Encrypted Data on Device is not Easily Accessible

by Paul on November 14, 2017 - 12:33am


Time has changed, and everything is using electronic to make activities easier. Computers and smartphones are the important things that most people have nowadays. We can do anything just on our computer or even on our smartphones to do our job, sharing information, searching something and so on. There are many positive things, but there are always negative things coming up such as cyber crime. There are some people using the technology for committing a crime. The Federal Bureau of Investigation or FBI who is working in the network world has problems solving the case because they failed to access the encrypted devices in America (BBC, 2017).  Why could the FBI not unlock the encrypted devices?

Most devices contain end-to-end encryption. This system is planted in most gadgets or smartphones by companies to protect user data. The digital messages are scrambled as they are sent from one device and can only be unscrambled correctly by intended recipient with a shared key (Shivali, 2017). For example, usually the security system will ask some digits or numbers to access the data, but if FBI could access in a different way the security system would ask security questions that only the device user knows the answer to. This situation forced FBI to discuss with device companies to make lower security system on devices so that encrypted devices can be accessed by FBI, but the device companies have a rule to make user data secure. Recently debate between technology and law enforcement officials has been trying to solve encrypted communication (Shivali, 2017). That is why the revision of user device rights is needed. I think to make FBI access encrypted data easily will help cutting the difficulty of solving a case, so FBI and device companies should work together so that cyber crime will be decreased even faster.

Another problem is that FBI still cannot bypass the famous device people use. It is proved that The Federal Bureau of Investigation used professional hackers to crack the San Bernardino shooter’s iPhone, exploiting an unknown software flaw (Hall, 2016). That is why a case of cyber crime needs more time to be solved than common crime in real world. In example cases, FBI has high technology facilities, but they do not have many professional programmers who are capable of bypassing encrypted data. However, it is hard to hire programmers who are specialized in accessing encrypted data to help stop cyber crimes. Also, cyber crimes cannot be stopped quickly because the number of hackers who are involved in cyber crimes are also higher than the number of cyber security programmers (Levinson, 2011). I think this situation can be a motivation for people who are capable of accessing encrypted data or understand communication technology deeply so that they can work for cyber security in the future.

I think by working together with device companies, FBI can be solving cyber crime quickly and efficiently. Hiring professional programmer in order to be specialist in cyber world to access encrypted data in some cyber criminal cases is good idea. However the internet is already spreading out all over the world, so the distance and time would not be a problem to do anything that we want on computer or even smartphones and the number of device users will be increased every year, so it would make new cases of committing cyber crime increase too. Creating schools that are specialized in accessing encrypted data is also important, but it should be watched by the government so that it can help to enhance the national security system in the future for device users.



BBC, (2017) FBI failed to access 7,000 encrypted mobile devices

Sivali, ( 2017) This is a huge problem': FBI Director Christopher Wray claims the agency     
     couldn't access nearly 7,000 devices this year because of encryption

Hall, (2016) FBI used professional hackers to crack San Bernardino shooter's iPhone — Report

Levinson, (2011) Why Law Enforcement Can't Stop Hackers


About the author