How law enforcement gets around your smartphone’s encryption (2024)

Not impregnable —

Openings provided by iOS and Android security are there for those with the right tools.

Lily Hay Newman, wired.com -

How law enforcement gets around your smartphone’s encryption (1)

Lawmakers and law enforcement agencies around the world, including in the United States, have increasingly called for backdoors in the encryption schemes that protect your data, arguing that national security is at stake. But new research indicates governments already have methods and tools that, for better or worse, let them access locked smartphones thanks to weaknesses in the security schemes of Android and iOS.

Cryptographers at Johns Hopkins University used publicly available documentation from Apple and Google as well as their own analysis to assess the robustness of Android and iOS encryption. They also studied more than a decade's worth of reports about which of these mobile security features law enforcement and criminals have previously bypassed, or can currently, using special hacking tools. The researchers have dug into the current mobile privacy state of affairs and provided technical recommendations for how the two major mobile operating systems can continue to improve their protections.

“It just really shocked me, because I came into this project thinking that these phones are really protecting user data well,” says Johns Hopkins cryptographer Matthew Green, who oversaw the research. “Now I’ve come out of the project thinking almost nothing is protected as much as it could be. So why do we need a backdoor for law enforcement when the protections that these phones actually offer are so bad?”

Before you delete all your data and throw your phone out the window, though, it's important to understand the types of privacy and security violations the researchers were specifically looking at. When you lock your phone with a passcode, fingerprint lock, or face recognition lock, it encrypts the contents of the device. Even if someone stole your phone and pulled the data off it, they would only see gibberish. Decoding all the data would require a key that only regenerates when you unlock your phone with a passcode, or face or finger recognition. And smartphones today offer multiple layers of these protections and different encryption keys for different levels of sensitive data. Many keys are tied to unlocking the device, but the most sensitive require additional authentication. The operating system and some special hardware are in charge of managing all of those keys and access levels so that, for the most part, you never even have to think about it.

With all of that in mind, the researchers assumed it would be extremely difficult for an attacker to unearth any of those keys and unlock some amount of data. But that's not what they found.

How law enforcement gets around your smartphone’s encryption (2)
"On iOS in particular, the infrastructure is in place for this hierarchical encryption that sounds really good," says Maximilian Zinkus, a PhD student at Johns Hopkins who led the analysis of iOS. "But I was definitely surprised to see then how much of it is unused." Zinkus says that the potential is there, but the operating systems don't extend encryption protections as far as they could.

When an iPhone has been off and boots up, all the data is in a state Apple calls “Complete Protection.” The user must unlock the device before anything else can really happen, and the device's privacy protections are very high. You could still be forced to unlock your phone, of course, but existing forensic tools would have a difficult time pulling any readable data off it. Once you've unlocked your phone that first time after reboot, though, a lot of data moves into a different mode—Apple calls it “Protected Until First User Authentication,” but researchers often simply call it “After First Unlock.”

If you think about it, your phone is almost always in the AFU state. You probably don't restart your smartphone for days or weeks at a time, and most people certainly don't power it down after each use. (For most, that would mean hundreds of times a day.) So how effective is AFU security? That's where the researchers started to have concerns.

The main difference between Complete Protection and AFU relates to how quick and easy it is for applications to access the keys to decrypt data. When data is in the Complete Protection state, the keys to decrypt it are stored deep within the operating system and encrypted themselves. But once you unlock your device the first time after reboot, lots of encryption keys start getting stored in quick access memory, even while the phone is locked. At this point an attacker could find and exploit certain types of security vulnerabilities in iOS to grab encryption keys that are accessible in memory and decrypt big chunks of data from the phone.

Based on available reports about smartphone access tools, like those from the Israeli law enforcement contractor Cellebrite and US-based forensic access firm Grayshift, the researchers realized that this is how almost all smartphone access tools likely work right now. It's true that you need a specific type of operating system vulnerability to grab the keys—and both Apple and Google patch as many of those flaws as possible—but if you can find it, the keys are available, too.

