Security

ACLU: Here's how FBI tried to force Facebook to wiretap its chat app. Judge: Oh no you don't

Federal court shoots down attempt to reveal Feds' decryption demands


A US federal judge has refused to unseal court paperwork that would show how the FBI tried to force Facebook to snoop on calls made through its instant-messaging app.

Judge Lawrence O’Neill this week rejected [PDF] a petition from the American Civil Liberties Union (ACLU) to make the documents public because, he argued, "the materials at issue in this case concern techniques that, if disclosed publicly, would compromise law enforcement efforts in many, if not all, future wiretap investigations."

The judge also refused to release partially redacted versions – a move favored by Facebook if details of its systems were removed – because "sensitive investigatory information is so thoroughly intertwined with the legal and factual arguments in the record such that redaction would leave little and/or misleading substantive information."

In August 2018, it was revealed that the Department of Justice (DoJ) had tried to force Facebook to give it access to voice-call conversations made via its Messenger app. When Facebook refused, the DoJ tried to hold the social media giant in contempt of court.

We note that while Facebook Messenger offers so-called Secret Conversations, which are chat sessions strongly end-to-end encrypted using the Signal protocol, voice calls are not, to our knowledge, end-to-end encrypted, meaning Facebook can in theory snoop on them. We assume the calls are encrypted in transit, to prevent man-in-the-middle spies from listening in, however, by not being truly end-to-end, they can be potentially intercepted by the social network.

In any case, it appears Facebook refuses to build for Uncle Sam the capability to eavesdrop on Messenger voice calls.

Soon after this legal tussle emerged, the ACLU sued the DoJ in an effort to get the relevant documents made public. Those files almost certainly include the legal arguments put forward by the US government to compel a private third-party to intercept and, if need be, decrypt private chatter.

As such, the ACLU argued, there is a clear public interest in what the US government's arguments. "Whether and how the government can compel internet communications platforms to modify their technology to enable surveillance against their users is a topic of vigorous public debate," the civil rights advocacy group argued in its filing [PDF].

It argued that the First Amendment and "common law rights of access" to court docs provided the necessary legal authority.

Overwhelming

Judge O’Neill disagreed, however, deciding instead that "the compelling interest of the DOJ to preserve the secrecy of law enforcement techniques in Title III wiretap cases overwhelms that qualified right."

This is far from the first time that law enforcement has tried to force tech companies to hand over and, if necessary, unscramble encrypted data. Most significantly, the FBI and Apple ended up a heated dispute over access to the iPhone of a man who had shoot and killed numerous people in San Bernardino, California.

The FBI told Apple to give it access to his phone's encrypted file system, and Apple argued that to do that it would have to create software that would break its own encryption system: something it said was beyond the authority of the Feds.

In the end, just days before a judge was due to rule on the issue, the g-men backed down and claimed they had found their own technical workaround and so the issue was moot. It found nothing on the phone, but that was almost irrelevant since the entire issues was seen as the FBI trying to create a legal precedent.

They're back! 'Feds only' encryption backdoors prepped in US by Dems

READ MORE

It's not clear why the FBI felt that Facebook would be an easier target or whether it had put forward different legal arguments in an effort to get that same legal precedent – and that's why the ACLU and others want to know what is in the documents filed against Facebook.

What we do know is that the request covered encrypted voice calls between suspected MS-13 gang members in Fresno, California, at least according to the ACLU.

While the judge's decision may be understandable – an effort to protect investigative techniques that are used elsewhere – it has unfortunately given the FBI a clear method by which they can keep making legal arguments for access to encrypted material without being subject to public scrutiny. All the Feds have to do is include information about their techniques and specific targets alongside its legal arguments for access, and then, wham: down come the shutters.

That in itself is a dark tunnel down which the US government can create secret surveillance laws: a rerun of the system that enabled the NSA/FBI and others to engage in the kind of mass surveillance that was exposed by Edward Snowden, and which was subsequently found to be illegal once exposed to the full spotlight of the law. ®

Send us news
28 Comments

FBI and friends get two more years of warrantless FISA Section 702 snooping

Senate kills reform amendments, Biden swiftly signs bill into law

Hugely expanded Section 702 surveillance powers set for US Senate vote

Opponents warn almost anyone could be asked to share info with Uncle Sam

Reform of USA's Section 702 spying rule may make it to a vote this week

Tool that lets spooks observe Americans appears to have been renewed for another year

Europol now latest cops to beg Big Tech to ditch E2EE

Don't bore us, get to the chorus: You need less privacy so we can protect the children

House passes bill banning Uncle Sam from snooping on citizens via data brokers

Vote met strong opposition from Biden's office

Taiwanese film studio snaps up Chinese surveillance camera specialist Dahua

Stymied by sanctions, it had to go … but where?

China creates 'Information Support Force' to improve networked defence capabilities

A day after FBI boss warns Beijing is poised to strike against US infrastructure

EU tells Meta it can't paywall privacy

Platforms should not confront users with 'binary choice' over personal data use

Psst, hey. It's the NSA. You want some AI security advice?

You can trust us, we're the good guys

Ex-Microsoft engineer gets seven years after trying to hire hitman for double murder

Hint: If someone says they're an assassin on the dark web, they're probably not

Sleuths who cracked Zodiac Killer's cipher thank the crowd

Fifty-one years of community contributions, software, and clever cryptanalysis contributed

Meta accused of snarfing people's Snapchat data via traffic decryption

I ain't afraid of no ghosts, but in this case...