We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps (2024)

by Riana Pfefferkorn

December 14, 2021

What user data can U.S. federal law enforcement obtain from providers of encrypted messaging services? A recently disclosed January 2021 document from the Federal Bureau of Investigation (FBI) supplies a concise summary with respect to nine different “secure messaging” apps. It shows that with legal process, the FBI can get various types of metadata, and in some cases even stored message content. Exactly what’s available, though, varies widely by app. The one-page document should give useful guidance to privacy-conscious people – including journalists, whistleblowers, and activists – while also helping to dispel misconceptions about the FBI’s surveillance capabilities (or lack thereof) in the encrypted messaging context. Kudos to government-transparency nonprofit Property of the People (POTP), run by “FOIA guru” Ryan Shapiro and indefatigable lawyer Jeffrey Light, for obtaining this record under the Freedom of Information Act.

Dated Jan. 7, 2021, the document states that it reflects FBI capabilities as of November 2020. The apps included in the chart are iMessage, LINE, Signal, Telegram, Threema, Viber, WeChat, WhatsApp (owned by Meta, fka Facebook), and Wickr (which was acquired by AWS in June). Most of these apps—iMessage, Signal, Threema, Viber, WhatsApp, and Wickr—end-to-end encrypt messages by default. As for the rest, Telegram uses default end-to-end encryption (E2EE) in some contexts, but not others. E2EE is on by default in newer versions of LINE, but it may not be turned on in older clients. And WeChat, owned by Chinese giant Tencent, does not support end-to-end encryption at all (just client-to-server encryption). This variance may explain why the document refers to the apps as “secure” instead of “E2EE.”

What User Data Can the FBI Get?

The chart illuminates the variation in how much data different services collect and retain about users and their communications—and consequently, what data they’ll provide to law enforcement given a valid warrant, subpoena, or court order. (Think, for example, about a warrant asking for “all records” in a provider’s possession pertaining to a user: the more information it retains about its users, the more it can be required to provide to law enforcement.) This ranges from the minimal information available from Signal and Telegram, to the basic subscriber information and other metadata that several services disclose to the FBI, and even “limited” stored message content from three of the nine apps: LINE (which, as said, still supports non-E2EE chats), iMessage, and WhatsApp.

That last part may come as a surprise to some iMessage and WhatsApp users, given that we’re talking about E2EE messaging. True, E2EE renders users’ messages inaccessible to law enforcement in transit, but it’s a different story for cloud storage. If an iMessage user has iCloud backups turned on, a copy of the encryption key is backed up along with the messages (for recovery purposes) and will be disclosed as part of Apple’s warrant return, enabling the messages to be read. WhatsApp messages can be backed up to iCloud or Google Drive, so a search warrant to one of those cloud services may yield WhatsApp data including message content (although a search warrant to WhatsApp won’t return message content). (WhatsApp recently started rolling out the option to E2EE message backups in the cloud, rendering the FBI chart slightly out-of-date.)

While it’s possible to piece together some of the information in the chart by scouring app makers’ public documentation and courts’ criminal dockets, the FBI conveniently pulled it into one at-a-glance page. It might be old news to you, if you happen to be familiar with both the law governing electronic communications privacy and the technical nuances of your encrypted messaging app(s) of choice. That may describe a lot of Just Security readers and government surveillance beat reporters, but it probably doesn’t reflect the average user’s mental model of how an E2EE messaging service works.

The chart also reveals details that app makers don’t talk about forthrightly, if at all, in their public-facing guidelines about law enforcement requests. With a warrant, WhatsApp will disclose which WhatsApp users have the target user in their address books, something not mentioned on WhatsApp’s law enforcement information page. And Apple will give 25 days’ worth of iMessage lookups to and from the target number irrespective of whether a conversation took place, which is described in Apple’s law enforcement guidelines but takes a little digging to understand since neither the FBI nor Apple explains what that means in plain English. In each case, the company is disclosing a list of its other users that happen to have the target user’s contact info, whether or not the target communicated with them. (If other messaging services make a practice of disclosing similar information, it’s not reflected in the chart.) These details underscore the broad sweep of U.S. electronic surveillance law, which lets investigators demand any “record or other information pertaining to a [target] subscriber” in response to a 2703(d) order or search warrant. While Apple and Meta have both fought for user privacy against overreaching government demands, the law nevertheless renders a lot of user data fair game.

