Can FBI Read My Texts
Can FBI Read My Texts
Welcome to Spodek Law Group. If you’re wondering whether the FBI can read your text messages, the answer isn’t yes or no – it’s “which copy are you asking about?” Your texts don’t exist in one place. They exist in at least three: your phone, your recipient’s phone, and your carrier’s servers. Each copy has different legal protection. Each can be accessed through different legal processes. And here’s what nobody tells you – the FBI often doesn’t need to touch your phone at all to get your text history.
The message sitting on your device right now is protected by Riley v. California. Agents generally need a warrant to search your phone. But the identical message on your recipient’s device? That person can consent to a search, or their phone can be seized in an unrelated investigation, and your words become evidence without your knowledge. And carrier records? AT&T keeps metadata about your texts for seven years. Who you texted, when, how often – all of it stored on servers you’ll never see, accessible through legal processes you may never know about.
The legal framework governing text message access was written in 1986, when email was a novelty and smartphones didn’t exist. The Stored Communications Act created a 180-day cliff that still determines how much protection your messages get today. Texts stored for less than 180 days require a warrant. Texts older than that? The government can get them with a subpoena and notice – a much lower standard. Your oldest conversations have the weakest protection, and most people have no idea this threshold exists.
Your Texts Live in Three Places – Each With Different Rules
When you send a text message, you create evidence in multiple locations simultaneously. Understanding this is essential to understanding your exposure. The message on your phone is just one copy – and its often not the one FBI agents pursue.
Your device contains the original. Under Riley v. California, agents generally need a warrant to search the contents of your phone. This is real protection, assuming you dont consent and no exception applies. But Riley only protects the device in your possession. It dosent protect copies of your texts that exist elsewhere.
Your recipients device contains another copy. If that person consents to a phone search, your messages become accessible. If that persons phone is seized in a separate investigation, your texts may be examined. If that person becomes a cooperating witness, they can hand over your entire conversation history. You have no Fourth Amendment standing to challenge searches of someone else’s property.
Carrier servers contain a third category of records. Your cellular provider keeps metadata about every text you send – the phone numbers involved, the timestamps, the frequency of communication. Most carriers dont store text message content, but the metadata alone can be devastating. AT&T retains this information for seven years. Thats longer then most criminal statutes of limitations.
Every text you send creates evidence in at least three locations, and you only control one of them.
Cloud backups add a fourth layer of complexity. If you backup your iPhone to iCloud, Apple stores a copy of your messages on there servers. Apple has the encryption key for iCloud backups. When FBI serves Apple with a warrant, Apple can and does provide message content. Your “encrypted” iMessages arnt encrypted in a way that protects them from Apple itself.
The 180-Day Cliff Nobody Mentions
The Stored Communications Act, codified at 18 USC 2703, creates a threshold that determines how much protection your stored communications receive. This law was written in 1986. It now governs access to technologies that wouldnt exist for decades.
Heres how it works. If your text message content has been stored for 180 days or less, the government must obtain a warrant to access it. A warrant requires probable cause – the same standard that applies to searching your home. This is meaningful protection.
But if your text message content has been stored for more then 180 days, the rules change. The government can obtain it with a subpoena plus prior notice to you, or with a court order under section 2703(d). The 2703(d) order requires only “specific and articulable facts” showing the records are relevant – a much lower standard then probable cause. Your oldest texts have the weakest legal protection.
Why 180 days? In 1986, storing electronic communications was expensive. Legislators assumed that if you left messages on a server for six months, you had effectivly abandoned them. This assumption made no sense then and makes even less sense now, when people routinely keep years of text history. But the law hasnt changed.
The practical impact is significant. That text exchange from two years ago? Its subject to lower legal standards then the text you sent yesterday. The governments theory is that older communications deserve less protection because you could have deleted them. The fact that nobody actually manages there text archives this way hasnt prompted Congress to update the law.
Theres been some pushback in the courts. The Sixth Circuit in United States v. Warshak held that email users have a Fourth Amendment expectation of privacy in stored emails, regardles of age. But Warshak specifically addressed email, and its holding hasnt been universally applied to text messages. The 180-day cliff remains in the statute.
What Carriers Actually Keep
A leaked FBI document from 2021 revealed exactly what federal agents can obtain from telecommunications carriers. The details are more nuanced then most people realize – and in some ways more reassuring, in other ways more alarming.
Heres the critical point most people miss: the majority of cellular carriers do not save the content of text messages. AT&T, Verizon, T-Mobile – they typically dont retain what your texts actually say. The text of your texts is generally only available from the device itself. If FBI wants your message content from carriers, there often isnt any to give.
