The FBI investigation into the failed July 13 assassination attempt on former President Donald Trump has revived the argument over whether Big Tech firms should provide law enforcement with a backdoor method to break their own “unbreakable” encryption.

Weeks before the attempt on Trump’s life, the Secret Service received intelligence warning of an Iranian plot to kill the former president, according to federal law enforcement officials. But while experts are skeptical of any connection between the 20-year-old would-be assassin Thomas Matthew Crooks and Iran, they haven’t been able to access some of his communications 18 days later.

So it remains unclear who he was talking to, if anyone, and what topics would have been discussed.

FBI STILL DOES NOT HAVE COMPLETE ACCESS TO SHOOTER’S ONLINE ACTIVITY

Republican presidential candidate former President Donald Trump is rushed offstage during a rally

Republican presidential candidate former President Donald Trump is rushed offstage during a rally on July 13, 2024 in Butler, Pennsylvania.  (Anna Moneymaker/Getty Images)

“I think we’ve experienced a range of returns because some of the applications that he was using online were encrypted in nature,” FBI Deputy Director Paul Abbate said during a Senate hearing Tuesday under questioning from South Carolina Republican Lindsey Graham.

The FBI has gained access to some of his emails, he said, but some of his encrypted communications remained undecipherable Tuesday.

“If he were talking to some foreign power, and I don’t think any foreign power would hire this guy, by the way, so I’m not overly worried, but if this was some great plot by the Iranians, how do we solve this?” Graham asked.

TRUMP SHOOTING: TIMELINE OF ASSASSINATION ATTEMPT

U.S. Secret Service Acting Director Ronald Rowe

U.S. Secret Service Acting Director Ronald Rowe, testifies before a Joint Senate Committee on Homeland Security and Governmental Affairs and Senate Committee on the Judiciary hearing examining the security failures leading to the assassination attempt on Republican presidential candidate former President Donald Trump, Tuesday, July 30, 2024 in Washington. (AP Photo/Kevin Wolf)

“Senator, you know, as we’ve been saying, we need a solution that provides lawful access,” Abbate said.

The FBI and other law enforcement agencies have been seeking – unsuccessfully – backdoor access to encrypted data for years. And while lawmakers have been reluctant to demand it facing privacy and due process concerns, apps that facilitate encrypted communications have become popular not only with private individuals, but also terrorist groups, criminal cartels, drug traffickers and other criminals. They are easy to obtain on Apple and Android phones – and often free to use.

Thomas Matthew Crooks, 20, climbed on top of a roof less than 150 yards from Trump during a rally in Butler, Pennsylvania on July 13. Armed with an AR-15 rifle, he tried to kill the former president, barely missing his head but grazing his ear, killing one rally attendee and critically wounding two others. The shocking security failure spawned a number of investigations into both lapses in event security and the gunman’s motivations. The attack came amid a heightened threat from Iran.

Drone footage of the rally site

Drone footage shows lawmakers climbing on top of the AGR building Thomas Crooks fired from on July 13. (Fox News Digital)

“The terrorist regime of Iran have been targeting people, our country, for many, many years now,” Abbate told Sen. Richard Blumenthal, D-Connecticut, during the hearing. “We’ve talked about that here before. We know, publicly, they’ve targeted former President Trump;. They’ve called for his assassination.”

However, when it comes to the July 13 attack, he said investigators have found no information that Crooks had any co-conspirators, “foreign or domestic.”

“But I wanna be clear: We have no evidence of that. We’re not ruling anything out. We’re looking into all possibilities and leaving our minds open to that,” Abbate told lawmakers Tuesday.

What if Crooks did have ties to a terror group, or violent cartels? The high-ranked FBI official warned Senate committee members Tuesday that the bureau needs a way to gain “lawful access” to a suspect’s encrypted communications.

TRUMP ASSASSINATION ATTEMPT FORMED FROM ‘CAREFUL PLANNING,’ SCOPING OUT RALLY SITE, FBI SAYS

Undated file photo of Thomas Matthew Crooks

Undated file photo of Thomas Matthew Crooks. Crooks is alleged to be the shooter in the assassination attempt on former President Donald Trump in Butler, Pennsylvania on Saturday, July 13, 2024. (Obtained by Fox News Digital)

Many current and former law enforcement officials have argued that a hard-coded decryption method would aid them as they try to protect the public from major threats. On the other hand, opponents of a digital master key say it would create both a privacy risk for law-abiding individuals and a vulnerability that criminal hackers could exploit.

The government has unsuccessfully been seeking backdoor access into Big Tech encryption for years, according to Paul Mauro, a retired NYPD inspector and counterterrorism expert.

“Encrypted or not, you have to do what we’ve been doing in our system for 250 years — get a warrant,” Mauro told Fox News Digital. “But by creating encryption that the creators themselves cannot decrypt — you have obliterated the role of the judges. Really, the only ‘judge’ now is whoever can decrypt.”

But it’s also a “slippery slope,” said David Gelman, a former prosecutor turned defense attorney in the Philadelphia area.

“That would erode all confidence in companies like Apple and Signal, etc.,” he told Fox News Digital.

Deputy FBI Director Paul Abbate testifies before a Senate committee

Deputy FBI Director Paul Abbate testifies at a Senate Judiciary Committee hearing on the attempted assassination of former U.S. President Donald Trump on Capitol Hill, on July 30, 2024.  (Tierney L. Cross/Bloomberg)

Both companies tout their protection of users’ privacy as a selling point.

“There is only so much that should be able to be accessed,” Gelman said. “[It’s] too much of an invasion of privacy.”

CLICK HERE TO GET THE FOX NEWS APP 

Even if a court were to issue a warrant, however, with unbreakable encryption, it doesn’t matter if government specialists can’t crack the code.

FBI officials said earlier this week that Crooks’ encryption has been a challenge, including foreign-based encrypted email accounts. The FBI said there has been no indication of foreign involvement with Crooks’ plot, but investigators have left the question open until they get a look at his hidden communications.

Investigators are also continuing to examine information that they have received, including activity from social media accounts that may have been used by the gunman and espoused what Abbate called “differing points of view.”

On Friday, Trump revealed he would be returning to Butler for another rally to honor the bystander who Crooks killed with a stray bullet.

Crooks fatally struck 50-year-old Corey Comperatore and critically wounded David Dutch, 57, and James Copenhaver, 74.

Fox News’ Sarah Rumpf-Whitten contributed to this report.