{"id":331717,"date":"2017-10-23T14:25:17","date_gmt":"2017-10-23T13:25:17","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/newswire\/fbi-director-says-agency-couldnt-hack-into-nearly-7000-encrypted-devices-rt-us-news\/"},"modified":"2017-10-23T14:25:17","modified_gmt":"2017-10-23T13:25:17","slug":"fbi-director-says-agency-couldnt-hack-into-nearly-7000-encrypted-devices-rt-us-news","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/newswire\/fbi-director-says-agency-couldnt-hack-into-nearly-7000-encrypted-devices-rt-us-news\/","title":{"rendered":"FBI director says agency couldn\u2019t hack into nearly 7,000 encrypted devices \u2014 RT US News"},"content":{"rendered":"<p>        Federal agents failed to hack into 6,900 mobile devices protected by encryption, the FBI director told a police chiefs\u2019 conference, amid heated debate over privacy and government control over cyberspace. <\/p>\n<div>\n<p>The FBI was unable to retrieve content from more than 6,900 mobile devices, agency director Christopher Wray said on Monday at the International Association of Chiefs of Police conference in Philadelphia. This is more than half of the mobile devices the FBI tried to access in less than a year.<\/p>\n<p><em>\u201cTo put it mildly, this is a huge, huge problem,\u201d<\/em> Wray said. <em>\u201cIt impacts investigations across the board \u2014 narcotics, human trafficking, counterterrorism, counterintelligence, gangs, organized crime, child exploitation.\u201d<\/em><\/p>\n<p>Many smartphones and mobile applications encrypt content by default \u2013 one of the latest features used to ensure the devices\u2019 manufacturers cannot access user data. Some applications, such as WhatsApp, use end-to-end encryption, which prevents private communications from being intercepted.<\/p>\n<p>Wray\u2019s remarks follow the controversial iPhone hacking in 2016, when the FBI demanded that Apple hack into a device used by San Bernardino gunman Syed Rizwan Farook. Apple refused to do so, citing the inability to unlock iPhones protected by encryption features.<\/p>\n<div class=\"arcticle__read-more read-more\">\n<p>Read more<\/p>\n<p>    <a class=\"read-more__link\" href=\"http:\/\/www.rt.com\/usa\/381213-ss7-dc-hack-phone\/\" target=\"_blank\"><br \/>\n                    <img decoding=\"async\" class=\"read-more__cover\" src=\"https:\/\/cdni.rt.com\/files\/2017.03\/thumbnail\/58ccad2dc36188234a8b458b.jpg\" alt=\"\u00a9 Jason Reed \/ Reuters\"\/><br \/>\n    <\/a>\n<\/div>\n<p>Fueling the nationwide controversy, the FBI later admitted that a contracted firm had found a way to break into Farook\u2019s iPhone. Earlier this year, a federal court ruled that the FBI does not have to disclose details of the firm or contract price the government paid to hack into Farook\u2019s smartphone, according to <a href=\"http:\/\/www.zdnet.com\/article\/fbi-allowed-to-keep-secret-details-of-iphone-hacking-tool-court-rules\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet<\/a>.\u00a0<\/p>\n<p>At the conference on Monday, Wray also spoke of a potential <em>\u201cblind spot\u201d<\/em> for intelligence gathering which may come into being if Congress does not reauthorize the Foreign Intelligence Surveillance Act (FISA).<\/p>\n<p><em>\u201cIf it doesn\u2019t get renewed or reauthorized, essentially in the form that it already is, we\u2019re about to get another blind spot,\u201d<\/em> Wray said.<\/p>\n<p>FISA allows the US secret services to wiretap internet and telephone communications of people both in the US and abroad so long as a <em>\u201csignificant\u201d<\/em> purpose of the surveillance is to gather <em>\u201cforeign intelligence information.\u201d<\/em> The law, criticized by rights groups, emanated from post-9\/11 era secret surveillance program that monitored private international communications in the US.<\/p>\n<p>The law covers two of the most sweeping NSA surveillance programs focused on retrieving content from Internet-connected devices both in the US and around the world. One, revealed by whistleblower Edward Snowden, is PRISM, which enables the NSA to tap into user data stored by online platforms such as Google, Apple, Microsoft, and Facebook.<\/p>\n<p>The second program is <em>\u2018upstream\u2019<\/em> scanning, which apparently involves automatic government searches of virtually all communications being transmitted through critical elements of internet infrastructure that connect the US to the rest of the world.<\/p>\n<\/div>\n<p>Via <a href=\"https:\/\/www.rt.com\/news\/407522-fbi-fail-mobile-devices-hack\/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=RSS\">RT<\/a>. This piece was reprinted by <a href=\"http:\/\/rinf.com\">RINF Alternative News<\/a> with permission or license.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal agents failed to hack into 6,900 mobile devices protected by encryption, the FBI director told a police chiefs\u2019 conference, amid heated debate over privacy and government control over cyberspace. The FBI was unable to retrieve content from more than 6,900 mobile devices, agency director Christopher Wray said on Monday at the International Association of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":331718,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[519],"tags":[],"class_list":{"0":"post-331717","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-newswire"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/331717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=331717"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/331717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/331718"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=331717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=331717"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=331717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}