What carriers do retain is metadata – and they retain it for years. AT&T keeps call records, cell site data, and tower information for seven years. T-Mobile keeps similar records for two years. Verizon keeps them for one year. This metadata includes who you texted, when you texted them, how often you communicated, and sometimes your location when you sent messages.
The content of your texts may not exist on carrier servers – but the pattern of your communications does.
Why does this matter? Metadata reveals relationships. It shows who you talk to at 2am. It shows how frequently you communicate with certain people. It shows when communication patterns suddenly change. Investigators can build a detailed picture of your life from metadata alone, even without reading a single word you wrote.
The FBI’s Vice guide detailed exactly what agents request from carriers: subscriber information, call detail records, cell site location information, and stored communications if available. For AT&T, thats seven years of who you contacted, when, and from where. Thats a comprehensive map of your social connections and movements, all without accessing the actual words you used.
Todd Spodek has represented clients who were shocked to learn how much carriers retain. The assumption that texts disappear after you delete them from your phone ignores the reality of carrier data retention. Your phone may be clean, but the metadata trail persists for years.
Metadata vs Content: The Privacy Illusion
Even if your messages are encrypted, your metadata is exposed. And metadata can reveal as much about your life as the content itself.
Consider what metadata includes. Its the phone numbers you communicate with. Its the timestamps of every exchange. Its the frequency of your communications. Its the duration of calls. Its sometimes your location when messages were sent. None of this requires reading what you actually wrote.
The legal framework treats metadata differently then content. Under Smith v. Maryland (1979), information you “voluntarily convey” to third parties has reduced Fourth Amendment protection. You know your carrier can see who you text and when. Therefore, according to the Supreme Court, you have no reasonable expectation of privacy in that information.
This is the third-party doctrine, and its devastatingly broad. Every time you send a text, you “voluntarily convey” the recipient’s phone number to your carrier. Every time you place a call, you “voluntarily convey” the number you dialed. The fact that you have no practical alternative – you cant text without going through a carrier – dosent change the legal analysis.
Theres been some limitation. In Carpenter v. United States (2018), the Supreme Court held that cell-site location information requires a warrant despite being held by third parties. The Court recognized that location data is different – it provides an “intimate window” into a persons life. But Carpenter explicitly did not overturn Smith v. Maryland. Text metadata remains in uncertain constitutional territory.
Heres what this means practically. FBI agents investigating you may be able to obtain years of records showing everyone you communicated with and when, potentially without a warrant. The FBI’s leaked document shows exactly what they request from providers. Even if your message content is protected by encryption, the pattern of your communications is available.
Real-Time Interception: The Harder Path
Ironically, intercepting your texts in real time – reading them as you send them – requires a higher legal standard then accessing your old stored messages. Title III of the Omnibus Crime Control and Safe Streets Act governs wiretaps, and it imposes substantial requirements.
To get a Title III wiretap order for your text messages, FBI agents must demonstrate probable cause that youre committing, have committed, or are about to commit a specific serious crime listed in the statute. They must show that communications about that crime will be obtained through the intercept. They must prove that normal investigative techniques have failed or are unlikely to succeed. And a federal judge must approve the application.
Even then, wiretap orders are limited. A single order can authorize interception for no more then 30 days. Agents must minimize interception of irrelevant communications. The court supervises the process with ongoing oversight. These protections exist because real-time interception is considered a severe intrusion into privacy.
Compare this to accessing your six-month-old texts from carrier servers. No showing that other methods failed. No 30-day limit. No minimization requirement. The stored communications framework is simply less protective then the wiretap framework – even though the privacy intrusion may be similar or greater.
The Communications Assistance for Law Enforcement Act (CALEA) ensures carriers have the technical capability to execute wiretaps. Your carrier has built-in surveillance infrastructure specificaly designed for law enforcement intercepts. When a valid wiretap order is issued, the carrier can capture your communications in real time and transmit them to investigators as they occur.
In 2024, an ironic twist emerged. Chinese hackers known as Salt Typhoon infiltrated AT&T, Verizon, and Lumen Technologies. They reportedly gained access to the same wiretap infrastructure the FBI uses. The surveillance systems built to monitor Americans were themselves compromised by foreign adversaries. This led to FBI recommendations to use end-to-end encrypted messaging – advice that conflicts somewhat with the governments general preference for accessible communications.
Encrypted Apps: What FBI Can Actually Get
The FBI document leaked in 2021 provides a detailed breakdown of what agents can obtain from various messaging apps. The differences are striking.
