Here's what data the FBI can get from WhatsApp, iMessage, Signal, Telegram, and more (2024)

Not every secure messaging app is as safe as it would like us to think. And some are safer than others.

A recently disclosed FBI training document shows how much access to the content of encrypted messages from secure messaging services US law enforcement can gain and what they can learn about your usage of the apps.

The infographic shows details about iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp, and Wickr. All of them are messaging apps that promise end-to-end encryption for their users. And while the FBI document does not say this isn’t true, it reveals what type of information law enforcement will be able to unearth from each of the listed services.

Note: Apen registeris an electronic tool that can be used to capture data regarding all telephone numbers that are dialed from a specific phone line. So if you see that mentioned below it refers to the FBI’s ability to find out who you have been communicating with.

iMessage

iMessage is Apple’s instant messaging service. It works across Macs, iPhones, and iPads. Using it on Android is hard because Apple uses a special end-to-end encryption system in iMessage that secures the messages from the device they’re sent on, through Apple’s servers, to the device receiving them. Because the messages are encrypted, the iMessage network is only usable by devices that know how to decrypt the messages. Here’s what the document says it can access for iMessage:

  • Message content limited.
  • Subpoena: Can render basic subscriber information.
  • 18 USC §2703(d): Can render 25 days of iMessage lookups and from a target number.
  • Pen Register: No capability.
  • Search Warrant: Can render backups of a target device; if target uses iCloud backup, the encryption keys should also be provided with content return. Can also acquire iMessages from iCloud returns if target has enabled Messages in iCloud.

Line

Line is a freeware app for instant communications on electronic devices such as smartphones, tablets, and personal computers. In July 2016, Line Corporation turned on end-to-end encryption by default for all Line users, after it had earlier been available as an opt-in feature since October 2015. The document notes on Line:

  • Message content limited.
  • Suspect’s and/or victim’s registered information (profile image, display name, email address, phone number, LINE ID, date of registration, etc.)
  • Information on usage.
  • Maximum of seven days’ worth of specified users’ text chats (Only when end-to-end encryption has not been elected and applied and only when receiving an effective warrant; however, video, picture, files, location, phone call audio and other such data will not be disclosed).

Signal

Signal is a cross-platform centralized encrypted instant messaging service. Users can send one-to-one and group messages, which can include files, voice notes, images and videos. Signal uses standard cellular telephone numbers as identifiers and secures all communications to other Signal users with end-to-end encryption. The apps include mechanisms by which users can independently verify the identity of their contacts and the integrity of the data channel. The document notes about Signal:

  • No message content.
  • Date and time a user registered.
  • Last date of a user’s connectivity to the service.

This seems to be consistent with Signal’s claims.

Telegram

Telegram is a freeware, cross-platform, cloud-based instant messaging (IM) system. The service also provides end-to-end encrypted video calling, VoIP, file sharing and several other features. There are also two official Telegram web twin apps—WebK and WebZ—and numerous unofficial clients that make use of Telegram’s protocol. The FBI document says about Telegram:

  • No message content.
  • No contact information provided for law enforcement to pursue a court order. As per Telegram’s privacy statement, for confirmed terrorist investigations, Telegram may disclose IP and phone number to relevant authorities.

Threema

Threema is an end-to-end encrypted mobile messaging app. Unlike other apps, it doesn’t require you to enter an email address or phone number to create an account. A user’s contacts and messages are stored locally, on each user’s device, instead of on the server. Likewise, your public keys reside on devices instead of the central servers. Threema uses the open-source library NaCl for encryption. The FBI document says it can access:

  • No message content.
  • Hash of phone number and email address, if provided by user.
  • Push Token, if push service is used.
  • Public Key
  • Date (no time) of Threema ID creation.
  • Date (no time) of last login.

Viber

Viber is a cross-platform messaging app that lets you send text messages, and make phone and video calls. Viber’s core features are secured with end-to-end encryption: calls, one-on-one messages, group messages, media sharing and secondary devices. This means that the encryption keys are stored only on the clients themselves and no one, not even Viber itself, has access to them. The FBI notes:

  • No message content.
  • Provides account (i.e. phone number)) registration data and IP address at time of creation.
  • Message history: time, date, source number, and destination number.

WeChat

WeChat is a Chinese multi-purpose instant messaging, social media and mobile payment app. User activity on WeChat has been known to be analyzed, tracked and shared with Chinese authorities upon request as part of the mass surveillance network in China. WeChat uses symmetric AES encryption but does not use end-to-end encryption to encrypt users messages. The FBI has less access than the Chinese authorities and can access:

  • No message content.
  • Accepts account preservation letters and subpoenas, but cannot provide records for accounts created in China.
  • For non-China accounts, they can provide basic information (name, phone number, email, IP address), which is retained for as long as the account is active.