Popular Misperceptions of Messaging Privacy

In short, it’s no easy task for the average person to accurately understand precisely what information from their messaging apps could wind up in the hands of federal investigators. Not only do different apps have different properties, but app makers don’t have much of an incentive to be straightforward about such details. As the FBI chart demonstrates, the market of free, secure messaging apps is a gratifyingly crowded and competitive field. Providers want to give current and would-be users the impression that their app is tops when it comes to user security and privacy, whether the user is concerned about malicious hackers, governments, or the provider itself. Providers have learned to be wary of overstating their service’s security properties, but they’re betting that marketing copy will get more attention than technical whitepapers or transparency reports.

In this regard, app makers’ incentives are aligned with those of the FBI. Given the FBI’s years-long campaign against encryption, it makes a strange bedfellow to the encrypted service providers it has condemned by name in public speeches. But service providers and the FBI both benefit from a popular misconception that underestimates the user data available to investigators from certain E2EE services. That misapprehension simultaneously maintains the providers’ image in the eyes of privacy-conscious users while upholding the FBI’s narrative that it’s “going dark” in criminal investigations due to encryption.

Although this misunderstanding may help law enforcement investigators, it can have significant consequences for their targets. Not just garden-variety criminals, but also journalists and their sources, whistleblowers, and activists have a lot riding on their choice of communications service. As noted in Rolling Stone’s article about the FBI chart, WhatsApp metadata was key to the arrest and conviction of Natalie Edwards, a former U.S. Treasury Department official who leaked internal documents to a reporter with whom she exchanged hundreds of messages over WhatsApp. Edwards (and presumably also the reporter, who owed Edwards an ethical duty of source protection) believed that WhatsApp was safe for journalist/source communication. That misunderstanding cost Edwards her freedom.

The Reality Behind the Myth

Thanks to FOIA and its zealous disciples at POTP, the public can now see the internal FBI document that neatly summarizes the reality behind the myth. It shows that despite its “going dark” claims, the FBI can obtain a remarkable amount of user data from messaging apps that collectively have several billion global users. (The ability to test the government’s public claims against its internal statements is one of the reasons why public access to government records, POTP’s raison d’être, is so crucial.) It shows the role that cloud storage and metadata play in mitigating end-to-end encryption’s impact on real-time communications surveillance. And it shows which popular E2EE messaging services truly do know next to nothing about their users.

If users think the encrypted apps they use don’t keep much information about them, the FBI chart shows that belief to be largely false. With some exceptions, many major E2EE messaging services hand over all kinds of data to federal law enforcement, and cloud backups can even enable the disclosure of stored messages sent on two of the biggest E2EE messaging apps. Even if little or none of what’s in the document is truly news, it’s still helpful to see it laid out so succinctly in a single page. If you are concerned about messaging privacy, use this chart (together with privacy and security guides specific to your situation, such as for journalism or protests) to help you decide which app is best for you—and share it with the people you chat with, too. That way, you can make a more informed decision about which app(s) to keep (and which to leave behind) as we enter the new year.

IMAGE: Photo illustration by Chesnot/Getty Images

Filed under:

Apple, Digital Surveillance, Encryption, Federal Bureau of Investigation (FBI), FOIA, Law enforcement, Privacy, Stored Communications Act, Technology, WeChat, WhatsApp

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps (2024)

FAQs

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps? ›

It can see limited message content, basic user information, contacts, date and time info, encryption keys, sender and receiver information, and even your iCloud backups. Since iCloud stores non-encrypted message backups by default, that gives the FBI access to a lot of content.

How much data can the FBI get from your encrypted apps? ›

Maximum of seven days' worth of specified users' text chats (Only when end-to-end encryption has not been elected and applied and only when receiving an effective warrant; however, video, picture, files, location, phone call audio and other such data will not be disclosed).

Can FBI access encrypted files? ›

Without a warrant or probable cause, no. With a warrant, if your question is: "Can the encryption implemented by e.g., TrueCrypt be broken?" then the answer is that the TrueCrypt is believed to be secure. These things are difficult to prove, but for all intents and purposes, TrueCrypt is itself a secure system. 2.

Can the FBI see Telegram messages? ›

Following is the only information the Telegram app will provide upon request from a law enforcement agency and includes no message content: Telegram's privacy policy states that it will only provide IP and phone numbers to authorized parties for confirmed terrorist investigations.

