Upgrades in Apple's forthcoming operating system update will complicate electronic search efforts at the border.
Latest in Encryption
Just as law enforcement can pursue a number of different alternatives to mandating encryption backdoors, so too can privacy advocates take steps beyond encrypting their data to ensure their privacy.
According to published news reports, the Australian government plans to “introduce draft legislation that will attempt to force technology companies to break into end-to-end encrypted messages.”
Ending The Endless Crypto Debate: Three Things We Should Be Arguing About Instead of Encryption Backdoors
Recently I participated in a fascinating conference at Georgia Tech entitled “Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives.” A range of experts grappled with the international aspects of an increasingly pressing question: how can we ensure that law enforcement is able to obtain enough information to do its job in the twenty-first century, while also ensuring that digital security and human rights are protected?
Alan Z. Rozenshtein on Digital Communications and Data Storage Companies as "Surveillance Intermediaries"
Alan Z. Rozenshtein, a former contributor to Lawfare who now works at DOJ, has a new article forthcoming in Stanford Law Review, "Surveillance Intermediaries," analyzing the role of corporate actors such as Apple, Google, Facebook, and others, that dominate digital communications and data storage, situated between government and targets of surveillance.
This Aegis Series paper reviews the most recent encryption-related legislation in France, the United Kingdom, the Netherlands, Hungary, and Poland.
The public debate over encryption and Going Dark insufficiently addresses the issue of child sexual exploitation.
Jennifer Daskal examines the potential international side effects of the policies proposed in the encryption debate and highlights the need to proceed with care, and for centralized, executive-level review and monitoring of sought-after decryption orders, so as to better account for these effects.
Adam Segal examines the international pressures exerted on and by Chinese encryption laws and regulations.
In a recently released Brookings policy brief, I reccomend the next administration take an approach to “Going Dark” that strategically embraces lawful hacking as a possible alternative to legislation mandates.