- Elon Musk’s Cybertruck mocked after ball busts windows during demonstration Today 12:23 AM
- Pornhub has a bundle now, Disney+ style Thursday 11:27 PM
- Jacob Wohl’s dad is selling horny calendars of himself for the soldiers Thursday 11:10 PM
- Amanda Palmer dragged for ‘demanding’ coverage of her music Thursday 8:33 PM
- How to get free TikTok followers without downloading a virus Thursday 7:57 PM
- Trump Jr.s ‘Triggered’ topped best-seller’s list with help of RNC Thursday 7:41 PM
- FBI raided millionaire YouTuber’s home, allegedly took everything Thursday 6:55 PM
- A fake Labour party website is spreading disinformation in Britain Thursday 6:16 PM
- Twitter bans cricket club for posting ISIS content in apparent hack Thursday 6:12 PM
- This dad remade his daughter’s NSFW photo—and people are loving it Thursday 5:51 PM
- Teen allegedly posted ‘slave for sale’ Craigslist ad featuring his Black classmate Thursday 5:28 PM
- People are crushed that this teen love story might be a TikTok ‘joke’ Thursday 4:50 PM
- Is Jacob Wohl evading his Twitter ban with Jack Burkman’s account? Thursday 2:06 PM
- Biden’s most perplexing debate answers, explained Thursday 2:03 PM
- How to stream Colts vs. Texans on Thursday Night Football Thursday 12:52 PM
A damning report from the Washington Post describes how the agency grossly exaggerated the number of devices it couldn’t access to make a stronger argument for addressing “Going Dark,” or spreading encrypted software that blocks investigators’ access to digital data.
The bureau claimed investigators were locked out of almost 7,800 devices linked to crimes last year when the actual number is somewhere between 1,000 and 2,000. FBI Director Christopher Wray referenced the inflated figure in January when he called encrypted electronics an “urgent public safety issue.” Attorney General Jeff Sessions similarly cited the figures earlier this month.
“Last year, the FBI was unable to access investigation-related content on more than 7,700 devices—even though they had the legal authority to do so. Each of those devices was tied to a threat to the American people,” he said.
The FBI became aware of the inaccurate statistics about a month ago and launched an audit to determine the actual number. Early figures suggest it’s closer to 1,200 phones, though that’s expected to change as more information becomes available. Its latest audit will likely take weeks to complete.
The FBI acknowledged the mistake in a statement to the Post but blamed “programming errors.”
- How to encrypt an iPhone in seconds
- The best free VPN to maintain your privacy online
- Police are using the fingerprints of dead people to unlock iPhones
“The FBI’s initial assessment is that programming errors resulted in significant over-counting of mobile devices reported,’’ the FBI said in a statement. It went on to blame the use of three different datasets for causing phones to be counted more than once.
According to the report, only 880 encrypted phones couldn’t be unlocked in 2016. Many critics figured the jump in those numbers didn’t add up. It’s not clear if the figures from two years ago are still accurate.
The heated debate over whether law enforcement should be given tools to access encrypted devices connected to crimes was ignited following the 2015 terror attack in San Bernardino, California. The shooter’s phone, an iPhone 5C, was locked with a passcode. FBI agents struggled to get in and eventually resorted to asking Apple for a backdoor. The company refused and was sued. The FBI eventually dropped the charges after it gained access with help from an unidentified third party, but that did little to resolve the dispute.
Similar cases have surfaced over the years. Most recently, the FBI served Apple a search warrant to access the iPhone of Devin Kelley, who killed 26 people in Sutherland Springs, Texas, in November. Again, Apple refused. The FBI and other law enforcement authorities have resorted to using less traditional methods to unlock devices. It was recently discovered that police are using the fingers of dead people to unlock Apple’s TouchID sensors. And the State Department spent $15,000 on Greyshift, a black box designed to break into iPhones.
Phillip Tracy is a former technology staff writer at the Daily Dot. He's an expert on smartphones, social media trends, and gadgets. He previously reported on IoT and telecom for RCR Wireless News and contributed to NewBay Media magazine. He now writes for Laptop magazine.