FBI director warns against cellphone encryption

October 16, 2014 by Eric Tucker

(AP)—The FBI director is warning against smartphone encryption. James Comey is talking about tech companies like Apple and Google that say their new operating systems will be encrypted, or protected by coding. Comey says encrypting smartphone data has serious consequences for law enforcement and national security agencies.

Comey spoke Thursday at the Brookings Institution. He says encryption is like a safe that can't be cracked or a closet that can't be opened. The FBI director says justice may be denied because of a locked phone and that critical information routinely comes from smartphones, hard drives and online sources.

Comey says while some people believe the government sweeps up all cellphone communications or has access to all communications at all times, that's not the case.

Explore further: FBI head criticizes Apple, Google over data encryption

Related Stories

Post-Snowden, iPhone 6 encryption fans safety debate

September 28, 2014

Encryption technology in the iPhone 6 has taken root in a scales-of-justice debate between privacy supporters and public safety officials. Apple is using a more advanced encryption technology.

Premier FBI cybersquad in Pittsburgh to add agents

August 17, 2014

The FBI's premier cybersquad has focused attention on computer-based crime in recent months by helping prosecutors charge five Chinese army intelligence officials with stealing trade secrets from major companies and by snaring ...

Cyber crime costing US billions, FBI chief says

October 6, 2014

China is waging an aggressive cyber-war against the United States which costs American business billions of dollars every year, Federal Bureau of Investigation director James Comey said Sunday.

Recommended for you

Cryptocurrency rivals snap at Bitcoin's heels

January 14, 2018

Bitcoin may be the most famous cryptocurrency but, despite a dizzying rise, it's not the most lucrative one and far from alone in a universe that counts 1,400 rivals, and counting.

Top takeaways from Consumers Electronics Show

January 13, 2018

The 2018 Consumer Electronics Show, which concluded Friday in Las Vegas, drew some 4,000 exhibitors from dozens of countries and more than 170,000 attendees, showcased some of the latest from the technology world.

Finnish firm detects new Intel security flaw

January 12, 2018

A new security flaw has been found in Intel hardware which could enable hackers to access corporate laptops remotely, Finnish cybersecurity specialist F-Secure said on Friday.

3 comments

Adjust slider to filter visible comments by rank

Display comments: newest first

JamesG
3 / 5 (2) Oct 16, 2014
And the real citizens said? BS No one believes these guys anymore. Anyone attached to the Obama admin is a liar until proven otherwise.
rp142
5 / 5 (3) Oct 16, 2014
Phone theft is also very common, for difficult to trace criminal activity and resale value of stolen devices. Smart phones often contain are great deal of confidential personal and business information, giving the criminals another reason to steal them.

One way for individuals to protect themselves from the criminals is through encrypting their devices to limit the damage that can be done if they are stolen. Another is being able to remotely wipe their device. Both can be effective protection against criminals but can also make the job of law enforcement more difficult.

Unfortunately, law enforcement want us all to be less safe so their job can be easier, while not dealing with the criminals that we need these methods to protect against. It seems to me that law enforcement are just stating that they are lazy and incompetent.
dtxx
5 / 5 (2) Oct 16, 2014
They said the same shit about PGP a number of years ago. Lo and behold, unbreakable encryption for consumers did not destroy the world. I wish people were more aware of this issue, but because of the boring technical nature of encrypting many very terrible, privacy eradicating laws may potentially pass. Try starting a conversation with someone in line with you at the market about the differences between a stream cipher and a block cipher.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.