Connect with us

News

Document shows how FBI can access your data on WhatsApp, Telegram, iMessage, others

Published

on

FBI
FBI

Document shows how FBI can access your data on WhatsApp, Telegram, iMessage, others
Titled “Lawful Access,” the one-page document detailed the “FBl’s ability to legally access secure messaging app content and metadata.”
ByYusuf Akinpelu December 5, 2021 3 min read

Having end-to-end encryption may not be enough cover for privacy when using popular encrypted messaging applications, because law enforcement can access your data when they want to.

A Federal Bureau of Investigation (FBI) document prepared on January 7 has provided the kinds of user data various secure messaging apps can share at the request of law enforcement agencies.

Titled “Lawful Access,” the one-page document detailed the “FBl’s ability to legally access secure messaging app content and metadata.”

The “unclassified” document designated as “for official use only” and “law enforcement sensitive” was prepared by the FBI’s science and technology branch and operational technology division.

According to Rolling Stone, which first reported on it, the document was obtained by a group called Property of the People through an FOIA request.

It is an internal guide to how the FBI can snoop on targets using data requested from nine companies and their services: Apple’s iMessage, Line, Signal, Telegram, Threema, Viber, Tencent’s WeChat, Meta’s WhatsApp and Wickr.

Information accessible include subscriber data, messenger sender-receiver data, device backup, IP address, encryption keys, date/time information, registration time information and user contacts. All but one (IP address) of iMessage can be accessed by the FBI.

For WhatsApp, Line and iMessage, the access to message content is limited, while in the remaining, the FBI said it has no access to message content.

Only the information on the last date of a user’s connectivity and the date and time a user registered can be accessed for Signal. Telegram provides only registration time data, but for confirmed terrorist investigation, it “may disclose IO address and phone number to relevant authorities.”

“As of November 2020, the FBI’s ability to legally access secure content on leading messaging applications is depicted below, including details on accessible information based on the applicable legal process,” the document read.

“Return data provided by the companies listed below, with the exception of WhatsApp, are actually logs of latent data that are provided to law enforcement in a non-real-time manner and may impact investigations due to delivery delays.”

Some of the information in the document is not new. For one, Apple could provide full texts sent via iMessage to law enforcement if they are backed up to iCloud.

Likewise, many social networks can collect metadata even if they can not share the contents of a message, according to PC Magazine.

Nonetheless, the document is a watershed on the long debate between privacy and security.

On one hand, there are those who feel content with end-to-endDocument shows how FBI can access your data on WhatsApp, Telegram, iMessage, others
Titled “Lawful Access,” the one-page document detailed the “FBl’s ability to legally access secure messaging app content and metadata.”
ByYusuf Akinpelu December 5, 2021 3 min read

Having end-to-end encryption may not be enough cover for privacy when using popular encrypted messaging applications, because law enforcement can access your data when they want to.

A Federal Bureau of Investigation (FBI) document prepared on January 7 has provided the kinds of user data various secure messaging apps can share at the request of law enforcement agencies.

Titled “Lawful Access,” the one-page document detailed the “FBl’s ability to legally access secure messaging app content and metadata.”

The “unclassified” document designated as “for official use only” and “law enforcement sensitive” was prepared by the FBI’s science and technology branch and operational technology division.

According to Rolling Stone, which first reported on it, the document was obtained by a group called Property of the People through an FOIA request.

It is an internal guide to how the FBI can snoop on targets using data requested from nine companies and their services: Apple’s iMessage, Line, Signal, Telegram, Threema, Viber, Tencent’s WeChat, Meta’s WhatsApp and Wickr.

Information accessible include subscriber data, messenger sender-receiver data, device backup, IP address, encryption keys, date/time information, registration time information and user contacts. All but one (IP address) of iMessage can be accessed by the FBI.

For WhatsApp, Line and iMessage, the access to message content is limited, while in the remaining, the FBI said it has no access to message content.

Only the information on the last date of a user’s connectivity and the date and time a user registered can be accessed for Signal. Telegram provides only registration time data, but for confirmed terrorist investigation, it “may disclose IO address and phone number to relevant authorities.”

“As of November 2020, the FBI’s ability to legally access secure content on leading messaging applications is depicted below, including details on accessible information based on the applicable legal process,” the document read.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending