Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»News and Events»Data can be obtained from encrypted messaging apps as shown by a newly discovered FBI document
    News and Events

    Data can be obtained from encrypted messaging apps as shown by a newly discovered FBI document

    By Leonny CorreaDecember 8, 20214 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    A recently discovered FBI training document was obtained earlier this month following a FOIA request filed by Property of the People, a US nonprofit dedicated to government transparency. It appears to contain training advice for what kind of data agents can obtain from the operators of encrypted messaging services and the legal processes they have to go through.

    The document shows that US law enforcement can gain limited access to the content of encrypted messages from secure messaging services like iMessage, Line, and WhatsApp, but not to messages sent via Signal, Telegram, Threema, Viber, WeChat, or Wickr.

    Dated to January 7, 2021, the document doesn’t include any new information but does a good job at providing an up-to-date summary of what type of information the FBI can currently obtain from each of the listed services.

    Past news reports have already exposed that the FBI has legal levers at its disposal to obtain various types of personal information even from secure messaging providers that often boast about providing increased privacy to their users. While the document confirms that the FBI can’t gain access to encrypted messages sent through some services, the other type of information they can glean from providers might still help authorities in other aspects of their investigations.

    The content of the document, which may be hard to read due to some font rendering issues, is also available in the table below.

    AppLegal Process & additional details
    iMessage (Apple)*Message content limited.
    *Subpoena: can render basic subscriber information.
    *18 USC §2703(d): can render 25 days of iMessage lookups and from a target number.
    *Pen Register: no capability.
    *Search Warrant: can render backups of a target device; if target uses iCloud backup, the encryption keys should also be provided with content return can also acquire iMessages from iCloud returns if target has enabled Messages in iCloud.
    Line*Message content limited.
    *Suspect’s and/or victim’s registered information (profile image, display name, email address, phone number, LINE ID, date of registration, etc.)
    *Information on usage.
    *Maximum of seven days worth of specified users’ text chats (Only when E2EE has not been elected and applied and only when receiving an effective warrant; however, video, picture, files, location, phone call audio and other such data will not be disclosed).
    Signal*No message content.
    *Date and time a user registered.
    *Last date of a user’s connectivity to the service.
    Telegram*No message content.
    *No contact information provided for law enforcement to pursue a court order. As per Telegram’s privacy statement, for confirmed terrorist investigations, Telegram may disclose IP and phone number to relevant authorities.
    Threema*No message content.
    *Hash of phone number and email address, if provided by user.
    *Push Token, if push service is used.
    *Public Key
    *Date (no time) of Threema ID creation.
    Date (no time) of last login.
    Viber*No message content.
    *Provides account (i.e. phone number)) registration data and IP address at time of creation.
    *Message history: time, date, source number, and destination number.
    WeChat*No message content.
    *Accepts account preservation letters and subpoenas, but cannot provide records for accounts created in China.
    *For non-China accounts, they can provide basic information (name, phone number, email, IP address), which is retained for as long as the account is active.
    WhatsApp*Message content limited.
    *Subpoena: can render basic subscriber records.
    *Court order: Subpoena return as well as information like blocked users.
    *Search warrant: Provides address book contacts and WhatsApp users who have the target in their address book contacts.
    *Pen register: Sent every 15 minutes, provides source and destination for each message.
    *If target is using an iPhone and iCloud backups enabled, iCloud returns may contain WhatsApp data, to include message content.
    Wickr*No message content.
    *Date and time account created.
    *Type of device(s) app installed on.
    *Date of last use.
    *Number of messages.
    *Number of external IDs (email addresses and phone numbers) connected to the account, bot not to plaintext external IDs themselves.
    *Avatar image.
    *Limited records of recent changes to account setting such as adding or suspending a device (does not include message content or routing and delivery information).
    *Wickr version number.
    The table above does not include details about Keybase, a recent end-to-end encrypted (E2EE) service that has been gaining in popularity. The service was acquired by video conferencing software maker Zoom in May 2020.

    Read original article

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleCompromised FBI Email Server Used to Send Spam Messages
    Next Article Improve your iPhone Privacy Settings

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Cybersecurity Alert: Risks of Abandoned Websites

    What You Need to Know About Emerging Data Privacy Trends in 2025

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d