Can FBI access WhatsApp? ›

WhatsApp messages can be backed up to iCloud or Google Drive, so a search warrant to one of those cloud services may yield WhatsApp data including message content (although a search warrant to WhatsApp won't return message content).

Can the FBI see encrypted messages? ›

It can see limited message content, basic user information, contacts, date and time info, encryption keys, sender and receiver information, and even your iCloud backups. Since iCloud stores non-encrypted message backups by default, that gives the FBI access to a lot of content.

Can FBI access private messages on signal? ›

A recently discovered FBI training document shows that US law enforcement can gain limited access to the content of encrypted messages from secure messaging services like iMessage, Line, and WhatsApp, but not to messages sent via Signal, Telegram, Threema, Viber, WeChat, or Wickr.

Can FBI access your phone remotely? ›

Can FBI access your phone remotely? No, the FBI cannot access your phone remotely without authorization. If a warrant is issued and/or the FBI has properly obtained permission, then they may gain access to your phone remotely.

Can the FBI see my screen? ›

“The easy answer is yes, [the FBI] has the capability of [monitoring through laptop cameras],” Meinrath said.

Will a VPN protect me from the FBI? ›

However, a VPN hides your IP, encrypts your internet traffic, and protects your online privacy. Government agencies and other similar entities. They can approach ISPs or online service providers to obtain data about you or just use their own tracking methods.

Can the Feds read iMessages? ›

A DEA report obtained by CNet (Opens in a new window)has revealed that law enforcement has been stumped by communications sent over Apple's encrypted iMessage system. It turns out that encryption is only half the problem, and it's really legislation that keeps iMessages invisible to law enforcement.

Can end-to-end encryption be subpoenaed? ›

End-to-end encryption defies warrants and subpoenas, making it difficult if not impossible for agencies to access protected data even when authorized by law.

Can police see Signal messages? ›

Signal messages and calls cannot be accessed by us or other third parties because they are always end-to-end encrypted, private, and secure.

Can the feds see your iCloud? ›

Apple has never created a backdoor or master key to any of our products or services. We have also never allowed any government direct access to Apple servers. And we never will.

Can FBI get your WhatsApp data in real time? ›

The FBI's revelation showed that WhatsApp is the only popular secure messaging app that provides near-real-time data in response to law enforcement requests. WhatsApp confirmed this to Rolling Stone.

Can police access end-to-end encryption? ›

End-to-end encryption (E2EE) is a system that, amongst others, allows mobile phone users to communicate with each other without anyone else eavesdropping. So, the police cannot listen in either, even if they are authorized to tap the communication.

What messaging service does the FBI use encrypted? ›

ANOM, a secure-messaging app built by the FBI and other law-enforcement agencies, launched in October 2019 and solidified its following after authorities took down another rival service. Popularity spread by word of mouth.

Can police access encrypted data? ›

Because of warrant-proof encryption, the government often cannot obtain the electronic evidence and intelligence necessary to investigate and prosecute threats to public safety and national security, even with a warrant or court order.

Can a hacker read the contents of an encrypted message? ›

No, hackers cannot see encrypted data, as it is scrambled and unreadable until the encryption key (or passphrase) is used to decrypt it. However, if a hacker manages to obtain the encryption key or crack the encryption algorithm, then they can gain access to the data.

What is the FBI secret messaging app? ›

The ANOM app was marketed as providing end-to-end encrypted messaging, comparable to the security protections offered by services like Signal, WhatsApp, and iMessage, but in fact the messages could be intercepted by law enforcement, which had designed the app for precisely that purpose.

Can the CIA see your messages? ›

Is the CIA watching me through my phone? Your smartphone is no exception to CIA mass surveillance. In fact, Stingrays are used by law enforcement agencies to track citizens' movements and record conversations, text messages, names, and phone numbers.

Can police decrypt messages? ›

We designed iMessage to use end-to-end encryption, so there's no way for Apple to decrypt the content of your conversations when they are in transit between devices. Attachments you send over iMessage (such as photos or videos) are encrypted so that no one but the sender and receiver(s) can access them.

Can the FBI track a phone that is off? ›

Can a phone be tracked if it's turned off? A phone that is turned off is difficult to track because it stops sending signals to cell towers. However, the service provider or internet provider can show the last location once it's switched back on.

