• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage

 | 

Taking over millions of developers exploiting an Open VSX Registry flaw

 | 

OneClik APT campaign targets energy sector with stealthy backdoors

 | 

APT42 impersonates cyber professionals to phish Israeli academics and journalists

 | 

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Digital ID
  • Intelligence
  • Laws and regulations
  • Security
  • Government wiretaps – You can’t stop what you can’t see

Government wiretaps – You can’t stop what you can’t see

Pierluigi Paganini July 06, 2016

Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.

Last week, a wiretap report from 2015 surfaced on the United States Courts website that suggests Americans are using less encryption to hide their activities online but the report may not tell the whole story.

According to the report, the number of federal and state wiretaps increased by 17 percent over 2014.  In fact, according to the report, not a single wiretap application was denied in 2015 for a total of 4,148 wiretaps in all.  Of those wiretaps, only seven taps encountered encryption, down from twenty-two in 2014.

Though the report suggests that encryption is waning among Americans, it is more likely that costs are driving law enforcement to be very selective in its wiretapping efforts.  The report Court’s report details the average cost of wiretaps increased an average 7 percent over 2014 pushing the cost to US$42,216 per tap and this doesn’t even account for the costs associated with breaking encryption.

Just this year, the FBI paid an unknown person or group at least US$1.3 million to break into the 5C iPhone of Syed Rizwan Farook, who murdered 14 people and wounded 22 others in a terrorist attack in 2015 in San Bernardino, California.

According to FBI Director, James Comey, the method purchased by the FBI can be used in future investigations where encryption is involved but it is unknown if the FBI is willing to share its methodology with state and local governments facing the same problems.  Without an easy button, state and local agencies have to weigh the costs of breaking encryption and the likelihood of a conviction if a wiretap unsuccessfully produces incriminating evidence.

The Court’s report also runs counter to warnings by John Brennan, director the US’s Central Intelligence Agency (CIA).

When asked why recent terrorist attacks in Pairs went undetected by the intelligence community he warned there were, “a lot of technological capabilities that are available right now that make it exceptionally difficult, both technically as well as legally, for intelligence and security services to have the insight they need.”

Making it even more difficult on the intelligence community, the Obama administration in November of last year suggested that “the time was not right” for legislation forcing technology companies to provide the government with methods of breaking encryption.

It’s not just the CIA raising concerns. National Security Agency (NSA) director James Clapper testified to Congress that the Islamic State is “very security conscious” and a “prolific user of strong encryption technology, posing a major challenge…”

According to clapper ISIL commonly makes use of end-to-end encryption creating a major obstacle for the intelligence community discerning the various plots by the terrorist groups.  Clapper supports strong encryption for businesses such as Apple and Google, but called that support into question by stating U.S. officials are trying to “threat the needle so that we ensure privacy and security.”

The Court’s report also reveals that 94 percent of wiretaps in 2015 involved intercepts of voice communications being made through the use of cellular phones. It is widely known that US intelligence snoops have access to those calls and is likely pushing many criminals to use other methods of communication outside of the telephone networks.

wiretaps

Revelations made public by Edward Snowden about the NSA is likely a key factor in the tech-savvy nature of criminals using modern technologies. According to Clapper, Snowden pushed encryption usage seven years forward as many searched for ways to circumvent the NSA’s wide-reaching espionage program.

As government’s around the world continue to struggle with the privacy versus security equation, it is likely those adoption encryption are only going to increase and this could be even more problematic for law enforcement that the intelligence agencies.  According to the Court’s report, a majority of wiretaps have been used in thwarting the illegal narcotics trade.

In 2015, wiretaps were responsible for about a 19 percent conviction rate of those arrested as the result of a wiretap.  The Eastern District of Virginia reported a somewhat better result of about 25 percent.  With results this low and costs being so high, the thought of encryption getting in the way all but indicates a need for selectivity in choosing who to wiretap.

It is clear that the debate between privacy and security will continue well into the future.  Like the old saying, security does not exist in nature and we can’t avoid danger if we don’t see it coming.  It’s a tough choice with no clear answer.  Civil liberties groups and the federal government are likely to spar endlessly on the debate that will likely not be settled until public sentiment settles and politicians are forced to take a final stand on the matter.  Perhaps, the biggest driver in swaying the debate one way or another is public safety and the threat of terrorism as James Clapper has warned.

The past few weeks the world has been rocked by a series of deadly terrorist attacks in Orlando, Turkey, Bangladesh, and Iraq.  This is likely to push the debate forward as investigations may reveal that the ability to tap ISIL communications could have prevented the attacks.

Written by: Rick GamacheRick Gamache

Rick Gamache is a freelance writer with 25 years’ experience in the cyber security field. His past work includes the Managing Director of Wapack Labs, CIO of the Red Sky Alliance, and lead FISMA auditor for the US Navy’s destroyer program.  Rick has written several high-level cyber and general risk reports with an emphasis on the Nordic countries, India, Russia, and Ukraine and has traveled extensively, speaking on strategic cyber threat intelligence matters as they relate global supply chains.

LinkedIn – https://www.linkedin.com/in/rick-gamache-cissp-021ab43

Twitter – https://twitter.com/thecissp

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – wiretaps, surveillance)


facebook linkedin twitter

encryption FBI ISIS law enforcement wiretap report wiretaps

you might also like

Pierluigi Paganini June 28, 2025
LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage
Read more
Pierluigi Paganini June 27, 2025
Taking over millions of developers exploiting an Open VSX Registry flaw
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage

    Malware / June 28, 2025

    Taking over millions of developers exploiting an Open VSX Registry flaw

    Hacking / June 27, 2025

    OneClik APT campaign targets energy sector with stealthy backdoors

    Hacking / June 27, 2025

    APT42 impersonates cyber professionals to phish Israeli academics and journalists

    APT / June 27, 2025

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT