Tuesday, Jul 14, 2020 | Last Update : 01:11 PM IST

112th Day Of Lockdown

Maharashtra26992414450710482 Tamil Nadu142798925672032 Delhi113740913123411 Gujarat42808298062056 Karnataka4158116249759 Uttar Pradesh3813024203955 Telangana3622123679365 West Bengal3144819213956 Andhra Pradesh3110316464365 Rajasthan2493618630518 Haryana2192916637308 Madhya Pradesh1820713208653 Assam178081141741 Bihar1742112364125 Odisha13737925591 Jammu and Kashmir108276095179 Kerala8323425732 Punjab81785586199 Chhatisgarh4265320219 Jharkhand3963235131 Uttarakhand3608285647 Goa2583154014 Tripura209314752 Manipur16269700 Puducherry146878518 Himachal Pradesh124392710 Nagaland8453400 Chandigarh5884238 Arunachal Pradesh3871452 Meghalaya316462 Mizoram2331510 Sikkim166870
  Technology   In Other news  14 Jul 2018  Rights group questions DEA exploit of encrypted cellphones

Rights group questions DEA exploit of encrypted cellphones

AP
Published : Jul 14, 2018, 1:36 pm IST
Updated : Jul 14, 2018, 1:38 pm IST

US drug agents supplied unwitting cocaine-trafficking suspects in California with smartphones they thought were encrypted.

The advocacy group said it feared the technique could be abused to violate the privacy of non-criminals.(Representational Image/Source: Pixabay)
 The advocacy group said it feared the technique could be abused to violate the privacy of non-criminals.(Representational Image/Source: Pixabay)

In the first known case of its kind, US drug agents supplied unwitting cocaine-trafficking suspects in California with smartphones they thought were encrypted but had been rigged to allow eavesdropping, Human Rights Watch reported Friday.

The advocacy group said it feared the technique could be abused to violate the privacy of non-criminals.

“I think there are real debates to be had as to whether that is lawful or should be lawful,” said HRW researcher Sarah St. Vincent. “They could use this on peaceful protesters, (though) there’s no evidence of that.”

Human Rights Watch called on the Drug Enforcement Administration to explain whether the technique — employed in a 2012 southern California case involving a Canadian operating out of Puerto Vallarta, Mexico — is still being employed and whether its use is widespread.

The Canadian, John Krokos, pleaded guilty in 2015 to related felony charges with Los Angeles-based associates. He was sentenced to 138 months in prison.

DEA spokesman Wade Sparks in Washington DC, said at least one defendant is still awaiting trial.

“We can’t comment on the case or any of the techniques used until the case is fully adjudicated,” Sparks said, adding that the DEA was not going to “give out investigative techniques one way or the other, especially with ongoing cases awaiting adjudication.”

Court papers indicate undercover federal agents first supplied Krokos’ group with compromised Blackberry cellphones in 2010. Encrypted emails and other communications that the defendants thought were private were instead intercepted by law officers because they had decryption keys.

“I believe that, since the (Blackberries) had encryption technology on them, Krokos felt relatively safe in communicating over the devices,” a DEA agent who provided the phones to ring members said in an affidavit.

Available court documents suggest the DEA may not have obtained court orders for the wiretapping until after the booby-trapped devices had been delivered in exchanges typically occurring in parking lots in southern California.

Sparks would not comment on the issue: “The courts will determine that. That’s why the courts exist,”

The DEA also prevented the defendants from buying non-compromised encrypted BlackBerry devices from other sellers, including by arranging for their interception in Mexico, court papers show.

Human Rights Watch said Blackberry, the phone’s maker and service provider, said it had no involvement in the DEA operation and no ability to decrypt the encrypted phones used because the keys are controlled by the customer. The company did not respond Friday to an emailed request for comment or a phone message.

The FBI has recently renewed its push to persuade technology companies to give it a back door into encrypted devices for use in criminal investigations. Companies led by Apple have resisted the campaign, noting that such back doors can also be exploited by data thieves.

Tags: drug agents, encryption