Apple’s legal obligations under CALEA challenge the argument that Apple could be doing more to help law enforcement.
Latest in Encryption
FaceTime and iMessage have a cryptographic architecture that enables prospective wiretapping, but there is reason to believe that Apple not is fully complying with lawful pen-register and trap-and-trace court orders.
Sometimes we are reminded that the "noise" of policy drowns out important practical news. Today is one of those days. While we sit around worrying about Harvey Weinstein and Trump's latest tweet, it turns out that the encryption protocol at the core over almost all WiFi is vulnerable to attack.
Remarks of Rod Rosenstein, the deputy attorney general, about encryption at the U.S. Naval Academy on Tuesday.
Upgrades in Apple's forthcoming operating system update will complicate electronic search efforts at the border.
Just as law enforcement can pursue a number of different alternatives to mandating encryption backdoors, so too can privacy advocates take steps beyond encrypting their data to ensure their privacy.
According to published news reports, the Australian government plans to “introduce draft legislation that will attempt to force technology companies to break into end-to-end encrypted messages.”
Ending The Endless Crypto Debate: Three Things We Should Be Arguing About Instead of Encryption Backdoors
Recently I participated in a fascinating conference at Georgia Tech entitled “Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives.” A range of experts grappled with the international aspects of an increasingly pressing question: how can we ensure that law enforcement is able to obtain enough information to do its job in the twenty-first century, while also ensuring that digital security and hu
Alan Z. Rozenshtein on Digital Communications and Data Storage Companies as "Surveillance Intermediaries"
Alan Z. Rozenshtein, a former contributor to Lawfare who now works at DOJ, has a new article forthcoming in Stanford Law Review, "Surveillance Intermediaries," analyzing the role of corporate actors such as Apple, Google, Facebook, and others, that dominate digital communications and data storage, situated between government and targets of surveillance.