2015 Wiretap Report Doesn't Have Much To Say About Encryption, But Does Show Feds Run Into Zero Judicial Opposition

from the Drug-War-conquers-all dept

The US Courts’ 2015 “Wiretap Report” is out and it seems to show that fears of “going dark” are largely overstated. Here’s Alex Emmons of The Intercept:

Despite a 21 percent increase in wiretaps authorized by state courts overall between 2014 and 2015, the number of cases where law enforcement encountered encryption decreased from 22 to seven.

And out of 1,403 wiretaps authorized by federal judges, only six encountered encrypted communication. Two of those were decrypted by law enforcement, leaving only four that could not be deciphered.

[…]

That means that in 2015, out of 4,148 total wiretaps, only 11 encountered a form of encryption law enforcement could not break. That’s about one quarter of one percent.

Not so fast. The lack of issues in this report doesn’t necessarily mean law enforcement agencies aren’t encountering encryption. It simply means they’re not running into it while utilizing wiretaps. There’s a lot this report doesn’t cover and there are many instances where the chance of running into encryption that renders wiretaps useless is simply being avoided. Why do the paperwork if there’s nothing to be acquired?

This is basically what the FBI told Motherboard in response to questions about the lack of encryption roadblocks shown in the report.

After this story was published, an FBI spokesperson echoed the arguments of Comey and Yates, saying the Wiretap Report numbers ”should not be surprising: agents now recognize when they are likely to encounter encryption and do not waste their time on fruitless endeavors.”

The FBI pointed to other reports more closely aligned with Comey’s anti-encryption proselytizing.

The spokesperson added that ”a better representation” of the going dark problem is the number of devices that the Computer Analysis Response Team (CART) and Regional Computer Forensic Laboratory (RCFL), the FBI teams that help state and local police with technical requests, have been unable to unlock due to being encrypted.

”Over the 6-month period from October 1, 2015 – March 31, 2016, approximately 4,000 devices were submitted for digital forensic analysis. About 500 of those could not be unlocked,” FBI spokesperson Christopher Allen said.

Apples and oranges. But that’s to be expected. One report deals with wiretap warrants obtained under one legal authority. The other deals with search warrants obtained under another. Wiretaps will rarely run into encryption because there are a wealth of options available to obtain communications that don’t involve intercepting them… or more closely reflect the current reality of communications — which isn’t tied to plain old telephone service.

Whatever the government is doing with these other options can’t easily be examined by the general public because there are no reporting requirements tied to these, unlike wiretap warrants. So, the number of times where encrypted communications (not contained in locked phones) are holding up law enforcement cannot be nailed down with any certainty. The DOJ could collect and disseminate this data, but it would certainly prefer to keep its reporting requirements to a minimum, even if this data would back up Comey’s encryption histrionics.

What hasn’t changed, however, is what wiretaps are used for: drugs. 3,367 or 4,148 issued in 2015 were for narcotics investigations. And for those of you who have followed the explosion of possibly illegal wiretaps originating from a single county courthouse in California, it’s no surprise the state issuing the most federal wiretap orders is that particular coastal “drug corridor.”

And, if law enforcement only ran into encryption in ¼ of 1% of wiretap orders, it ran into adversarial judges even less: every single one of the 4,148 federal wiretap requests was granted in 2015.

Taking James Comey at his word that encryption is a huge problem, it would appear the DOJ would rather withhold any data that supports this assertion than develop a precedent it doesn’t like: additional reporting requirements on the ECPA orders, NSLs, and regular old search warrants it uses to obtain digital communications. Almost everything in this report deals with old-fashioned landlines, so its depiction of federal surveillance is woefully incomplete.

Filed Under: , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “2015 Wiretap Report Doesn't Have Much To Say About Encryption, But Does Show Feds Run Into Zero Judicial Opposition”

Subscribe: RSS Leave a comment
6 Comments
Anonymous Coward says:

Re: Re:

So, for #2, presumably it goes something like this?

Hey, we have communications here that we need to get a wiretap warrant for! (wire tap has obviously already occurred, but whatever…)

Is it encrypted?

No -> Great! get the warrant, even though we’ve already infringed someone’s rights.

Yes -> Can we decrypt it? Let’s find out! (continue to infringe someone’s rights…)

Yes! -> Get the warrant, even though we’ve thoroughly trodden on someone’s rights…

No -> Damnit – let’s keep searching for more stuff to tap before we bother getting a warrant to do so.

Padpaw (profile) says:

Bit of a random question. If criminals broke down your front door solely with the intent to murder you and your family, how many do you think you could disable before they took you down.

Stories like this that make me believe this scenario is a when, no longer an if of people being dragged out of their homes in the middle of the night.

Those in charge have complete contempt for their laws. They treat citizens like dirt to be squashed if they get in their way.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...