{"id":1517,"date":"2015-11-18T18:36:06","date_gmt":"2015-11-18T18:36:06","guid":{"rendered":"http:\/\/ediscovery.drivesaversdatarecovery.com\/?p=490"},"modified":"2026-03-31T11:32:40","modified_gmt":"2026-03-31T18:32:40","slug":"computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/","title":{"rendered":"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>Originally published by\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/553679\/feds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html\"><strong>Computerworld<\/strong><\/a>.<\/em><\/p>\n<h2>U.S.-financed Open Technology Fund supports privately built encryption and other apps<\/h2>\n<p>U.S. government funds have recently been used to support the creation and maintenance of commercially available smartphone encryption apps, according to public records.<\/p>\n<p>At the same time, U.S. security officials and some elected officials have complained to software makers that their encryption software allows terror groups to communicate over the Internet in secret.<a href=\"https:\/\/www.csoonline.com\/article\/553635\/paris-attacks-demand-wake-up-call-on-smartphone-encryption.html\"> Some experts have even tied encryption and darknet communications<\/a> to deadly attacks like the one by ISIS in Paris last week.<\/p>\n<p>The U.S.-financed Open Technology Fund (OTF) was created in 2012 and supports privately built encryption and other apps to &#8220;develop open and accessible technologies to circumvent censorship and surveillance, and thus promote human rights and open societies,&#8221; according to the <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_14478708584859&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=https%3A%2F%2Fwww.opentech.fund%2Fabout%2Fprogram&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=OTF%27s%20website\" target=\"_blank\" rel=\"noopener noreferrer\">OTF&#8217;s website<\/a>.<\/p>\n<p>In one example, the OTF provided $1.3 million to encryption app maker <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787087354810&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=https%3A%2F%2Fwhispersystems.org%2F&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=Open%20Whisper%20Systems\" target=\"_blank\" rel=\"noopener noreferrer\">Open Whisper Systems<\/a> in 2013 and 2014. The San Francisco-based company <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787089679511&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=https%3A%2F%2Fwww.opentech.fund%2Fproject%2Fopen-whisper-systems&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=produced%20Signal%2C%20Redphone%20and%20TextSecure%20smartphone%20apps\" target=\"_blank\" rel=\"noopener noreferrer\">produced Signal, Redphone and TextSecure smartphone apps<\/a> to provide various encryption capabilities. Signal recently combined TextSecure for encrypted text messaging with RedPhone for encrypted Voice over IP. The software is available for both iOS and Android smartphones.<\/p>\n<p>Both Signal and Redphone were named among the five &#8220;safest&#8221; encryption apps by ISIS in a tech tutorial that was circulated in January, according to a report in the <em><a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787091633013&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=http%3A%2F%2Fwww.wsj.com%2Farticles%2Fislamic-state-teaches-tech-savvy-1447720824&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=Wall%20Street%20Journal\" target=\"_blank\" rel=\"noopener noreferrer\">Wall Street Journal<\/a><\/em>. The ISIS tutorial was intended to keep ISIS followers&#8217; communications out of the reach of government surveillance. It listed 30 encryption apps, ranking about half of them as &#8220;unsafe&#8221; for ISIS followers to use.<\/p>\n<p>Open Whisper Systems could not be reached to comment on Tuesday. The company is supported and owned by a developer community, including founder Moxie Marlinspike. In tweets and other messages, the company has supported National Security Agency leaker Edward Snowden, and <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787093136214&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=https%3A%2F%2Ftwitter.com%2FSnowden%2Fstatus%2F661313394906161152&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=Snowden%20recently%20tweeted%3A\" target=\"_blank\" rel=\"noopener noreferrer\">Snowden recently tweeted<\/a>: &#8220;I use Signal every day.&#8221;<\/p>\n<p>The OTF had no comment on its funding of encryption apps and referred a reporter to its website for information about its activities. On its site, the <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787094952115&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=https%3A%2F%2Fwww.opentech.fund%2Fprojects&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=OTF%20lists%20a%20selection%20of%20projects\" target=\"_blank\" rel=\"noopener noreferrer\">OTF lists a selection of projects<\/a> it has supported, listing 22 in addition to Open Whisper Systems. The maximum amount of financial support per year is $900,000, but many projects are in the range of $100,000 to $200,000.<\/p>\n<h3>Encryption supporters and detractors<\/h3>\n<p>Encryption app developers proudly support and promote their apps to help improve privacy for average users, especially in light of disclosures in 2014 by Snowden of widespread government surveillance.<\/p>\n<p><a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787097136916&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=http%3A%2F%2Fwww.apple.com%2F&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=Apple\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> and <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787098225517&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=http%3A%2F%2Fwww.google.com%2F&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=Google\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> have also supported disk-level encryption in recent iOS and Android releases. The companies have noted that they have no access to the decryption keys, which are kept on the smartphones themselves. Apple issued an explanation of its <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787100471918&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=http%3A%2F%2Fwww.apple.com%2Fprivacy%2F&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=privacy%20policy\" target=\"_blank\" rel=\"noopener noreferrer\">privacy policy<\/a> related to encryption as long ago as September 2014.<\/p>\n<p>Also about a year ago, FBI Director <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787102411919&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=https%3A%2F%2Fwww.rt.com%2Fusa%2F190980-comey-fbi-encryption-phones%2F&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=James%20Comey%20called%20for%20a%20public%20debate\" target=\"_blank\" rel=\"noopener noreferrer\">James Comey called for a public debate<\/a>\u00a0about the need for access to a criminal&#8217;s or terrorist&#8217;s device, subject to a judge&#8217;s warrant, saying such access could &#8220;protect the lives of people of all kinds.&#8221;<\/p>\n<p>More recently, <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787105272620&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=http%3A%2F%2Fwww.judiciary.senate.gov%2Fimo%2Fmedia%2Fdoc%2F07-08-15%2520Yates%2520and%2520Comey%2520Joint%2520Testimony1.pdf&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=in%20July%20before%20the%20U.S.%20Senate%20Judiciary%20Committee\" target=\"_blank\" rel=\"noopener noreferrer\">in July before the U.S. Senate Judiciary Committee<\/a>, Comey and Deputy Attorney General Sally Yates described deficiencies in the 1994 Communications Assistance for Law Enforcement Act (CALEA) in allowing surveillance of newer technologies such as email, Internet messages and social networking sites.<\/p>\n<p>&#8220;The harms resulting from the inability of companies to comply with court-ordered surveillance warrants are not abstract and have very real consequences,&#8221; the two officials said in a prepared statement. &#8220;The challenges posed by the Going Dark problem [of using encryption to evade detection] are grave, growing and extremely complex.&#8221;<\/p>\n<p>Although their statements seemed to support revisions to CALEA, a Department of Justice (DOJ) spokeswoman on Tuesday said the agency is not currently seeking legislation to address encryption remedies.<\/p>\n<p>Following Friday&#8217;s attacks in Paris in which 129 people died and many more were injured, Attorney General Loretta Lynch told reporters on Monday that terrorists have used &#8220;any means to communicate, including encrypted means&#8230;. We need to do everything we can to protect the American people. We are pursuing a number of options.&#8221;<\/p>\n<p>She said the DOJ is &#8220;in discussions with industry to look at ways where they can provide us, lawfully, information while preserving privacy.&#8221;<\/p>\n<p>Sen. Dianne Feinstein, D-Calif., also on Monday <a href=\"http:\/\/api.viglink.com\/api\/click?format=go&amp;jsonp=vglnk_144787107669421&amp;key=f6962bb9927d153082cdc6b572121599&amp;libId=ih54wdlk010113ap000DAuc4r4sfrzdpb&amp;loc=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F3005983%2Fencryption%2Ffeds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html&amp;v=1&amp;out=http%3A%2F%2Fwww.msnbc.com%2Fandrea-mitchell-reports%2Fwatch%2Ffeinstein---i-ve-never-been-more-concerned--567674435736&amp;title=Feds%20fund%20encryption%20apps%20that%20could%20cloak%20terrorists%20%7C%20Computerworld&amp;txt=told%20Andrea%20Mitchell%20on%20MSNBC\" target=\"_blank\" rel=\"noopener noreferrer\">told Andrea Mitchell on MSNBC<\/a> that she has met with chief counsels of most of the biggest software companies to find legal ways that would allow intelligence authorities to break encryption when monitoring terrorism.<\/p>\n<p>&#8220;I have asked for help,&#8221; Feinstein said. &#8220;I haven&#8217;t gotten any help. I think that Silicon Valley has to take a look at their products, because if you create a product that allows evil monsters to communicate in this way, to behead children, to strike innocents, whether it&#8217;s at a game in a stadium, in a small restaurant in Paris, or take down an airliner, that&#8217;s a big problem. So we need high tech&#8217;s help in securing an Internet that even with a court order, you can&#8217;t get to what they&#8217;re saying. That&#8217;s a big problem.&#8221;<\/p>\n<p>Representatives for Feinstein and Lynch were asked to comment about the use of OTF funds to support encryption apps, but didn&#8217;t immediately respond.<\/p>\n<h3>Finding a back door called impractical<\/h3>\n<p>While the threat of terrorism cloaked in secrecy by encryption is on the minds of policymakers, some software makers view attempts to gain backdoor access to encryption keys as both impractical and potentially harmful to privacy rights.<\/p>\n<p>Security officials &#8220;will always be chasing around, even if you are able to get a court order, because you never know who to go after,&#8221; said Rene Novoa, senior manager of forensics and e-discovery at DriveSavers, a data recovery company.<\/p>\n<p>&#8220;I don&#8217;t think getting access to decryption keys is a good solution,&#8221; he said. &#8220;If you allow law enforcement to have the keys, you&#8217;ll also see the bad guys getting the keys. It can work both ways and you have to be careful what you ask for.&#8221;<\/p>\n<p>Novoa sometimes provides expert testimony in court cases on behalf of prosecutors who need access to data on smartphones. Instead of finding ways around encryption, he urged security and intelligence officials to concentrate on social networks where communications are in public to follow terrorists.<\/p>\n<p>&#8220;Not everything is done in encryption on the dark web, &#8221; he said.<\/p>\n<p>&#8220;I definitely think government officials are talking about encryption now because they are trying to show the public they are doing something about terrorism,&#8221; he said. &#8220;They say a lot of people will die because they can&#8217;t eavesdrop. It&#8217;s designed to get people talking and thinking, but it&#8217;s actually scaring us.&#8221;<\/p>\n<p>Urging software makers to release decryption keys is &#8220;impractical and it&#8217;s time and money spent in the wrong direction,&#8221; Novoa added.<\/p>\n<p><em>Read more at:\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/553679\/feds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html\">http:\/\/www.computerworld.com\/article\/3005983\/encryption\/feds-fund-encryption-apps-that-some-officials-say-could-cloak-terrorists.html<\/a><\/em><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Originally published by\u00a0Computerworld. U.S.