Police Officials Tell Congress Encryption Hurts Their Ability To Fight Crime

The encryption debate returned to Congress on Tuesday.
Open Image Modal
Joshua Roberts / Reuters

WASHINGTON, April 19 (Reuters) - The growing use of strong default encryption on mobile devices and communications by criminal suspects is handicapping investigators' ability to pursue them, law enforcement officials told Congress on Tuesday, pressing Apple Inc and other companies that defend the technology as integral to protecting consumers.

Apple Inc and the FBI returned to Washington to testify before lawmakers about their heated disagreement over law enforcement access to encrypted devices, highlighted in the case of an iPhone used by a gunman in last December's Islamist militant-inspired shootings in San Bernardino, California.

The Federal Bureau of Investigation retreated last month from its high-profile pursuit of a court order that compelled Apple to help the agency unlock an iPhone 5c phone used by shooter Rizwan Farook. A still secret third party helped the government hack into it.

But the U.S. Department of Justice redoubled its efforts last week to use the courts to force Apple's cooperation in cracking encrypted iPhones by announcing plans to continue with an appeal in an unrelated New York drug case.

The problems posed by increasingly prevalent strong default encryption are affecting federal and local law enforcement investigations across the country, Amy Hess, executive assistant director for science and technology at the FBI, told a House Energy and Commerce subcommittee on Tuesday. Law enforcement officials and Apple executives previously testified to Congress on March 1.

Thomas Galati, chief of intelligence at the New York Police Department, said his investigators had been unable to open 67 Apple devices in a six-month period from October 2015 to March 2016. Those phones were implicated in 44 violent crimes 23 felonies, including ten homicides, two rapes, and an episode where an on-duty officer was shot, Galati said.

Apple general counsel Bruce Sewell was testifying on a separate panel before the committee, in which he would argue that any vulnerability built into its products would harm all of its users.

The shroud of secrecy still cloaking the method used on the San Bernardino phone has prompted criticism from security researchers who said Apple and others should be made aware of the flaw, in accordance with a White House vulnerabilities review process that favors disclosure.

But Obama administration sources have told Reuters the group that helped unlock the device has sole ownership of the method, making it highly unlikely the technique would be disclosed by the government to Apple or any other entity.

"I don't think relying on a third party is a good model," said Representative Diana DeGette of Colorado, the committee's top Democrat.

The FBI relies heavily on the "services and specialized skills that we can only get through the private industry, and that partnership is critical to our success," the FBI's Hess testified. (Reporting by Dustin Volz; editing by Grant McCool)

Our 2024 Coverage Needs You

As Americans head to the polls in 2024, the very future of our country is at stake. At HuffPost, we believe that a free press is critical to creating well-informed voters. That's why our journalism is free for everyone, even though other newsrooms retreat behind expensive paywalls.

Our journalists will continue to cover the twists and turns during this historic presidential election. With your help, we'll bring you hard-hitting investigations, well-researched analysis and timely takes you can't find elsewhere. Reporting in this current political climate is a responsibility we do not take lightly, and we thank you for your support.

to keep our news free for all.

Support HuffPost