FBI again unable to unlock a gunman's cellphone

Attendees make their way through the stands of a football stadium before a vigil for the First Baptist Church shooting victims Tuesday, Nov. 7, 2017, in La Vernia, Texas. A man opened fire inside the church in the small South Texas community on Sunday, killing more than two dozen and injuring others. (AP Photo/David J. Phillip)
Attendees make their way through the stands of a football stadium before a vigil for the First Baptist Church shooting victims Tuesday, Nov. 7, 2017, in La Vernia, Texas. A man opened fire inside the church in the small South Texas community on Sunday, killing more than two dozen and injuring others. (AP Photo/David J. Phillip)

WASHINGTON (AP) - The Texas church massacre is providing a familiar frustration for law enforcement: FBI agents are unable to unlock the gunman's encrypted cellphone to learn what evidence it might hold.

However, while heart-wrenching details of the rampage that left more than two dozen people dead might revive the debate over the balance of digital privacy rights and national security, it's not likely to prompt change anytime soon.

Congress has not shown a strong appetite for legislation that would force technology companies to help the government break into encrypted phones and computers. And the fiery public debate surrounding the FBI's legal fight with Apple Inc. has largely faded since federal authorities announced they were able to access a locked phone in a terror case without the help of the technology giant.

As a candidate, Donald Trump called on Americans to boycott Apple unless it helped the FBI hack into the phone, but he hasn't been as vocal as president.

Still, the issue re-emerged Tuesday, when Christopher Combs, the special agent in charge of the FBI's San Antonio division, said agents had been unable to get into the cellphone belonging to Devin Patrick Kelley, who slaughtered much of the congregation in the middle of a Sunday service.

"It highlights an issue you've all heard about before. With the advance of the technology and the phones and the encryption, law enforcement is increasingly not able to get into these phones," Combs told reporters, saying the device was being flown to an FBI lab for analysis.

Combs didn't identify the make or model, but a U.S. official briefed by law enforcement told the Associated Press it was an Apple iPhone.

"We're working very hard to get into that phone, and that will continue until we find an answer," Combs said.

Combs was telegraphing a longstanding frustration of the FBI, which claims encryption has stymied investigations of everything from sex crimes against children to drug cases, even if they obtain a warrant for the information. Agents have been unable to retrieve data from half the mobile devices - more than 6,900 phones, computers and tablets - that they tried to access in less than a year, FBI Director Christopher Wray said last month, wading into an issue that also vexed his predecessor, James Comey. Comey spoke before Congress and elsewhere about the bureau's inability to access digital devices. However, the Obama White House never publicly supported legislation that would have forced technology companies to give the FBI a back door to encrypted information, leaving Comey's hands tied to propose a specific legislative fix.

Security experts generally believe such encryption backdoors are a terrible idea that could expose a vast amount of private, business and government data to hackers and spies. That's because those backdoor keys would work for bad guys as well as good guys - and the bad guys would almost immediately target them for theft, and might even be able to recreate them from scratch.

Deputy Attorney General Rod Rosenstein took aim at Silicon Valley's methods for protecting privacy during a speech last month, saying Trump's Justice Department would be more aggressive in seeking information from technology companies. He took a harder line than his predecessors but stopped short of saying what specific steps the administration might take.