Home Government Tech Policy US attempt to force Facebook to provide Messenger voice data fails
US attempt to force Facebook to provide Messenger voice data fails Pixabay

A US Government bid to force Facebook to break the encryption on its Messenger client and obtain voice data that is claimed to be needed in a crime investigation has failed, with a US District Court in California ruling against the move.

Quoting sources, Reuters reported that the US request had failed, but did not offer any insight as to the judge's reasoning.

Were such an effort to be made by the Australian Government after its proposed encryption law takes effect, there would be no way of stopping it, even in the courts.

And there would be no need for the case to be under seal, because under the draft law such matters are not meant to be made public, with big fines for anyone who makes mention of it.

The voice data was sought by a joint task force of the US federal and state governments investigating the MS-13 international criminal outfit.

The task force tried to get the court to hold Facebook in contempt for refusing to hand over the voice data, with the case being heard in Fresno, California, 16 weeks before suspected members of the gang were indicted there.

Under US law, telecommunications companies have to give law enforcement authorities access to calls but if the data is sent over Internet infrastructure by an app, then that app is not covered.

The US Government was attempting to force Facebook to rewrite the Messenger software so that it could gain access to the suspect's voice conversation which is encrypted from end-to-end.

A somewhat similar situation arose in 2016, when the FBI went after Apple in a bid to obtain data on an iPhone 5C which belonged to one of two terrorists who had been involved in an attack in San Bernardino, California, in December 2015.

The FBI took Apple to court, demanding that the company rewrite its iOS operating system in order that the agency could gain access to the data on the iPhone.

As part of the evidence that Apple presented to the court, to show that this was a Herculean task, was a document written by its user privacy manager Erik Neuenschwander, detailing exactly how difficult and expensive it would be for the company to meet the FBI's demands.

Neuenschwander's document pointed out that even if Apple went through all the twists and turns he listed, there was no guarantee that the result would be what the FBI wanted.

The case ended before it could come up before a judge, with the FBI saying it had managed to gain access to the data by paying an external contractor to hack the device.

MS-13 or Mara Salvatrucha is a gang that had its origins in Los Angeles in the 1980s and spread to other parts of the US, Canada, Mexico, and Central America.

Reuters  said more information about the case could come to light after lawyers for some of the defendants were provided evidence submitted by the government.

CDAO SYDNEY TURNS 5 IN 2019

With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect