2015 Wiretap Report Doesn't Have Much To Say About Encryption, But Does Show Feds Run Into Zero Judicial Opposition

from the Drug-War-conquers-all dept

The US Courts' 2015 "Wiretap Report" is out and it seems to show that fears of "going dark" are largely overstated. Here's Alex Emmons of The Intercept:

Despite a 21 percent increase in wiretaps authorized by state courts overall between 2014 and 2015, the number of cases where law enforcement encountered encryption decreased from 22 to seven.

And out of 1,403 wiretaps authorized by federal judges, only six encountered encrypted communication. Two of those were decrypted by law enforcement, leaving only four that could not be deciphered.

[...]

That means that in 2015, out of 4,148 total wiretaps, only 11 encountered a form of encryption law enforcement could not break. That’s about one quarter of one percent.

Not so fast. The lack of issues in this report doesn't necessarily mean law enforcement agencies aren't encountering encryption. It simply means they're not running into it while utilizing wiretaps. There's a lot this report doesn't cover and there are many instances where the chance of running into encryption that renders wiretaps useless is simply being avoided. Why do the paperwork if there's nothing to be acquired?

This is basically what the FBI told Motherboard in response to questions about the lack of encryption roadblocks shown in the report.

After this story was published, an FBI spokesperson echoed the arguments of Comey and Yates, saying the Wiretap Report numbers ”should not be surprising: agents now recognize when they are likely to encounter encryption and do not waste their time on fruitless endeavors.”

The FBI pointed to other reports more closely aligned with Comey's anti-encryption proselytizing.

The spokesperson added that ”a better representation” of the going dark problem is the number of devices that the Computer Analysis Response Team (CART) and Regional Computer Forensic Laboratory (RCFL), the FBI teams that help state and local police with technical requests, have been unable to unlock due to being encrypted.

”Over the 6-month period from October 1, 2015 – March 31, 2016, approximately 4,000 devices were submitted for digital forensic analysis. About 500 of those could not be unlocked,” FBI spokesperson Christopher Allen said.

Apples and oranges. But that's to be expected. One report deals with wiretap warrants obtained under one legal authority. The other deals with search warrants obtained under another. Wiretaps will rarely run into encryption because there are a wealth of options available to obtain communications that don't involve intercepting them... or more closely reflect the current reality of communications -- which isn't tied to plain old telephone service.

Whatever the government is doing with these other options can't easily be examined by the general public because there are no reporting requirements tied to these, unlike wiretap warrants. So, the number of times where encrypted communications (not contained in locked phones) are holding up law enforcement cannot be nailed down with any certainty. The DOJ could collect and disseminate this data, but it would certainly prefer to keep its reporting requirements to a minimum, even if this data would back up Comey's encryption histrionics.

What hasn't changed, however, is what wiretaps are used for: drugs. 3,367 or 4,148 issued in 2015 were for narcotics investigations. And for those of you who have followed the explosion of possibly illegal wiretaps originating from a single county courthouse in California, it's no surprise the state issuing the most federal wiretap orders is that particular coastal "drug corridor."

And, if law enforcement only ran into encryption in ¼ of 1% of wiretap orders, it ran into adversarial judges even less: every single one of the 4,148 federal wiretap requests was granted in 2015.

Taking James Comey at his word that encryption is a huge problem, it would appear the DOJ would rather withhold any data that supports this assertion than develop a precedent it doesn't like: additional reporting requirements on the ECPA orders, NSLs, and regular old search warrants it uses to obtain digital communications. Almost everything in this report deals with old-fashioned landlines, so its depiction of federal surveillance is woefully incomplete.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: encryption, law enforcement, privacy, wiretap


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Anonymous Coward, 5 Jul 2016 @ 12:14pm

    agents now recognize when they are likely to encounter encryption and do not waste their time on fruitless endeavors

    This means either
    1) They are guessing
    or
    2) They have already intercepted communications, and know not to bother getting a warrant.

    Anybody backing option 1?

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Jul 2016 @ 12:20pm

      Re:

      So, for #2, presumably it goes something like this?

      Hey, we have communications here that we need to get a wiretap warrant for! (wire tap has obviously already occurred, but whatever...)

      Is it encrypted?

      No -> Great! get the warrant, even though we've already infringed someone's rights.

      Yes -> Can we decrypt it? Let's find out! (continue to infringe someone's rights...)

      Yes! -> Get the warrant, even though we've thoroughly trodden on someone's rights...

      No -> Damnit - let's keep searching for more stuff to tap before we bother getting a warrant to do so.

      link to this | view in chronology ]

  • identicon
    Mintaka, 5 Jul 2016 @ 1:23pm

    How do they know...

    ...that they can't decrypt it if they haven't already tried? Sounds to me like the FBI just admitted to tapping first and then getting warrants later to "keep it if they like it."

    link to this | view in chronology ]

  • icon
    Padpaw (profile), 5 Jul 2016 @ 7:02pm

    Bit of a random question. If criminals broke down your front door solely with the intent to murder you and your family, how many do you think you could disable before they took you down.

    Stories like this that make me believe this scenario is a when, no longer an if of people being dragged out of their homes in the middle of the night.

    Those in charge have complete contempt for their laws. They treat citizens like dirt to be squashed if they get in their way.

    link to this | view in chronology ]

  • icon
    Andrew Cook (profile), 6 Jul 2016 @ 4:43am

    ... every single one of the 4,148 federal wiretap requests was granted in 2015.


    The picture is just as bleak when you look at the whole decade + 1. Out of 30,694 warrants, only 8 were denied. That's less than ¾ of a warrant per year, or about 0.02 percent.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.