December 3, 2024
FBI Director Christopher Wray revealed at a recent hearing that while the bureau had accessed some content from the digital devices of former President Donald Trump’s would-be assassin, it could not see everything. One day later, a group of privacy activists huddled together to plot out ways to better protect digital information from the FBI […]

FBI Director Christopher Wray revealed at a recent hearing that while the bureau had accessed some content from the digital devices of former President Donald Trump’s would-be assassin, it could not see everything.

One day later, a group of privacy activists huddled together to plot out ways to better protect digital information from the FBI and other entities.

“The FBI complains about going dark. When you look at the statistics on how often they intercept communications, this is the golden age of surveillance,” Greg Nojeim, a lawyer at the Center for Democracy and Technology, said during the virtual meeting on Thursday.

The meeting, hosted by Demand Progress, centered on encryption, which Nojeim described as “crucial to protecting information” in a world where everything, from personal messages and work communications to financial and health records, is online.

Wray had lamented at the hearing the obstacle presented by encrypted platforms, such as Signal, WhatsApp, or Proton Mail, which lock communications so that only the sender and recipient can see them.

FBI Director Christopher Wray testifies before a House committee about the July 13 shooting at a campaign rally in Butler, Pennsylvania, Wednesday, July 24, 2024, on Capitol Hill. Wray said that the FBI will "leave no stone unturned" in its investigation of the attempted assassination of former President Donald Trump. (AP Photo/Manuel Balce Ceneta)
FBI Director Christopher Wray testifies before a House committee about the July 13 shooting at a campaign rally in Butler, Pennsylvania, Wednesday, July 24, 2024, on Capitol Hill. (AP Photo/Manuel Balce Ceneta)

Wray said the FBI had finally gained access to Thomas Matthew Crooks’s phone as the bureau continues searching for the motive of the 20-year-old who killed one, critically injured two, and injured Trump at a recent rally in Pennsylvania.

Wray said, however, that accessing the phone presented a “significant technical challenge” in itself “from an encryption perspective” and that encrypted messaging applications on Crooks’s phone were also a problem for the FBI.

The FBI may never be able to access some of Crooks’s content “no matter how good our legal process is,” Wray said.

“In terms of our ability to access it, we have been able to get into and exploit a number of electronic devices, digital devices but not all of them yet, and then within his various accounts, we’ve been able to get access to some of them, but some of them we’re still waiting on. Some of them we may never get access to because of the encryption issue that presents an increasingly vexing barrier for law enforcement,” Wray said.

FBI Deputy Director Paul Abbate told lawmakers in a briefing one week before the hearing that the FBI had initiated a “legal process,” such as issuing subpoenas, with 30 companies and had been waiting on responses from 18 companies, including encrypted platforms, in reference to the Crooks investigation, according to a source familiar with the briefing.

Hajar Hammado, a senior policy adviser at Demand Progress, said in a statement the FBI has a record of attempting to break through encrypted platforms.

“Given the FBI’s long history of working to undermine end-to-end encryption, it’s very likely they will ask the next president to help them do it, and we can already see Director Wray laying that groundwork,” Hammado told the Washington Examiner.

Hammado stated that “people who care about defending digital security and privacy need to be vigilant and proactive in challenging the false narratives the FBI is once again trying to plant.”

Former Virginia Republican Rep. Bob Goodlatte, who participated in the virtual privacy meeting, harkened back to the encryption controversy surrounding the shooting in San Bernadino, California, in 2015 that left 14 dead.

The FBI obtained a court order for Apple to unlock an iPhone belonging to one of the two shooters, and while Apple CEO Tim Cook fought the order in court, the FBI eventually found a third party to unlock the phone and dropped its legal pursuit against Apple.

The Washington Post reported that the third party was a small Australian hacking firm called Azimuth Security. In Crooks’s case, the outlet reported, the FBI broke into the gunman’s phone using software from Cellebrite, an Israeli firm federal investigators have increasingly turned to for cracking phone codes.

Noah Chauvin, a law professor at Widener University, said during the meeting with the privacy advocates, however, that he had observed “sustained efforts” from law enforcement to go directly to encryption platforms and pressure them to put “backdoors into their products that would allow the government to go in and review the messages that are being sent.”

Using third parties like Cellebrite is legal for the FBI to do, but federal statutes discourage law enforcement entities from pressuring companies that provide encryption services to directly help them access secure communications.

Goodlatte, who became a privacy lobbyist after leaving Congress, said he understood the FBI’s frustration with encryption but warned that efforts to access secured messages through backdoors, if successful, would present “security vulnerabilities” that could create hacking opportunities for foreign adversaries or international criminal organizations.

The group of privacy hawks discussed legislation they would urge Congress to pass, including an amendment introduced by Rep. Warren Davidson (R-OH) that would prohibit any FBI funding that went toward undermining encryption.

CLICK HERE TO READ MORE FROM THE WASHINGTON EXAMINER 

Davidson introduced the amendment as part of a congressional appropriations bill, which Republican leaders postponed addressing until after their August recess.

The annual summer break on Capitol Hill and the funding bill delays mean that while evergreen friction on encryption exists between privacy hawks and the government, it will likely be months or longer before any legislative fights on the issue come to a head.

Leave a Reply