- 양자 컴퓨팅 혁신 가속화… 아이온Q·앨리스앤밥, 기술 성과 공개
- '업무용 애플리케이션 만족한다' 23%에 불과··· AI 기반 개인화 알고리즘이 열쇠
- Preorder the OnePlus Watch 3 now and enjoy several discounts before it becomes available
- How Cybersecurity is Evolving in 2025 to Tackle New Threats
- 5 ways to boost your team's productivity - without relying on generative AI
FBI training document shows lawful access to multiple encrypted messaging apps

Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them.
The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.
The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.
Source Property of the People
The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.
We got an FBI training doc on obtaining data from secure messaging apps, and shared it w/ @AndyKroll/@RollingStone. #FOIA https://t.co/FcjEUV1sN3
— PropertyOfThePeople (@PropOTP) November 29, 2021
“As of November2020, the FBl’s ability to legally access secure content on leading messaging applications is depicted below, including details on accessible information based on-the applicable legal process. Return data provided
by the companies listed below, with the exception of WhatsApp, are actually logs of latent data that are provided to law enforcement in a non-real-time manner and may impact investigations due to delivery delays.” reads the document.”
The information reported in the training documents provides an up-to-date picture of the abilities of law enforcement in accessing the content of popular messaging apps.
Feds cannot access the message content for Signal, Telegram, Threema, Viber, WeChat, and Wickr, while they can gain limited access to the content of encrypted communications from iMessage, Line, and WhatsApp.
Anyway, depending on the single encrypted messaging apps, law enforcement could extract varying metadata that could allow unmasking the end-users.
Follow me on Twitter: @securityaffairs and Facebook
Pierluigi Paganini
International Editor-in-Chief
Cyber Defense Magazine