- The best robot vacuums for pet hair of 2024: Expert tested and reviewed
- These Sony headphones eased my XM5 envy with all-day comfort and plenty of bass
- I compared a $190 robot vacuum to a $550 one. Here's my buying advice
- I finally found a reliable wireless charger for all of my Google devices - including the Pixel Watch
- 6 ways to turn your IT help desk into a strategic asset
FBI training document shows lawful access to multiple encrypted messaging apps
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them.
The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.
The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.
Source Property of the People
The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.
We got an FBI training doc on obtaining data from secure messaging apps, and shared it w/ @AndyKroll/@RollingStone. #FOIA https://t.co/FcjEUV1sN3
— PropertyOfThePeople (@PropOTP) November 29, 2021
“As of November2020, the FBl’s ability to legally access secure content on leading messaging applications is depicted below, including details on accessible information based on-the applicable legal process. Return data provided
by the companies listed below, with the exception of WhatsApp, are actually logs of latent data that are provided to law enforcement in a non-real-time manner and may impact investigations due to delivery delays.” reads the document.”
The information reported in the training documents provides an up-to-date picture of the abilities of law enforcement in accessing the content of popular messaging apps.
Feds cannot access the message content for Signal, Telegram, Threema, Viber, WeChat, and Wickr, while they can gain limited access to the content of encrypted communications from iMessage, Line, and WhatsApp.
Anyway, depending on the single encrypted messaging apps, law enforcement could extract varying metadata that could allow unmasking the end-users.
Follow me on Twitter: @securityaffairs and Facebook
Pierluigi Paganini
International Editor-in-Chief
Cyber Defense Magazine