Appleâs iMessage platform has gone through its share of teething problems, ranging from issues related to iOS devices continuing to send and receive messages, even after being remotely wiped and having their SIM cards deactivated, to iOS saving deleted iMessage attachments to a recent exploit which involved denial of service attacks leading to a series of spam messages crashing the stock iOS Messages app. Although unpleasant and worrying, these problems are mostly localized.
When it comes to government surveillance, however, iMessage is bullet proof and the agile government, of course, has only recently become aware of this. According to an internal document from the Drug Enforcement Administration (DEA), instant messages exchanged between iOS users through the iMessage platform are âimpossible to interceptâ due to strong iCloud encryptionâ¦
CNET [1] has seen an internal DEA doc which discusses a February 2013 criminal investigation and warns that âit is impossible to intercept iMessages between two Apple devicesâ even with a court order approved by a federal judge.
Encryption used in Appleâs iMessage chat service has stymied attempts by federal drug enforcement agents to eavesdrop on suspectsâ conversations, an internal government document reveals.
The document states that âiMessages between two Apple devices are considered encrypted communication and cannot be intercepted, regardless of the cell phone service provider,â unless the messages are exchanged between an Apple device and a non-Apple device, in which case the agency says they âcan sometimes be intercepted, depending on where the intercept is placed.â
The DEA has apparently learned about this during some hard-hitting field work.
After drafting a request for a court order to perform real-time electronic surveillance, the agencyâs San Jose, California office learned that records of text messages provided by Verizon Wireless were useless to them as their suspect had been using iMessage, which bypasses the carrier infrastructure and the cellular text messaging platform altogether.
The incomplete communication lead Christopher Soghoian, a senior policy analyst at the American Civil Liberties Union, to remark that âAppleâs service is not designed to be government-proof.â
He also said:
Itâs much much more difficult to intercept than a telephone call or a text message. The government would need to perform an active man-in-the-middle attack.
The real issue is why the phone companies in 2013 are still delivering an unencrypted audio and text service to users.
Itâs disgraceful.
Disgraceful or not, whatâs really repugnant is that it took the government that long to gather evidence that iMessage is ânot designed to be government-proof.â
iMessage sending everything encrypted over the air was first mentioned  during the WWDC 2011 keynote. Nearly two years later, the DEA becomes aware of the fact.
With 300 billion messages sent through Internet protocols as of last Fall, it goes without saying that Apple employes secure end-to-end encryption in order to prevent eavesdropping.
Itâs been public knowledge for quite a while, but seemingly unbeknown to the authorities up until recently.
No comments:
Post a Comment