Blog

FBI v. Apple -- Can doesn't mean should obey.

The FBI investigates a grizzly murder. You are a bank president. The murderer stored his phone book in your bank's safety deposit box, the code for which is encrypted with copyrighted proprietary software, before he committed the murder. The FBI demands that you provide it with the master code for the box, which can be used to unlock other boxes, too. You can give the FBI the code, but should you? Apple CEO Tim Cook is asking himself the same question, his answer is rightly "no."

Reflections on the FBI's Attempt to Dragoon Apple Into Subverting iPhone Security

On Monday, I wrote a post for Just Security where I reflected on last week's news concerning the FBI's attempts to coerce Apple into creating a forensic bypass to the iPhone passcode lockout. I wrote that we live in a software-defined world. In 2000, Lawrence Lessig wrote that Code is Law — the software and hardware that comprise cyberspace are powerful regulators that can either protect or threaten liberty. A few years ago, Mark Andreessen wrote that software was eating the world, pointing to a trend that is hockey sticking today. Software is redefining everything, even national defense.

CALEA Limits the All Writs Act and Protects the Security of Apple's Phones

The government filed a brief today to compel Apple to circumvent its standard security features on the iPhone the government recovered from San Bernadino terrorist Syed Farook. The government argued that the All Writs Act (AWA) authorized the court to require Apple to provide such technical assistance because the AWA has not been limited by Congress and “there is no statute that specifically addresses the issue of Apple’s assistance.” Motion, p. 22. The government questioned Apple's motives for refusing to cooperate and stated that it was not burdensome for Apple to do even if it had to write some software to do comply.

MLAT Reform and the 80% Solution - What's Good for Users?

Last week, The Washington Post reported that the US and the UK were in negotiations to permit UK law enforcement agencies to request stored communications like email and chats directly from US-based providers like Facebook and Google. What’s more, the UK apparently wants these companies to be able to perform wiretaps as well.

Smart Cities – The Cyber Security and Privacy Implications of Ubiquitous Urban Computing

The rapid growth of embedded computing and the “Internet of Things” (IoT) have been felt in many industries and areas, but few organizations and jurisdictions have been affected as quickly and as deeply as cities.  The emergence of “smart cities” – those cities that “…integrate cyber-physical technologies and infrastructure to create environmental and economic efficiency while improving the overall quality of life”

Pages

Subscribe to Stanford CIS Blog