Skip to main content

Feds seeking back doors to encrypted communications

Some in the technology industry may have rolled their eyes when countries like Saudi Arabia, United Arab Emirates, India, and others began to crack down on BlackBerry communications services because their law enforcement agencies can’t peer into encrypted message traffic—but now the Obama administration may be seeking much the same thing, but not limited to BlackBerry service. According to a report in the New York Times,, the Obama administration is seeking new federal law that would require providers of encrypted communications services—whether instant messaging, email, VoIP, or anything else—to provide unencrypted access to user communications in response to a court order. If enacted as law, it could be illegal for a U.S. software company to provide communications technology to which only the end users had decryption keys.

In the New York Times piece, FBI general counsel Valerie Caproni emphasized the agency is only considering the legislation in terms of lawful interception: federal agents would still need a court order to force communications operators to provide access to unencrypted information.

Recommended Videos

Nonetheless, the possibility of requiring providers to build back doors into secure communications technologies opens up the possibilities those back doors could be abused: for instance, attackers could uncover technical shortcomings in the access mechanism, the backdoors could be unlocked via industrial espionage or good old-fashioned social engineering. There is also the disturbing possibility the federal government could overstep or seek to redefine its powers to surveil communications, as the National Security Administration did during the Bush administration with warrantless wiretaps.

Of course, even if the U.S. were to enact a law mandating backdoors to encrypted communications, it would be challenged in court by civil liberties groups and (likely) by major U.S. business concerns who don’t want their trade secrets and operations potentially exposed to anyone—including the government or competitors. U.S. federal law also cannot control the actions of overseas companies: if such legislation were to be enacted, it’s possible software firms would merely locate their fully-encrypted products to nations that have no laws barring them. The legislation also faces potential First Amendment challenges; existing court precedent has found that the guarantee of freedom of speech protects encryption code.

The potential move is ironic for the Obama administration: one of Obama’s campaign points in 2008 was strengthening online privacy protections.

Geoff Duncan
Former Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
The new Reachy Mini robot can let kids turn play into innovation
The Reachy Mini robot.

The Reachy Mini is an exciting new desktop robot aimed primarily at developers, educators, students, and enthusiasts, or basically anyone interested in creative coding.

There are actually two of them -- Reachy Mini Lite ($299) and Reachy Mini Wireless ($449) -- and both were developed by the prominent AI platform Hugging Face following its recent acquisition of Pollen Robotics. 

Read more
If you’re itching for an HP OMEN MAX gaming laptop, this deal will save you $500
The HP Omen Max gaming laptop with Valorant on the screen.

We've recently published a stunningly positive review of the HP OMEN Max 16. It's got a list of "Pros" a mile long. The single, obligatory con is "Thick and heavy." Considering that it's a gaming laptop, that's practically the equivalent of saying a flashlight is too bright to look at. Thick, and a bit heavy, just comes with the territory. All of this is to say that the review was great and we're fans of the HP OMEN Max 16. As a deal hunter it made me want to go and see if I could find a deal on the HP OMEN Max 16 and I did, sort of. Right now you can get a customizable HP OMEN Max 16t — a laptop that, if it didn't have a separate store page, I would think is identical to the one we reviewed — with a $500 discount, no matter what settings you choose. With the base settings of the laptop, that discount brings it from $2,100 to just $1,600, but you're free to upgrade to your heart's content. Tap the button below to start customizing to your whimsy or keep reading for some advice on how to do so and what to expect from the 16t.

Buy Now

Read more
Google’s AI agent ‘Big Sleep’ just stopped a cyberattack before it started
Sundar Pichai

Google's AI agent, dubbed Big Sleep, has achieved a cybersecurity milestone by detecting and blocking an imminent exploit in the wild—marking the first time an AI has proactively foiled a cyber threat. Developed by Google DeepMind and Project Zero, Big Sleep identified a critical vulnerability in SQLite (CVE-2025-6965), an open-source database engine, that was on the verge of being exploited by malicious actors, allowing Google to patch it before damage occurred. “We believe this is the first time an AI agent has been used to directly foil efforts to exploit a vulnerability in the wild,” the company said.

Why it matters: As cyberattacks surge—costing businesses trillions annually—this breakthrough shifts defense from reactive patching to AI-driven prediction and prevention. It gives security teams a powerful new tool to stay ahead of hackers, potentially saving devices and data worldwide. CEO Sundar Pichai called it "a first for an AI agent—definitely not the last" according to Live Mint.

Read more