FBI director warns against cellphone encryption

October 16, 2014 by Eric Tucker

(AP)—The FBI director is warning against smartphone encryption. James Comey is talking about tech companies like Apple and Google that say their new operating systems will be encrypted, or protected by coding. Comey says encrypting smartphone data has serious consequences for law enforcement and national security agencies.

Comey spoke Thursday at the Brookings Institution. He says encryption is like a safe that can't be cracked or a closet that can't be opened. The FBI director says justice may be denied because of a locked phone and that critical information routinely comes from smartphones, hard drives and online sources.

Comey says while some people believe the government sweeps up all cellphone communications or has access to all communications at all times, that's not the case.

Explore further: FBI head criticizes Apple, Google over data encryption

Related Stories

Post-Snowden, iPhone 6 encryption fans safety debate

September 28, 2014

Encryption technology in the iPhone 6 has taken root in a scales-of-justice debate between privacy supporters and public safety officials. Apple is using a more advanced encryption technology.

Premier FBI cybersquad in Pittsburgh to add agents

August 17, 2014

The FBI's premier cybersquad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring ...

Cyber crime costing US billions, FBI chief says

October 6, 2014

China is waging an aggressive cyber-war against the United States which costs American business billions of dollars every year, Federal Bureau of Investigation director James Comey said Sunday.

Recommended for you

World's biggest battery in Australia to trump Musk's

March 16, 2018

British billionaire businessman Sanjeev Gupta will built the world's biggest battery in South Australia, officials said Friday, overtaking US star entrepreneur Elon Musk's project in the same state last year.

1 in 3 Michigan workers tested opened fake 'phishing' email

March 16, 2018

Michigan auditors who conducted a fake "phishing" attack on 5,000 randomly selected state employees said Friday that nearly one-third opened the email, a quarter clicked on the link and almost one-fifth entered their user ...

Origami-inspired self-locking foldable robotic arm

March 15, 2018

A research team of Seoul National University led by Professor Kyu-Jin Cho has developed an origami-inspired robotic arm that is foldable, self-assembling and also highly-rigid. (The researchers include Suk-Jun Kim, Dae-Young ...


Adjust slider to filter visible comments by rank

Display comments: newest first

3 / 5 (2) Oct 16, 2014
And the real citizens said? BS No one believes these guys anymore. Anyone attached to the Obama admin is a liar until proven otherwise.
5 / 5 (3) Oct 16, 2014
Phone theft is also very common, for difficult to trace criminal activity and resale value of stolen devices. Smart phones often contain are great deal of confidential personal and business information, giving the criminals another reason to steal them.

One way for individuals to protect themselves from the criminals is through encrypting their devices to limit the damage that can be done if they are stolen. Another is being able to remotely wipe their device. Both can be effective protection against criminals but can also make the job of law enforcement more difficult.

Unfortunately, law enforcement want us all to be less safe so their job can be easier, while not dealing with the criminals that we need these methods to protect against. It seems to me that law enforcement are just stating that they are lazy and incompetent.
5 / 5 (2) Oct 16, 2014
They said the same shit about PGP a number of years ago. Lo and behold, unbreakable encryption for consumers did not destroy the world. I wish people were more aware of this issue, but because of the boring technical nature of encrypting many very terrible, privacy eradicating laws may potentially pass. Try starting a conversation with someone in line with you at the market about the differences between a stream cipher and a block cipher.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.