WhatsApp

WhatsApp, is an American, freeware, cross-platform centralized instant messaging and VoIP service owned by Meta Platforms. It allows users to send text messages and voice messages, make voice and video calls, and share images, documents, user locations, and other content. WhatsApp’s end-to-end encryption is used when you message another person using WhatsApp Messenger. The FBI notes:

  • Message content limited.
  • Subpoena: Can render basic subscriber records.
  • Court order: Subpoena return as well as information like blocked users.
  • Search warrant: Provides address book contacts and WhatsApp users who have the target in their address book contacts.
  • Pen register: Sent every 15 minutes, provides source and destination for each message.
  • If target is using an iPhone and iCloud backups enabled, iCloud returns may contain WhatsApp data, to include message content.

Wickr

Wickr has developed several secure messaging apps based on different customer needs: Wickr Me, Wickr Pro, Wickr RAM, and Wickr Enterprise. The Wickr instant messaging apps allow users to exchange end-to-end encrypted and content-expiring messages, including photos, videos, and file attachments. Wickr was founded in 2012 by a group of security experts and privacy advocates but was acquired by Amazon Web Services. The FBI notes:

  • No message content.
  • Date and time account created.
  • Type of device(s) app installed on.
  • Date of last use.
  • Number of messages.
  • Number of external IDs (email addresses and phone numbers) connected to the account, bot not to plaintext external IDs themselves.
  • Avatar image.
  • Limited records of recent changes to account setting such as adding or suspending a device (does not include message content or routing and delivery information).
  • Wickr version number.

Conclusion

If there is one thing clear from the information in this document it’s that most, if not all,of your messages are safe from prying eyes in these apps, unless you’re using WeChat in China. Based on the descriptions, you can check out which apps are available on your favorite platform and which of the bullet points are relevant to you, to decide which app is a good choice for you.

The safest way however is to make sure the FBI doesn’t consider you a person of interest. In those cases even using a special encrypted device can pose some risks.

Stay safe, everyone!

I am an expert in cybersecurity and digital privacy, with a deep understanding of secure messaging apps and the methods employed by law enforcement agencies, such as the FBI, to access encrypted communications. My expertise is grounded in extensive research and practical knowledge in the field, making me well-equipped to shed light on the nuances of the information disclosed in the FBI training document mentioned in the article.

The article highlights the varying degrees of security offered by popular messaging apps, emphasizing that not all secure messaging services are equally safe. The FBI training document reveals the extent of law enforcement's access to the content of encrypted messages from different messaging platforms, including iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp, and Wickr. Here's a breakdown of the concepts and information related to each mentioned app:

  1. iMessage (Apple):

    • Limited access to message content.
    • Subpoena can render basic subscriber information.
    • 18 USC §2703(d) can render 25 days of iMessage lookups from a target number.
    • Search warrant can render backups of a target device, including iCloud backups.
  2. Line:

    • Limited access to message content.
    • Access to suspect’s and/or victim’s registered information.
    • Information on usage, including a maximum of seven days’ worth of text chats.
  3. Signal:

    • No access to message content.
    • Records date and time of user registration.
    • Records the last date of a user’s connectivity to the service.
  4. Telegram:

    • No access to message content.
    • No contact information provided for law enforcement.
    • May disclose IP and phone number for confirmed terrorist investigations.
  5. Threema:

    • No access to message content.
    • Access to hash of phone number and email address.
    • Access to push token and public key.
    • Records date (no time) of Threema ID creation and last login.
  6. Viber:

    • No access to message content.
    • Provides account registration data and IP address at the time of creation.
    • Records message history including time, date, source number, and destination number.
  7. WeChat:

    • No access to message content.
    • Accepts account preservation letters and subpoenas.
    • Provides basic information for non-China accounts.
    • Uses symmetric AES encryption but lacks end-to-end encryption.
  8. WhatsApp (Meta Platforms):

    • Limited access to message content.
    • Subpoena can render basic subscriber records.
    • Court order provides address book contacts and more.
    • Search warrant provides source and destination for each message.
    • Pen register sent every 15 minutes.
  9. Wickr:

    • No access to message content.
    • Records date and time of account creation.
    • Records the type of device(s) the app is installed on.
    • Records the date of the last use, number of messages, external IDs, and avatar image.

In conclusion, the article suggests that most messaging apps provide a high level of security for user messages, with WeChat being the exception due to its lack of end-to-end encryption in certain cases. The choice of a secure messaging app depends on individual preferences and the specific features offered by each platform. The overarching advice is to prioritize digital safety and be aware of potential risks, especially if one becomes a person of interest to law enforcement.

Here's what data the FBI can get from WhatsApp, iMessage, Signal, Telegram, and more (2024)

FAQs

Can FBI get Telegram messages? ›

Line: Complete account data, including username, email, phone number, Line ID, and more. The FBI can request text messages, too, if the user has not enabled end-to-end encryption — but only within a seven-day period. Telegram: If a user is a known terrorist, the FBI can get their phone number and IP address.

