Tag: 2010s
- A Judicial Framework for Evaluating Network Investigative Techniques
- A Roadmap for Exceptional Access Research
- Anonymity and Encryption: Comments Submitted to the United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression
- Apple Will No Longer Unlock Most iPhones, iPads for Police, Even with Search Warrants
- Apple Will No Longer Unlock Most iPhones, iPads for Police, Even with Search Warrants
- As Encryption Spreads, U.S. Grapples with Clash Between Privacy, Security
- As Encryption Spreads, U.S. Grapples with Clash Between Privacy, Security
- Attorney General William P. Barr Delivers Keynote Address at the International Conference on Cyber Security
- Best Practices for Encryption in P25 Public Safety Land Mobile Radio Systems
- Best Practices for Encryption in P25 Public Safety Land Mobile Radio Systems
- Beyond Secrets: The Consumer Stake in the Encryption Debate
- Big reputation: What the Australian Parliament Can Learn from Taylor Swift
- Breaking: FBI Admits its Claims of “Going Dark” Were Overblown, Based on Bad Math
- Brief of Amici Curiae Access Now and Wickr Foundation in Support of Apple Inc.'s Motion to Vacate
- Brief of Amici Curiae Access Now and Wickr Foundation in Support of Apple Inc.'s Motion to Vacate
- CALEA II: Risks of Wiretap Modifications to Endpoints
- Canada's Quiet Weakening of Communications Encryption
- Canada’s New and Irresponsible Encryption Policy: How the Government of Canada’s New Policy Threatens Charter Rights, Cybersecurity, Economic Growth, and Foreign Policy
- CEOs and Encryption: The Questions You Need to Ask Your Experts
- Coalition Letter to Members of Australia's Parliament
- Coalition Letter to Ministers Responsible for the Five Eyes Security Community
- Coalition Letter to NIST
- Coalition Letter to President Obama 04/11/2016
- Coalition Letter to President Obama 10/27/2016
- Coalition Letter to President Obama 5/19/2015
- Colorado v. Davis
- Compliance with Court Orders Act of 2016 (Discussion Draft)
- Compliance with Court Orders Act of 2016 - Draft
- Compliance with Court Orders Act of 2016 - Draft
- Considerations for Encryption in Public Safety Radio Systems
- Considerations for Encryption in Public Safety Radio Systems
- Crypto Summit 1.0
- Crypto Summit 2.0 Outcomes Report (Tracks 1-4)
- Crypto Summit 2.0 Outcomes Report Track 1
- Crypto Summit 2.0 Outcomes Report Track 1-4
- Debate: Law Enforcement vs. Smartphone Encryption
- Deep Dive into Crypto “Exceptional Access” Mandates: Effective or Constitutional—Pick One
- Deputy Attorney General Rod J. Rosenstein Delivers Remarks at the Global Cyber Security Summit
- Don’t Panic: Making Progress on the “Going Dark” Debate
- Dutch Government Backs Uncrackable Encryption
- Dutch Government Backs Uncrackable Encryption
- Encryption 101: A Non-Technical Guide to Protecting Your Digital Communications
- Encryption and Globalization
- Encryption and the Press Clause
- Encryption Backdoors Decrease Trust In The Internet
- Encryption in the U.S.: Crypto Colloquium Outcomes Report
- Encryption is a Human Rights issue: Your Privacy and Pree Speech Depend on It
- Encryption is a Human Rights issue: Your Privacy and Pree Speech Depend on It
- Encryption under fire: discussion on threats to private messaging w/ Head of WhatsApp Will Cathcart
- Encryption Under Fire: Discussion on Threats to Private Messaging with Head of WhatsApp Will Cathcart
- Encryption, Biometrics, and the Status Quo Ante
- Encryption, Trust, and the Online Economy: An Assessment of the Economic Benefits Associated with Encryption
- Entropy and Random Numbers
- Ex-MI5 Chief Warns Against Crackdown on Encrypted Messaging Apps
- Ex-NSA Chief Thinks the Government is Dead Wrong in Asking Apple for a Backdoor
- Ex-NSA Chief Thinks the Government is Dead Wrong in Asking Apple for a Backdoor
- Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop
- FAQ on the FCC CALEA Expansion
- FBI Blasts Apple, Google for Locking Police out of Phones
- FBI Blasts Apple, Google for Locking Police out of Phones
- FBI Pressuring Google, Facebook to Allow ‘Back Doors’ for Wiretapping
- FBI Pressuring Google, Facebook to Allow ‘Back Doors’ for Wiretapping
- Federal Bureau of Investigation: FY 2010 Budget Request
- Federal Bureau of Investigation: FY 2010 Budget Request
- Feds Put Heat on Web Firms for Master Encryption Keys
- Former GCHQ Boss Backs End-to-End Encryption
- Former National-Security Officials Suddenly See the Peril of Weakening Encryption
- From Clipper Chip to Smartphones: Unlocking the Encryption Debate
- Going Dark, Going Forward: A Primer on the Encryption Debate
- Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?
- Going Dark: Lawful Electronic Surveillance in the Face of New Technologies
- Going Dark: Lawful Electronic Surveillance in the Face of New Technologies
- Guidelines for Encryption in Land Mobile Radio Systems
- H.R. 2545 - Data Breach Prevention and Compensation Act of 2019
- H.R. 4943 - Clarifying Lawful Overseas Use of Data Act
- Hacking/​Journalism
- Hacking/Journalism
- Half the Web Is Now Encrypted. That Makes Everyone Safer
- Holder Urges Tech Companies to Leave Device Backdoors Open for Police
- How secure is AES Against Brute Force Attacks?
