X

Timeline: A history of encryption and government backdoors (pictures)

George Washington, iPhone, and the history of encryption.

James Martin
James Martin is the Managing Editor of Photography at CNET. His photos capture technology's impact on society - from the widening wealth gap in San Francisco, to the European refugee crisis and Rwanda's efforts to improve health care. From the technology pioneers of Google and Facebook, photographing Apple's Steve Jobs and Tim Cook, Facebook's Mark Zuckerberg and Google's Sundar Pichai, to the most groundbreaking launches at Apple and NASA, his is a dream job for any documentary photography and journalist with a love for technology. Exhibited widely, syndicated and reprinted thousands of times over the years, James follows the people and places behind the technology changing our world, bringing their stories and ideas to life.
Laura Hautala Former Senior Writer
Laura wrote about e-commerce and Amazon, and she occasionally covered cool science topics. Previously, she broke down cybersecurity and privacy issues for CNET readers. Laura is based in Tacoma, Washington, and was into sourdough before the pandemic.
Expertise E-commerce, Amazon, earned wage access, online marketplaces, direct to consumer, unions, labor and employment, supply chain, cybersecurity, privacy, stalkerware, hacking. Credentials
  • 2022 Eddie Award for a single article in consumer technology
James Martin
Laura Hautala
screen-shot-2016-03-21-at-4-11-09-pm.png
1 of 10 Emanuel Leutze/The Metropolitan Museum of Art/Public Domain

All Writs Act

1789 -- All Writs Act is passed, giving US courts broad authority to write orders for all kinds of things. This is the law that the US District Court in California relied on to order Apple to write software that will help the FBI crack into the iPhone 5C previously owned by Syed Farook, one of the San Bernardino shooters. The tension springs from whether the law really allows the court to order Apple to create something that doesn't already exist to help with the FBI's investigation.

myk-78clipperchipmarkings.jpg
2 of 10

The Clipper Chip

1993 -- The US government proposes the use of the Clipper Chip, which would help law enforcement listen in on encrypted phone calls with a warrant. The chip was meant to act as a key that can only be turned by the government, but this angered civil liberties advocates, who argued it would lower the quality of American-made phones and violate consumers' privacy rights. Ultimately the proposal became outdated as digital technology progressed.

wires-wireless-spectrum-networks-networking-6507.jpg
3 of 10 James Martin/CNET

CALEA is passed

1994 -- Communications Assistance for Law Enforcement Act (CALEA) is passed, requiring telephone communications companies to assist in wiretapping phone lines. The law was expanded to cover Internet traffic in 2005, requiring Internet service providers to build in the ability to intercept user traffic. Both kinds of surveillance require a warrant. The law isn't being applied in the Apple-FBI conflict because it doesn't apply to data resting on a smartphone.

2048RSA.png
4 of 10 Wolfram Alpha

SSL 3.0

1996 -- SSL 3.0 is released. It's the software that gave rise to our current system for encrypting data as it flows over the Internet. But, not all your data flying across the Internet is encrypted. Civil liberties advocates and companies are developing more products for more easily establishing encrypted connections, and Canadian networking company Sandvine projects that more than 70 percent of the world's Internet traffic will be encrypted by the end of 2016.

Stop spying
5 of 10 © Ramin Talaie/Corbis

The Patriot Act

2001 -- The Patriot Act is passed in the aftermath of the September 11 terrorist attacks in the US. The act broadly increased authority for National Security Agency surveillance. Most notably in the encryption debate, it paved the way for the creation of secret FISA courts, which can give the government warrants for surveillance.

42-74391952.jpg
6 of 10 © XUXIAOLIN/Cpressphoto/Corbis, Xu xiaolin

Operation Aurora

2009 -- Operation Aurora. China hacks Google, targeting the Gmail accounts of human rights activists and hitting 20 companies in total as part of the cyberattack. This started a rift between Google and China, in which the search giant stopped censoring its results in China and moved the base of its operations out of mainland China to Hong Kong. Currently, Google services are extremely limited in mainland China.

42-25760361.jpg
7 of 10 EPA

BlackBerry surveillance in Saudi Arabia

2010 -- BlackBerry surveillance in Saudi Arabia. Research in Motion agrees to let the Saudi Arabian government access BlackBerry users messages. The agreement arose out of a conflict in which BlackBerry service appeared to have been disrupted inside the country. Known at the time for using strong data encryption for its messaging service and for routing email into Canadian servers that other governments couldn't access, the devices previously had a reputation for securing user data.

edward-snowden-john-oliver-02b.jpg
8 of 10 HBO/Screenshot by CNET

Snowden revelations

2013 -- Former NSA contractor Edward Snowden reveals the extent of government surveillance both of other countries and its own citizens. Central to these disclosures was the cooperation of seven major technology companies in making it easier to divulge user information to the NSA, which the agency then pored through using a computer program known as PRISM. The New York Times named these companies as Google, Microsoft, Yahoo, Facebook, Apple, AOL and PalTalk, saying the companies confirmed their cooperation with FISA-authorized requests for user data. These revelations gave rise to efforts to take user data out of the hands of companies, a strategy that Apple in particular has adopted.

Snowden, seen here, appeared on John Oliver's HBO show "Last Week Tonight" on April 5, 2015.

42-78397598.jpg
9 of 10 © Robert Schlesinger/dpa/Corbis

Encrypted messaging apps

2014 -- The rise of end-to-end encrypted messaging apps, like Signal, Telegram, WhatsApp, Line, Cyber Dust and Apple iMessaging. These all offer the option to send messages that remain encrypted at all times between two users' devices. Without end-to-end encryption, communications over the Internet are typically decrypted when they reach the servers of the service provider. That means companies like Facebook can read your messages and hand them over to law enforcement, too. But companies that offer end-to-end encryption don't have the ability to unscramble user messages and provide them to the authorities.

Encryption4K_Black_RGB.jpg
10 of 10 Alex Dragulescu

Encrypted data by default

2014 -- Apple and Google both announce they'll encrypt phone data by default. And here we are! The biggest smartphone manufacturers in the world make it known they won't have access to your data as it sits on your smartphone. Google later had to amend this announcement to say it would leave this decision in the hands of Android phone manufacturers.

More Galleries

My Favorite Shots From the Galaxy S24 Ultra's Camera
A houseplant

My Favorite Shots From the Galaxy S24 Ultra's Camera

20 Photos
Honor's Magic V2 Foldable Is Lighter Than Samsung's Galaxy S24 Ultra
magic-v2-2024-foldable-1383

Honor's Magic V2 Foldable Is Lighter Than Samsung's Galaxy S24 Ultra

10 Photos
The Samsung Galaxy S24 and S24 Plus Looks Sweet in Aluminum
Samsung Galaxy S24

The Samsung Galaxy S24 and S24 Plus Looks Sweet in Aluminum

23 Photos
Samsung's Galaxy S24 Ultra Now Has a Titanium Design
The Galaxy S24 Ultra in multiple colors

Samsung's Galaxy S24 Ultra Now Has a Titanium Design

23 Photos
I Took 600+ Photos With the iPhone 15 Pro and Pro Max. Look at My Favorites
img-0368.jpg

I Took 600+ Photos With the iPhone 15 Pro and Pro Max. Look at My Favorites

34 Photos
17 Hidden iOS 17 Features You Should Definitely Know About
Invitation for the Apple September iPhone 15 event

17 Hidden iOS 17 Features You Should Definitely Know About

18 Photos
AI or Not AI: Can You Spot the Real Photos?
img-1599-2.jpg

AI or Not AI: Can You Spot the Real Photos?

17 Photos