Can the FBI track your phone if its off? ›

So, the general answer is no, your phone cannot be tracked when switched off. But this has been called into question numerous times. There have been talks of certain authorities still being able to track your phone when turned off.

Can police see what you are doing on your phone? ›

Police officers cannot obtain the information contained on your mobile phone without a warrant. However, police officers can use any information that other people give them regarding your mobile phone use.

How do you know the feds are watching you? ›

When the feds decided to target you for an investigation involving federal contracts, they are common signs to watch out for ( see below). The most common signs of being under investigation include talking to your friends, employees acting abnormally, and even an investigator leaving a business card on your door.

Can the FBI see everything I do online? ›

They only look into your internet history if you have public information out there. The public info will be investigated - such as your Facebook, etc. Yet, they do not review your internet history unless there is some form of internet crime that allows for them to review your actual history.

Does FBI monitor social media? ›

Under the DIOG, FBI agents may review publicly available social media information prior to initiating any form of inquiry.

Can the government spy on me if I use a VPN? ›

Remember that, in almost all cases, the government can only see that you're using a VPN. They can't find what you're doing online, your internet history, or your actual IP address. Your VPN encrypts all of this data.

What does a VPN not hide? ›

What doesn't a VPN hide? A VPN doesn't hide your activity from online registered accounts. Anyone can still see your social media shares, posts, and pictures. A VPN is also different from antivirus software; while it boosts your online security, it doesn't protect you from cyberattacks.

How to bypass VPN detection? ›

How to get around VPN blocks
  1. Choosing a secure and reliable VPN. ...
  2. Switching to another server or VPN. ...
  3. Using obfuscated servers. ...
  4. Changing the tunneling protocol, encryption, or port. ...
  5. Getting a dedicated/static IP address. ...
  6. Switching to mobile data. ...
  7. Changing the DNS settings. ...
  8. Setting up a manual VPN connection.
Mar 21, 2023

Can feds see deleted messages? ›

Keeping Your Data Secure

So, can police recover deleted pictures, texts, and files from a phone? The answer is yes—by using special tools, they can find data that hasn't been overwritten yet. However, by using encryption methods, you can ensure your data is kept private, even after deletion.

Can the feds tap your FaceTime? ›

Carriers cannot intercept iMessages because they're encrypted and routed over Apple servers—and the same thing applies to Facetime. However, if the government were to go directly to Apple, it may be possible to pressure the company, in secret, to make services like iMessage and Facetime wiretap compliant.

Are your iMessages encrypted? ›

iMessage is tailor-made for iPhone: texts between two Apple devices with iMessage enabled are always end-to-end encrypted. However, there will be no encryption if an iMessage user sends a text to an Android device.

Who can see end-to-end encrypted messages? ›

End-to-end encryption is a security method that keeps your communications secure. With end-to-end encryption, no one, including Google and third parties, can read eligible messages as they travel between your phone and the phone you message.

Can Imessage content be subpoenaed? ›

If a text message is used in court, it would most likely have to be provided by the accused. This is not a common occurrence, so, in short, the answer is, yes, text messages can be subpoenaed, but, no, they are not frequently used as evidence for the reasons above.

Who uses end-to-end encryption? ›

End-to-end encryption is used when data security is necessary, including in the finance, healthcare and communications industries. It is often used to help companies comply with data privacy and security regulations and laws.

Can police read your text messages without you knowing? ›

If the law enforcement officers go to your cell service provider or Google, they can access information on your text messages and emails if they have a court order. If the police have a subpoena, they can access emails that date back as far as 180 days, whether they are opened or unopened.

Can police listen to your cell phone conversations? ›

The Right to Tap Your Phone: The Wiretap Order

The police must first obtain a wiretap order before eavesdropping on your phone conversations. This is similar to a warrant.

Is WhatsApp traceable to police? ›

We do not retain data for law enforcement purposes unless we receive a valid preservation request before a user has deleted that content from our service. In the ordinary course of providing our service, WhatsApp does not store messages once they are delivered or transaction logs of such delivered messages.

Can the feds tap your iPhone? ›

Federal agents cannot simply start tapping your phone without first obtaining court approval. In its request, the Department of Justice must include a description of who will be subject to the wiretap and its details under 18 U.S.C. § 2518.

Does Apple look at your photos? ›

Don't want Apple scanning photos on your device? Because Apple only scans photos uploaded to iCloud, you can choose to opt out of the new feature by disabling iCloud storage for your photos. Follow these steps to disable iCloud Photos: Open your iPhone or iPad and go to Settings.