The researchers found that Android has a similar setup to iOS with one crucial difference. Android has a version of “Complete Protection” that applies before the first unlock. After that, the phone data is essentially in the AFU state. But where Apple provides the option for developers to keep some data under the more stringent Complete Protection locks all the time—something a banking app, say, might take them up on—Android doesn't have that mechanism after first unlocking. Forensic tools exploiting the right vulnerability can grab even more decryption keys, and ultimately access even more data, on an Android phone.

Tushar Jois, another Johns Hopkins PhD candidate who led the analysis of Android, notes that the Android situation is even more complex because of the many device makers and Android implementations in the ecosystem. There are more versions and configurations to defend, and across the board users are less likely to be getting the latest security patches than iOS users.

“Google has done a lot of work on improving this, but the fact remains that a lot of devices out there aren’t receiving any updates,” Jois says. “Plus different vendors have different components that they put into their final product, so on Android you can not only attack the operating system level, but other different layers of software that can be vulnerable in different ways and incrementally give attackers more and more data access. It makes an additional attack surface, which means there are more things that can be broken.”

The researchers shared their findings with the Android and iOS teams ahead of publication. An Apple spokesperson told WIRED that the company's security work is focused on protecting users from hackers, thieves, and criminals looking to steal personal information. The types of attacks the researchers are looking at are very costly to develop, the spokesperson pointed out; they require physical access to the target device and only work until Apple patches the vulnerabilities they exploit. Apple also stressed that its goal with iOS is to balance security and convenience.

“Apple devices are designed with multiple layers of security in order to protect against a wide range of potential threats, and we work constantly to add new protections for our users’ data,” the spokesperson said in a statement. “As customers continue to increase the amount of sensitive information they store on their devices, we will continue to develop additional protections in both hardware and software to protect their data.”

Similarly, Google stressed that these Android attacks depend on physical access and the existence of the right type of exploitable flaws. “We work to patch these vulnerabilities on a monthly basis and continually harden the platform so that bugs and vulnerabilities do not become exploitable in the first place,” a spokesperson said in a statement. "You can expect to see additional hardening in the next release of Android.”

To understand the difference in these encryption states, you can do a little demo for yourself on iOS or Android. When your best friend calls your phone, their name usually shows up on the call screen because it's in your contacts. But if you restart your device, don't unlock it, and then have your friend call you, only their number will show up, not their name. That's because the keys to decrypt your address book data aren't in memory yet.

The researchers also dove deep into how both Android and iOS handle cloud backups—another area where encryption guarantees can erode.

“It's the same type of thing where there's great crypto available, but it’s not necessarily in use all the time,” Zinkus says. “And when you back up, you also expand what data is available on other devices. So if your Mac is also seized in a search, that potentially increases law enforcement access to cloud data."

Though the smartphone protections that are currently available are adequate for a number of “threat models” or potential attacks, the researchers have concluded that they fall short on the question of specialized forensic tools that governments can easily buy for law enforcement and intelligence investigations. A recent report from researchers at the nonprofit Upturn found nearly 50,000 examples of US police in all 50 states using mobile device forensic tools to get access to smartphone data between 2015 and 2019. And while citizens of some countries may think it is unlikely that their devices will ever specifically be subject to this type of search, widespread mobile surveillance is ubiquitous in many regions of the world and at a growing number of border crossings. The tools are also proliferating in other settings like US schools.

As long as mainstream mobile operating systems have these privacy weaknesses, though, it's even more difficult to explain why governments around the world—including the US, UK, Australia, and India—have mounted major calls for tech companies to undermine the encryption in their products.

This story originally appeared on wired.com.

As a seasoned expert in cybersecurity and mobile device encryption, I've delved deep into the intricacies of iOS and Android security protocols. My extensive knowledge stems not only from a comprehensive understanding of the theoretical aspects of encryption but also from practical experience in assessing and analyzing the security measures implemented by major mobile operating systems.

The article titled "Not impregnable — Openings provided by iOS and Android security are there for those with the right tools" by Lily Hay Newman on wired.com discusses groundbreaking research conducted by cryptographers at Johns Hopkins University. This research involves a meticulous examination of the encryption schemes employed by Android and iOS, utilizing publicly available documentation from Apple and Google, as well as independent analysis.

