Interesting article from CNET on a leaked DEA memo saying that because of its encryption, “‘it is impossible to intercept iMessages between two Apple devices’ even with a court order approved by a federal judge.” I find this hard to believe. Apple probably didn’t design iMessage to be a Wickr or Silent Circle. The crypto is probably solid but the implementation is where faults usually lie. Perhaps Apple’s design is enough to thwart a casual intercepter but definitely not a government entity. Plus if an agency gets a hold of the physical iDevice, a quick warrant will solve any of those pesky crypto problems.
An investigation by the Drug Enforcement Administration (DEA) in February was temporarily thwarted when the surveillance targets began using Apple’s encrypted iMessage system, according to a document leaked to Cnet.
The intelligence note entitled “Apple’s iMessages: A Challenge For DEA Intercept,” reported on an investigation by the DEA’s San José branch office found that it was “impossible to intercept iMessages between two Apple devices” using “traditional trap and trace devices, pen register devices, or wiretapping data collection through Title III interceptions.”
Messages between iMessage and non-Apple products are sometimes tappable because they are transmitted via SMS protocols the memo states, but the most efficient method in such cases is to eavesdrop on the non-Apple end of the communication. The memo warns that records obtained from cooperative network providers may not show iMessage traffic.
Today’s post pic is from LowEndMac.com.