-financed Open Technology Fund supports privately built encryption and other apps U.S. government funds have recently been used to support the creation and maintenance of commercially available smartphone encryption apps, according to public records. At the same time, U.S. security officials and some elected officials have complained to software makers that their&hellip;","protected":false},"author":3,"featured_media":48051,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[51],"tags":[],"post_series":[],"class_list":["post-1517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press-coverage","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-18T18:36:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T18:32:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2015\/11\/AdobeStock_612624700-scaled-e1697694346400.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1046\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex Hagan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Hagan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/\"},\"author\":{\"name\":\"Alex Hagan\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/70300a1f6ae9c2cdfe661c8214b5ff59\"},\"headline\":\"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists\",\"datePublished\":\"2015-11-18T18:36:06+00:00\",\"dateModified\":\"2026-03-31T18:32:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/\"},\"wordCount\":1161,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2015\\\/11\\\/AdobeStock_612624700-scaled-e1697694346400.jpeg\",\"articleSection\":[\"Press Coverage\"],\"inLanguage\":\"de-AT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/\",\"name\":\"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2015\\\/11\\\/AdobeStock_612624700-scaled-e1697694346400.jpeg\",\"datePublished\":\"2015-11-18T18:36:06+00:00\",\"dateModified\":\"2026-03-31T18:32:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/#breadcrumb\"},\"inLanguage\":\"de-AT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2015\\\/11\\\/AdobeStock_612624700-scaled-e1697694346400.jpeg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2015\\\/11\\\/AdobeStock_612624700-scaled-e1697694346400.jpeg\",\"width\":2000,\"height\":1046},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/press-coverage\\\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-AT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/70300a1f6ae9c2cdfe661c8214b5ff59\",\"name\":\"Alex Hagan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g\",\"caption\":\"Alex Hagan\"},\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/de-at\\\/author\\\/alexhagan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/","og_locale":"de_DE","og_type":"article","og_title":"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists","og_url":"https:\/\/drivesaversdatarecovery.com\/de-at\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2015-11-18T18:36:06+00:00","article_modified_time":"2026-03-31T18:32:40+00:00","og_image":[{"width":2000,"height":1046,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2015\/11\/AdobeStock_612624700-scaled-e1697694346400.jpeg","type":"image\/jpeg"}],"author":"Alex Hagan","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Verfasst von":"Alex Hagan","Gesch\u00e4tzte Lesezeit":"6 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/"},"author":{"name":"Alex Hagan","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/70300a1f6ae9c2cdfe661c8214b5ff59"},"headline":"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists","datePublished":"2015-11-18T18:36:06+00:00","dateModified":"2026-03-31T18:32:40+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/"},"wordCount":1161,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2015\/11\/AdobeStock_612624700-scaled-e1697694346400.jpeg","articleSection":["Press Coverage"],"inLanguage":"de-AT"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/","url":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/","name":"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2015\/11\/AdobeStock_612624700-scaled-e1697694346400.jpeg","datePublished":"2015-11-18T18:36:06+00:00","dateModified":"2026-03-31T18:32:40+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/#breadcrumb"},"inLanguage":"de-AT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/"]}]},{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2015\/11\/AdobeStock_612624700-scaled-e1697694346400.jpeg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2015\/11\/AdobeStock_612624700-scaled-e1697694346400.jpeg","width":2000,"height":1046},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/press-coverage\/computerworld-feds-fund-encryption-apps-that-could-cloak-terrorists\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Computerworld: Feds Fund Encryption Apps that Could Cloak Terrorists"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Datenrettungsdienste","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-AT"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Datenrettung","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/70300a1f6ae9c2cdfe661c8214b5ff59","name":"Alex Hagan","image":{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/secure.gravatar.com\/avatar\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b269af1877df619952c04d32d4f4ac6513fe3497613418e06d03f475cbba9017?s=96&d=blank&r=g","caption":"Alex Hagan"},"url":"https:\/\/drivesaversdatarecovery.com\/de-at\/author\/alexhagan\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts\/1517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/comments?post=1517"}],"version-history":[{"count":2,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts\/1517\/revisions"}],"predecessor-version":[{"id":83641,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/posts\/1517\/revisions\/83641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/media\/48051"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/media?parent=1517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/categories?post=1517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/tags?post=1517"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/de-at\/wp-json\/wp\/v2\/post_series?post=1517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}