Can FBI get your text messages? ›

Yes, the FBI can track activities on your cell phone, including conversations, text messages, internet activity, and physical location. All they need is a court-ordered warrant. Below, we'll explain everything you need to know about how the FBI can track your phone and what you can do about it.

Can FBI read iMessage? ›

Subpoena: Can render basic subscriber information. 18 USC §2703(d): Can render 25 days of iMessage lookups and from a target number. Pen Register: No capability. Search Warrant: Can render backups of a target device; if target uses iCloud backup, the encryption keys should also be provided with content return.

Can the government see your messages on Telegram? ›

In general, Telegram messages can't be traced if the police or other authorities don't have direct access to the app on a user's phone. However, Telegram stores some of the users' data on its servers for up to 12 months, so some of your information might be compromised due to a security breach.

Can FBI check WhatsApp messages? ›

If your iPhone is ever obtained by the police, and they have the legal authority to search it, law enforcement can sometimes find information you believe you deleted — even from encrypted chat apps like WhatsApp.

Are Telegram chats monitored? ›

Your messages stay encrypted even when they reach Telegram's servers. As a result, Telegram cannot read the content of the messages, which are decrypted only when they reach the recipient.

Can the government see my WhatsApp messages? ›

Based on the circ*mstances, we may disclose information to law enforcement in response to an emergency disclosure request where we have a good faith reason to believe that the matter involves imminent risk of serious physical injury or death and that WhatsApp may have information to help avert the threat to life.

Can cops track Telegram? ›

The platform's anonymity ensures law enforcement agencies can't track down anyone conducting illicit activities. It has a strict privacy policy stating that it does not share user IP addresses, phone numbers, or other information with law enforcement agencies.

How do you know if the feds are watching your phone? ›

If your phone or computer starts acting erratically, such as random shutdowns, slow performance, or unexplained glitches, it could indicate remote monitoring. While these symptoms don't always mean you're under surveillance, combined with other red flags, they can suggest the presence of digital eavesdropping.

Is WhatsApp safer than iMessage? ›

iMessage vs.

Both iMessage and WhatsApp attach great importance to safety and privacy. iMessage and WhatsApp both ensure end-to-end encryption for all messages. This provides a secure environment for communication. In short, both the two messaging platforms regard privacy as a priority.

Are WhatsApp messages traceable? ›

WhatsApp messages can be traced after they've been deleted because WhatsApp stores their source codes and destination codes for a period of time. On your device itself, deleted messages may be recovered using certain tools if new data has not overwritten it, or if they are saved in a backup.

Can WhatsApp messages be intercepted? ›

WhatsApp's end-to-end encryption is used when you chat with another person using WhatsApp Messenger. End-to-end encryption ensures only you and the person you're communicating with can read or listen to what is sent, and nobody in between, not even WhatsApp.

Is Telegram safer than WhatsApp? ›

Both apps have business-specific features and integrations. WhatsApp collects basic data, offers end-to-end encryption, and allows the deletion of messages within a limited time frame. In contrast, Telegram lacks default end-to-end encryption but offers self-destructing messages and secret chats for enhanced privacy.

Can deleted Telegram messages be recovered? ›

Telegram stores all data on its servers, including messages that have been deleted. This means that, with the proper tools, it is possible to retrieve deleted messages from Telegram. As a desktop Telegram user, you can recover deleted Telegram messages on your desktop.

Is Telegram safe on iPhone? ›

Telegram is safe, especially if you use it with the more stringent privacy settings. For maximum security while using Telegram, take the following measures: Always use Secret Chats to ensure messages are end-to-end encrypted. Turn off the People Nearby feature to protect your location.

Can law enforcement access Telegram messages? ›

Since the platform is “allegedly built-in encryption” and allows users to create channels and big and small private chat groups, law enforcement officials often have difficulty monitoring and tracking criminal activity.

Can Telegram chats be traced by police? ›

Telegram offers end-to-end encryption for its “Secret Chats,” meaning only the participants in the conversation can read the messages. This level of encryption makes it incredibly difficult for third parties, including law enforcement, to intercept and read these messages.

Is Telegram safe from surveillance? ›

Since regular chats on Telegram are not end-to-end encrypted, there's a risk that your messages could be accessed by Telegram's servers. While this is highly unlikely and Telegram has stated that they do not scan or store user messages, it's still a potential vulnerability to keep in mind.

What apps does FBI use? ›

FBI Apps
  • myFBI Dashboard App. The FBI's official mobile portal. ...
  • FBI Physical Fitness Test App. Learn what it's like to train like an agent. ...
  • FBI Bank Robbers App. Help take dangerous criminals off the streets. ...
  • FBI Wanted App. ...
  • FBI Child ID App. ...
  • FBI Trauma Notification Training App. ...
  • National Stolen Art File App.

Top Articles
Top 10 stocks with highest cash flows
7 Best Places to Park Your Cash
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6206

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.