FBI-style NITs to deanonymize Tor hidden service criminals may be on their way out. But going forward, law enforcement may be able to directly monitor the Tor network to perform targeted deanonymization.
Latest in FBI
Thanks to forensic software, investigators usually do not need to seize all of the data on a computer and can instead selectively copy portions for later analysis and use at trial. This raises the question: did the FBI violate the Fourth Amendment in seizing Huma Abedin’s emails instead of confining the seizure to Anthony Weiner’s communications?
FBI Director James Comey's testimony in front of the House Oversight and Governance Reform Committee today.
With membership growing and violent activity on the rise, the KKK is showing signs of a comeback.
Could both of the magistrate judge rulings in the dueling Apple-FBI disputes in Brooklyn and San Bernardino to date be wrong? We believe that the answer is "yes," and explain why the best reading of the All Writs Act compels that counterintuitive result.
Apple has filed its reply to the government's opposition to Apple's motion to vacate an order compelling the technology company to assist the FBI in unlocking the iPhone of one of the San Bernardino shooters.
The Steptoe panel discusses Apple's brief against providing additional assistance to the FBI, the California AG's breach report, DHS's guidelines for information sharing, and more.
The second in a series of primers for those who are interested in the continuing fallout from Apple’s decision to resist government requests for technical assistance in overcoming passcode protections on iPhones.
Apple's "Message to Our Customers" leaves out a few minor details—like what's actually being asked and those areas where reaonable minds may disagree.
Apple has asserted that a one-time use of any software that would enable the FBI to bypass security features in the iPhone is impossible—that it would inevitably be used multiple times. In a previous post, I’ve argued that the software could be written, used once, and then thrown away permanently. The technique (i.e., algorithms involved) would still be known, but the software artifact could be destroyed forever.