- How Unvalidated Encryption Threatens Patient Data Security
- HTTPS-Everywhere for Government
- Human Rights and Encryption
- IC on the Record, Video: ODNI General Counsel Robert Litt
- IC on the Record, Video: ODNI General Counsel Robert Litt
- In Re: Application for an Order Pursuant to 18 U.S.C. 2705(b) Relating to a Subpoena to Open Whisper Systems for the Accounts Listed
- Intelligence Committee Leaders Release Discussion Draft of Encryption Bill
- Issue Brief: A “Backdoor” to Encryption for Government Surveillance
- James Comey, F.B.I. Director, Hints at Action as Cellphone Data Is Locked
- James Comey, F.B.I. Director, Hints at Action as Cellphone Data Is Locked
- Key Escrow from a Safe Distance: Looking Back at the Clipper Chip
- Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications
- McCaul’s Crypto Commission: First, Do No Harm
- Memorandum for the Heads of Executive Departments and Agencies: Policy to Require Secure Connections Across Federal Websites and Web Services
- Mozilla Cybersecurity Delphi 1.0: Towards a User-centric Policy Framework
- Mozilla Cybersecurity Delphi 1.0: Towards a User-centric Policy Framework
- New Perspectives on the Future of Encryption
- Newest Androids Will Join iPhones in Offering Default Encryption, Blocking Police
- NSA Isn’t the Going Dark Solution, Part I: Richard Clarke Gets It Wrong
- NSA Isn’t the Going Dark Solution, Part I: Richard Clarke Gets It Wrong
- NSA Isn’t the Going Dark Solution, Part II: There’s No Such Thing As Magic
- NSA Isn’t the Going Dark Solution, Part II: There’s No Such Thing As Magic
- Old Technopanic in New iBottles
- Old Technopanic in New iBottles
- Open Letter to Mark Zuckerberg: Facebook's "Privacy First" Proposals
- Open Letter to Mark Zuckerberg: Facebook's End-to-End Security Plans
- OTI Policy Director Kevin Bankston Offers Ten reasons Why Backdoor Mandates Are a Bad Idea
- Prepared Statement by Senator Chuck Grassley, Hearing On “Going Dark: Encryption, Technology, and the Balance Between Public Safety and Privacy
- Press Release: The Search for Quantum-Resistant Cryptography: Understanding the Future Landscape
- Promoting Public Saftey, Privacy, and the Rule of Law Around the World: The Purpose and Impact of the CLOUD Act
- Protecting the Fourth Amendment in the Information Age: A Response to Robert Litt
- Questions for Apple
- Questions for Apple
- Report of the Attorney General's Cyber Digital Task Force
- Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye
- Report on Post-Quantum Cryptography
- Report on Post-Quantum Cryptography
- Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security
- Russia Wants to Make an Example of Telegram
- S. 1336 - Data Breach Prevention and Compensation Act of 2019
- S. 1336 - Data Breach Prevention and Compensation Act of 2019
- S. 2889 - National Security and Personal Data Protection Act of 2019
- S.1842 - Protecting Personal Health Data Act
- Secret US Cybersecurity Report: Encryption Vital to Protect Private Data
- Security vs. Security - Rapid7 Supports Strong Encryption
- Security Win: Burr-Feinstein Proposal Declared “Dead” for This Year
- Security Win: Burr-Feinstein Proposal Declared “Dead” for This Year
- Security “Front Doors” vs. “Back Doors”: A Distinction Without a Difference
- Security “Front Doors” vs. “Back Doors”: A Distinction Without a Difference
- Security, Surveillance And The Truth About Going Dark
- Selected References: Unofficial Companion to Report of the Special Rapporteur (A/HRC/29/32) on Encryption, Anonymity and the Freedom of Expression.pdf
- Shining a Light on the Encryption Debate: A Canadian Field Guide
- Statement of General Keith B. Alexander, Commander, United States Cyber Command, Before the Senate Committee on Armed Services
- Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process
- Submission of the Citizen Lab (Munk School of Global Affairs, University of Toronto) to the United Nations Special Rapporteur on Violence Against Women, Its Causes and Consequences, Ms. Dubravka Šimonović
- Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom \& Cybersecurity
- the People of the State of Colorado v. Shaun R. Davis
- The Burr-Feinstein Proposal Is Simply Anti-Security
- the Crypto Summit
- The Effect of Encryption on Lawful Access to Communications and Data
- The Encryption Debate in the European Union
- The Encryption Debate in the European Union
- The Encryption Tightrope: Balancing Americans' Security and Privacy
- The Five Eyes Statement on Encryption: Things Are Seldom What They Seem
- The Human Rights Benefits of Encryption
- The Human Rights Benefits of Encryption
- The NSA’s Split-Key Encryption Proposal is Not Serious
- The NSA’s Split-Key Encryption Proposal is Not Serious
- The Risks of “Responsible Encryption”
- The Role of Encryption in Australia
- The Shifting Landscape of Global Internet Censorship
- The Way Forward: Working Together to Tackle Cybercrime
- Travel Guide to the Digital World: Encryption Policy for Human Rights Defenders
- Travel Guide to the Digital World: Encryption Policy for Human Rights Defenders
- Travel Guide to the Digital World: Encryption Policy for Human Rights Defenders
- U.S. Says It Has Unlocked iPhone Without Apple
- U.S. Tries to Make It Easier to Wiretap the Internet
- US Government Fines Intel's Wind River Over Crypto Exports
- Why An Encryption Backdoor for Just the "Good Guys" Won't Work
- Wiretapping and Cryptography Today
- Wiretapping and Cryptography Today
- Worried about Apple? California Has a Bill That Would Disable Encryption on All Phones
- Worried about Apple? California Has a Bill That Would Disable Encryption on All Phones
- “Five Eyes” Governments Respond to Coalition Demands to Stop Undermining Encryption