Can police go through your iPhone? ›

Usually, iPhones have pretty good technology, where unless they have your passcode, the police and prosecutors cannot get into your iPhone. So, they can get a search warrant, which they are required to do if they want to search your iPhone, but most of the time they are not able to do that.

Can FBI collect WhatsApp metadata in 15 minutes? ›

WhatsApp will produce certain user metadata, though not actual message content, every 15 minutes in response to a pen register, the FBI says.

Can CIA track WhatsApp messages? ›

The CIA is capable of bypassing encryption on a number of popular messaging apps including WhatsApp, according to newly released WikiLeaks documents. The whistle-blowing organisation has just published 8,761 files, which Julian Assange claims account for “the entire hacking capacity of the CIA”.

Can law enforcement get past a VPN? ›

With a VPN on, the user's online activities and data are encrypted. But, if the VPN software has security flaws and vulnerabilities, the police (or any other third party, for that matter) can use them to “break into” the VPN and see what data is being sent and received.

What does encryption stop? ›

End-to-end encryption is a security method that keeps your communications secure. With end-to-end encryption, no one, including Google and third parties, can read eligible messages as they travel between your phone and the phone that you message.

Can the government read encrypted data? ›

Because of warrant-proof encryption, the government often cannot obtain the electronic evidence and intelligence necessary to investigate and prosecute threats to public safety and national security, even with a warrant or court order.

What data can be obtained from encrypted messaging apps FBI document? ›

The document shows that US law enforcement can gain limited access to the content of encrypted messages from secure messaging services like iMessage, Line, and WhatsApp, but not to messages sent via Signal, Telegram, Threema, Viber, WeChat, or Wickr.

Can law enforcement access encrypted data? ›

If a security password is in place, then they will need a search warrant before they get that password to get to the phone's stored data. Constitutional search and seizure protections will be in place for the passwords that are independent of the device itself.

Can encrypted data be tracked? ›

No, hackers cannot see encrypted data, as it is scrambled and unreadable until the encryption key (or passphrase) is used to decrypt it. However, if a hacker manages to obtain the encryption key or crack the encryption algorithm, then they can gain access to the data.

Who can read encrypted messages? ›

With end-to-end encryption, no one, including Google and third parties, can read eligible messages as they travel between your phone and the phone you message. To use end-to-end encryption in Messages, you and the person you message must both: Use the Messages app. Have RCS chats turned on.

Does the government see your messages? ›

In the United States, the government pays phone companies directly to record and collect cellular communications from specified individuals. U.S. law enforcement agencies can also legally track the movements of people from their mobile phone signals upon obtaining a court order to do so.

What can be found in the encrypted files? ›

File encryption is a way of encoding files, including the sensitive data they contain, in order to send them securely. The encoding prevents unauthorized access and tampering by malicious actors. It keeps a file from being read by anyone except the person or people for whom it was intended.

Can anybody can access and read an encrypted file? ›

The encrypted document will need to have the password entered before it can be opened. Important: Once a document has been encrypted, you can not open it without the password.

Can police remotely access my phone? ›

There are many backups of data on your phone. Anything saved outside of your device can be accessed by law enforcement if they follow the correct and established legal routes to do so.

Can police read signal messages? ›

Signal messages and calls cannot be accessed by us or other third parties because they are always end-to-end encrypted, private, and secure.

Can your phone be hacked if it is encrypted? ›

The short answer is no, encryption alone cannot prevent you from getting hacked. Let's look into how and why it can help you avoid cybersecurity threats anyway.

Can spyware see encrypted messages? ›

Spyware works around encryption instead of trying to break it. If hackers can read messages before or after they're sent, it doesn't matter if they were encrypted in between.

Top Articles
Latest Posts
Article information

Author: Nathanial Hackett

Last Updated:

Views: 5737

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Nathanial Hackett

Birthday: 1997-10-09

Address: Apt. 935 264 Abshire Canyon, South Nerissachester, NM 01800

Phone: +9752624861224

Job: Forward Technology Assistant

Hobby: Listening to music, Shopping, Vacation, Baton twirling, Flower arranging, Blacksmithing, Do it yourself

Introduction: My name is Nathanial Hackett, I am a lovely, curious, smiling, lively, thoughtful, courageous, lively person who loves writing and wants to share my knowledge and understanding with you.