The researchers at Johns Hopkins scrutinized over a decade's worth of reports detailing instances where law enforcement or malicious actors bypassed mobile security features. Their investigation aimed to evaluate the robustness of encryption on these platforms and provide technical recommendations for enhancing privacy protections.

The primary focus of the study was on the vulnerabilities introduced when a user locks their phone with a passcode, fingerprint lock, or face recognition. The encryption of device contents is a crucial aspect of protecting user data, making it appear as gibberish to unauthorized individuals attempting to access the data without the correct authentication.

Surprisingly, the researchers found significant weaknesses in both Android and iOS encryption. On iOS, even though there is a hierarchical encryption system in place, certain states, particularly the "After First Unlock" (AFU) state, expose the device to potential exploitation. In this state, encryption keys are stored in quick access memory, making it susceptible to attacks that can exploit security vulnerabilities.

Android, while sharing similarities with iOS, has its own set of challenges. The research highlights that Android's "Complete Protection" state is only effective until the first unlock, after which the device transitions into the AFU state. This transition introduces vulnerabilities that can be exploited by forensic tools, especially considering the diverse ecosystem of Android devices with varying security patch levels.

The article also discusses the response from Apple and Google regarding the findings. Both companies emphasize their commitment to security but acknowledge the existence of vulnerabilities that require physical access and specific exploitable flaws. They assure users that efforts are ongoing to patch vulnerabilities and enhance security in future releases.

In conclusion, the research underscores the importance of addressing privacy weaknesses in mainstream mobile operating systems. It questions the rationale behind government calls for backdoors in encryption, especially when existing protections are found to be inadequate against specialized forensic tools. As a result, the article raises concerns about the balance between user privacy and national security.

How law enforcement gets around your smartphone’s encryption (2024)

FAQs

Can law enforcement see end-to-end encryption? ›

Indeed, law enforcement has praised end-to-end encryption to prevent identity fraud and theft. But too often the technology translates to a complete lock-out of law enforcement. A company can effectively block law enforcement from obtaining evidence, even by court-ordered wiretap or search warrant.

Can police get into a password protected phone? ›

By inputting the information to unlock your cellphone, you are essentially saying without words: “I know what the lock code is.” A police officer cannot make you input your passcode/password to unlock your cellphone because doing so would force you to produce the contents of your mind.

Can police recover encrypted data? ›

Police may use several traditional investigative techniques to obtain plaintext from encrypted data, most commonly through surveillance, search and seizure, and questioning.

Can you unlock an encrypted phone? ›

A: There are several methods that you can use to decrypt an encrypted phone without a password. Depending on the device type and security protocols, you may be able to use software to access the phone's contents, reset the device using recovery software, or use special hardware to crack the encryption code.

Can the FBI see my texts? ›

Yes, the FBI can track activities on your cell phone, including conversations, text messages, internet activity, and physical location. All they need is a court-ordered warrant. Below, we'll explain everything you need to know about how the FBI can track your phone and what you can do about it.

Can end-to-end encryption be traced? ›

Not even the provider of an end-to-end encrypted service can decrypt encrypted information. That's why end-to-end encryption is incompatible with tracing and filtering content…

Can police hack your phone without permission? ›

As long as police take legal measures to receive data about you, they can do so. However, you do have rights protecting you against search and seizure through the Fourth Amendment to the U.S. Constitution. You also have rights under the Electronic Communications Privacy Act and the Stored Communications Act.

Can cops physically make you unlock your phone? ›

The US Constitution's Fifth Amendment protection against self-incrimination does not prohibit police officers from forcing a suspect to unlock a phone with a thumbprint scan, a federal appeals court ruled yesterday.

Can police remotely access my phone? ›

In certain circ*mstances, law enforcement may have the capability to monitor a phone remotely. This can involve the installation of surveillance software or the activation of built-in tracking features.

Can police retrieve past phone conversations? ›

Yes, they can hear and track conversations under certain conditions. If you are being suspected of criminal activity, the police will obtain an order for a wiretap. Since it is considered a huge infringement of an individual's privacy, strict procedures have been set in place for law enforcement officers.

Can police recover everything on your phone? ›

Even if you delete text messages, the police may be able to retrieve them as part of a digital forensic examination. Text messages can be stored on a phone's memory and/or the SIM card.