Signal provides almost nothing. The FBI can learn only the last date you connected to Signal and when you registered your account. No message content. No contact lists. No group membership. Signal’s architecture means the company genuinly dosent have access to your communications. This is about as close to true privacy as current technology allows.
iMessage is completely different. Apple stores iMessages if you backup to iCloud – and most iPhone users do. When FBI serves Apple with a warrant, Apple can provide the content of your messages, your contacts, and extensive metadata. The “encryption” in iMessage protects messages in transit, but if Apple holds a copy on there servers with there own decryption key, that protection evaporates.
WhatsApp falls somewhere in between. WhatsApp provides limited message content, particularly for messages backed up to the cloud. It provides metadata including who you contacted and when. Facebook, which owns WhatsApp, has faced criticism for the gap between its encryption marketing and the actual data available to law enforcement.
Telegram provides almost nothing from standard chats. “Secret chats” are end-to-end encrypted and Telegram has no access. Regular chats are stored on Telegram servers but the company has historically resisted law enforcement requests.
Your “encrypted” app may not be as protective as you think – especially if it backs up to cloud services.
At Spodek Law Group, we counsel clients on communication security before investigations develop. The choices you make about which apps to use and whether to enable cloud backups have enormous implications if federal agents ever come asking questions.
Your Recipient’s Phone: The Backdoor
One of the most overlooked vulnerabilities in text message privacy is the recipient’s device. Every text you send creates a copy on someone else’s phone – and you have no Fourth Amendment protection over that copy.
If your recipient consents to a phone search, your messages are accessible. If your recipient’s phone is seized pursuant to a warrant in an unrelated matter, your messages may be discovered. If your recipient becomes a cooperating witness, they can provide your entire conversation history to investigators voluntarily. In none of these scenarios do you have standing to challenge the search.
This is how text messages frequently become evidence. An associate gets arrested and consents to a phone search to demonstrate cooperation. A family member has there phone seized and messages are discovered incidentally. A business partner decides to cooperate and hands over years of communications. The texts you thought were private conversations become exhibits at trial.
The dynamic changes relationship dynamics in investigations. When someone you’ve texted is approached by FBI agents, your text history is one of the things they can offer. Cooperation often includes providing access to communications. Messages you sent years ago, in confidence, become bargaining chips in someone elses legal situation.
Theres no technical solution to this problem. You cant control what recipients do with messages after you send them. You cant prevent there devices from being searched. You cant stop them from cooperating. The only protection is being mindful that every text creates evidence in someone else’s possession.
What To Do If FBI Asks About Your Texts
If you learn that FBI agents are interested in your text communications – whether through a subpoena, through questions to associates, or through any other indication – take immediate steps to protect yourself.
First, do not delete anything. Destroying evidence after you become aware of an investigation is obstruction of justice. This is a serious federal crime that can result in years of imprisonment. Whatever is on your devices needs to stay there. The instinct to “clean up” your phone is understandable but dangerous.
Second, consult with a federal criminal defense attorney immediately. Text message evidence is technical and the legal framework is complicated. Recent legal analysis shows courts are increasingly skeptical of subpoenas for text content. An attorney can advise you on what protections apply in your jurisdiction, whether the government is using proper legal process, and what rights you can assert.
Third, understand the cloud backup situation. If your texts are backing up to iCloud, that creates a copy accessible to Apple. Turning off iCloud backup prospectively may be advisable – but deleting existing backups after learning of an investigation risks obstruction charges. This is exactly the kind of decision that requires legal guidance.
Fourth, recognize that your recipients texts are beyond your control. If investigators are approaching people you communicate with, those people are making there own decisions about cooperation. You cannot instruct them to delete messages or refuse to cooperate without risking witness tampering charges.
Fifth, consider the metadata issue. Even if your message content is encrypted or protected, the pattern of your communications may be available. Metadata showing who you talked to and when can be obtained from carriers for years after the fact. This information exists regardless of what’s on your phone.
Finally, remember that the protection you have depends on asserting it. If agents ask to see your phone and you consent, the warrant requirement vanishes. If you provide your password voluntarily, encryption becomes meaningless. The legal protections only help if you actually invoke them – calmly, clearly, and with an attorney’s guidance.
At Spodek Law Group, we handle federal investigation cases where text message evidence is central to the government’s theory. The choices clients make in the early stages of investigation – what they say, what they delete, what they consent to – often determine the entire outcome. Call 212-300-5196 for a confidential consultation about protecting yourself when federal agents are asking questions about your communications.
NJ CRIMINAL DEFENSE ATTORNEYS