also encrypted end-to-end, and the company has no way to decode messages in transit.
While Apple handles billions of iMessages each day, WhatsApp is a much larger service overall. The company has more than 1 billion users around the world, and in some countries WhatsApp is the de facto messaging standard.
Highlighting the international implications, a Facebook executive in Brazil was arrested earlier this month over the company's failure to comply with a court order to turn over WhatsApp data.
"We are disappointed that law enforcement took this extreme step," WhatsApp said in a statement after the executive's arrest. "WhatsApp cannot provide information we do not have."
In the wake of WhatsApp's move to add end-to-end encryption to text messages and VoIP calls made through its service, law enforcement officials have been unable to execute wiretapping warrants on WhatsApp users. Though the Justice Department has yet to decide on a course of action, the government is contemplating legal proceedings similar to those in which it is currently embroiled with Apple, according to the New York Times.
As with the Apple case, investigators were able to execute warrants on WhatsApp exchanges until the company began adding encryption in 2014.
As noted by the Times, wiretapping has a long history as an important investigative tool and many in the law enforcement community are worried about losing these capabilities.
"You're getting useless data," former federal prosecutor Joseph DeMarco told the paper, referring to intercepting encrypted communications. "The only way to make this not gibberish is if the company helps."
Apple itself has been caught up in similar debates over its iMessage application. iMessage is also encrypted end-to-end, and the company has no way to decode messages in transit.
While Apple handles billions of iMessages each day, WhatsApp is a much larger service overall. The company has more than 1 billion users around the world, and in some countries WhatsApp is the de facto messaging standard.
Highlighting the international implications, a Facebook executive in Brazil was arrested earlier this month over the company's failure to comply with a court order to turn over WhatsApp data.
"We are disappointed that law enforcement took this extreme step," WhatsApp said in a statement after the executive's arrest. "WhatsApp cannot provide information we do not have."
Comments
Just trying to figure out a way that we can keep our safety and security, and law enforcement can still collect necessary data to fulfill their duties.
Then they came for WhatsApp, but I did not use WhatsApp so I did nothing...
If an external company's software does not comply, potentially they could be forbidden to operate in the US or be installed on US phones. Obviously there are ways around that but they would mainly be targeting the major apps.
Imagine there's a bad guy out there with an idea in his head for a Dr. Evil super weapon that could do enormous damage to the world. The bad guy keeps this knowledge to himself, storing the designs for the weapon only on his personal phone, which is protected with strong encryption. And then the bad guy dies. End result, no harm, no foul. In this scenario, his phone served merely as an extension of his mind, allowing him to flesh out his ideas in a document stored on his phone rather than relying solely upon his own imperfect memory. Because he died before ever communicating his ideas beyond his own mind and his secure phone the world is safe from this super weapon, until someone else independently comes up with the same idea. And while he was living, the world was safe from his super weapon as long as he did nothing to share the idea and design with others who could help him build it.
Now let's imagine an alternate scenario, where the bad guy with the super weapon design instead shares the idea and designs beyond the sanctuary of his mind and secure smartphone. It's when a dangerous plan is shared with others who can act upon it that the information represents a danger to the world.
So this is where you might want to draw a line. Information stored under strong encryption on a smartphone or other personal device might be treated as an extension of our minds, sacrosanct from forced inspection. But information communicated out to the world, where it can be put into motion and effect, should not retain the same rights to perfect privacy. If I enter the name and phone number of a known terrorist into my contacts list, this should be private and protected information. But if there's a record of my having placed or received a call from that terrorist, then this indicates a potential of threat, that I might be collaborating with the terrorist. And so the fact of the actual communication is what government should be fighting to access (via the phone company and not via my handset), not the fact that I merely have the terrorist's contact information on my phone. And the actual text or voice communications I had with the terrorist, representing the actual communications that might have spread a dangerous idea among multiple people, this too should be of interest to law enforcement, also accessed via the telecommunications provider. So I understand the whole wiretapping concept, with proper warrant and cause. But I think it should cover the actual communications between potentially [suspected] conspirators, not the content on their phones which potentially includes information they never shared with anyone, and therefore represents their private thoughts, with the phone's encrypted storage acting as a proxy for their memories.
The final kick in the teeth is the US Go'vt (FBI/DoJ) using terror tactics to get their way; Do this or you're NOT an American, you support terrorists, or we will own you, or .. or.. You know, how terrorists use terror to get their way.. Now the FBI/DoJ are using similar tactics of fear to get their way. Really sick.
Humor aside - The Feds will continue to press this from multiple directions until they get what they are looking for or are told No by the supreme court. Hopefully our courts will side with the will of the people rather than what politics and/or law enforcement thinks is the best for the country, but I'm not holding my breath.
4th Amendment
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.