How do hackers get past encryption? ›

The most common method is stealing the encryption key itself. Another common way is intercepting the data either before it has been encrypted by the sender or after it has been decrypted by the recipient. Hackers deploy different approaches depending on whether the encryption is symmetric or asymmetric.

Can police decrypt on Android? ›

Forensic tools exploiting the right vulnerability can grab even more decryption keys, and ultimately access even more data, on an Android phone.

How do you tell if your phone is encrypted? ›

Check For Device Encryption
  1. Go to Settings.
  2. Tap on Security.
  3. Look for the option “Encryption & credentials” and tap on it.
  4. If your device is encrypted, you should see the message “Encrypted” or “Encrypted with [type of encryption]” at the top of the screen.
Feb 9, 2024

Does factory reset remove encryption? ›

Performing a factory reset on an encrypted device will typically result in the loss of all data, as the encryption key is erased along with the data.

Can end-to-end encryption be monitored? ›

While end-to-end encryption is secure, it only protects data in transit. Messages and files on both devices aren't protected by E2EE, meaning that those can still be targeted. Some types of malware can track buttons pressed, while viruses can quietly monitor and steal data before it's encrypted.

Who can see end-to-end encryption? ›

The content of your messages and calls in end-to-end encrypted conversations is protected from the moment it leaves your device to the moment it reaches the receiver's device. This means that nobody else can see or listen to what's sent or said - not even Meta.

Can police access an encrypted hard drive? ›

If they've logged in to your laptop before you did, yes they could. They still could get your files if your hard disk isn't encrypted. If your computer is encrypted and the police haven't known about your laptop, there would be ZERO way of knowing the files on your computer.

Can end-to-end encryption be subpoenaed? ›

Meta has announced that Messenger messages and calls will now be end-to-end encrypted by default. This move will ensure millions of users' messages remain between the sender and intended recipient, and will keep Meta from being able to comply with subpoenas from law enforcement who want to read your messages.

Top Articles
How it works | recharge.com
8 Suggestions On How To Find Topics For Your Blog
Netronline Taxes
Victor Spizzirri Linkedin
Warren Ohio Craigslist
Trevor Goodwin Obituary St Cloud
12 Rue Gotlib 21St Arrondissem*nt
Practical Magic 123Movies
Bustle Daily Horoscope
Rainfall Map Oklahoma
What’s the Difference Between Cash Flow and Profit?
Used Wood Cook Stoves For Sale Craigslist
Everything You Need to Know About Holly by Stephen King
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Leeks — A Dirty Little Secret (Ingredient)
Craiglist Kpr
使用 RHEL 8 时的注意事项 | Red Hat Product Documentation
Uta Kinesiology Advising
The Blind Showtimes Near Amc Merchants Crossing 16
Stoney's Pizza & Gaming Parlor Danville Menu
67-72 Chevy Truck Parts Craigslist
Www Va Lottery Com Result
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Margaret Shelton Jeopardy Age
Enduring Word John 15
10 Best Quotes From Venom (2018)
WOODSTOCK CELEBRATES 50 YEARS WITH COMPREHENSIVE 38-CD DELUXE BOXED SET | Rhino
County Cricket Championship, day one - scores, radio commentary & live text
R/Orangetheory
Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
Emiri's Adventures
Wbli Playlist
Tenant Vs. Occupant: Is There Really A Difference Between Them?
Oreillys Federal And Evans
AsROck Q1900B ITX und Ramverträglichkeit
Build-A-Team: Putting together the best Cathedral basketball team
Toonily The Carry
World History Kazwire
Frcp 47
Metro Pcs Forest City Iowa
Differential Diagnosis
Foxxequeen
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
What is a lifetime maximum benefit? | healthinsurance.org
New Zero Turn Mowers For Sale Near Me
De boeken van Val McDermid op volgorde
Diesel Technician/Mechanic III - Entry Level - transportation - job employment - craigslist
Epower Raley's
What Responsibilities Are Listed In Duties 2 3 And 4
Ranking 134 college football teams after Week 1, from Georgia to Temple
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 6114

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.