Encryption foils FBI's attempts to unlock 7,000 devices

The FBI's boss said it's one of the authority's biggest hurdles

The FBI has failed to extract data from 7,000 mobile devices it was trying to hack, with the organisation's director saying encryption was the biggest hurdle to its work yet.

Christopher Wray told the International Association of Chiefs of Police conference in Philadelphia that encryption was "a huge, huge problem" for FBI investigations, saying the organisation had not managed to break into half of the devices they had attempted to access.

Smartphone manufacturers and operating system providers use encryption to protect their users' data from criminals. This end-to-end encryption is almost impossible to hack into, which is good for users, but raises challenges for authorities who may need to extract data from devices to aid in criminal investigations.

"Encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies," Prof Alan Woodward at the University of Surrey told the BBC. "Even if the equipment manufacturers didn't build in such encryption it would be possible to obtain software that encrypted data in the same way."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Although Wray said he understood smartphone manufacturers needed to put in place strong protections to protect the public, he said a balance must be struck that allows authorities to glean information from devices if and when required.

One notable case that prevented the FBI from accessing a suspect's device was when it wanted to break into San Bernadino shooter Syed Rizwan Farook's iPhone. Apple refused to grant the organisation access and when the police appealed, a judge ruled that Apple did not have to provide the information requested. However, the FBI managed to break into the killer's device using a third-party hacker.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019