Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $16,225
20%  
Woo hoo!! And we're now over 20%!! Thank you all very much!! God bless.

Keyword: encryption

Brevity: Headers | « Text »
  • Report : The FBI recently unlocked an iPhone 11 Pro with GreyKey, raising more doubts about the Pensacola case.

    01/15/2020 6:13:33 PM PST · by House Atreides · 36 replies
    9to5Mac ^ | January 15, 2020 | Chance Miller
    As Apple stands firm against requests to break iPhone encryption, many people have questioned why the FBI needs Apple’s help in the first place. There are plenty of tools available from third-party companies that are more than capable of unlocking the iPhone 5 and iPhone 7 used by the Pensacola gunman. Further emphasizing that point, a new report from Forbes says that the FBI recently used one of those black/gray market tools to unlock the newest — and theoretically the most secure — iPhone that Apple sells. According to the report, FBI investigators in Ohio used the GrayKey hardware box...
  • Donald Trump Calls on Apple to 'Step Up to the Plate' and Unlock iPhones Used by Florida Mass Shooter

    01/14/2020 8:46:59 PM PST · by House Atreides · 43 replies
    MacRumors ^ | 1/14/1920 | Forum
    Apple previously said that it had provided all of the information in its possession (such as iCloud backups) to the FBI earlier in the month after the FBI asked for assistance obtaining the shooter's data. Law enforcement officials are not satisfied with the iCloud data, however, and want Apple to provide a way to unlock the shooter's iPhones, which is not possible without a backdoor into the software. After Barr's request, Apple issued another statement and provided further detail on the data that has been provided, as well as once again stating that there is "no such thing as a...
  • Barr Asks Apple to Unlock Pensacola Killer’s Phones, Setting Up Clash

    01/13/2020 7:23:50 PM PST · by Theoria · 182 replies
    The New York Times ^ | 13 Jan 2020 | Katie Benner
    Attorney General William P. Barr declared on Monday that a deadly shooting last month at a naval air station in Pensacola, Fla., was an act of terrorism, and he asked Apple in an unusually high-profile request to provide access to two phones used by the gunman.Mr. Barr’s appeal was an escalation of a continuing fight between the Justice Department and Apple pitting personal privacy against public safety. “This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence,” Mr. Barr said, calling on technology companies to find a solution and complaining that...
  • Opinion: Burr-Feinstein antiencryption bill a firing offense

    04/23/2016 11:13:34 AM PDT · by Clintonfatigued · 17 replies
    Christian Science Monitor ^ | April 19, 2016 | Sascha Meinrath
    The Burr-Feinstein antiencryption bill isn't just bad, it's evidence of a dangerous incompetence in congressional leadership that is undermining America’s security. In fact, the draft bill, leaked two weeks ago and now officially released, is compelling evidence that Senate leadership should strip – or at least not reappoint – Senators Burr and Feinstein of their positions on the Senate Select Committee on Intelligence. Amongst its many provisions, the draft bill mandates that tech companies make all of our online data "intelligible" when presented with a court order. The bill defines intelligible as "decrypted, deciphered, decoded, demodulated, or deobfuscated" to "the...
  • Here’s how AG Barr is going to get encryption 'backdoors'

    08/06/2019 6:33:47 PM PDT · by softengine · 55 replies
    Engadget ^ | July 31, 2019 | Violet Blue
    If you heard the reverberation of a few thousand heads exploding last week, it was the sound of information security professionals reacting to US Attorney General Barr saying that Big Tech "can and must" put backdoors into encryption. In his speech for a cybersecurity conference at Fordham University, Barr warned tech companies that time was running out for them to develop ways for the government to break encryption. FBI Director Christopher Wray agreed with him. At this week's big meeting of the "Five Eyes" countries, Barr was in attendance. His demands that internet companies break safe security standards of encryption...
  • BREAKING: Cumming man threatened to attack White House, authorities say

    01/16/2019 4:18:29 PM PST · by Blue House Sue · 70 replies
    AJC ^ | 1/16/19
    Federal authorities on Wednesday announced a terrorist case against a metro Atlanta resident accused of plotting to destroy the White House and other Washington D.C. government buildings. Hasher Jallal Taheb, of Cumming, was arrested in Gwinnett County and appeared briefly in court in downtown Atlanta in the case brought the FBI.
  • Australia Bans Encryption!

    01/14/2019 9:53:50 AM PST · by rarestia · 55 replies
    Medium ^ | Dec 8, 2018 | Shyla Kahn
    In a move supported by both major political parties in Australia, a bill named the “Telecommunications Assistance and Access Bill 2018,” has passed the House of Representatives and is headed to the upper House for a vote. Given its bi-partisan support and the position of PM Michael Turnbull regarding encryption, passage into law seems certain. A Hacker News article provides additional details about the bill and its ramifications, not only for tech companies like Apple, Samsung, WhatsApp, Signal and others but also for individuals. The intended purpose of the legislation is to give the Australian government and security and law...
  • U.S. Treasury official charged with leaks linked to Russia probe

    10/17/2018 10:19:02 AM PDT · by SpeedyInTexas · 43 replies
    Yahoo ^ | 10/17/2018 | Brendan Pierson
    A U.S. Treasury Department official has been criminally charged with leaking confidential documents relating to former Trump campaign chairman Paul Manafort, the Russian embassy and others, to a reporter from digital media company BuzzFeed, Manhattan federal prosecutors announced on Wednesday. Natalie May Edwards, a senior adviser in the Treasury Department's Financial Crimes Enforcement Network (FinCEN), was arrested on Tuesday and charged with unauthorized disclosure of suspicious activity reports, according to the office of U.S. Attorney Geoffrey Berman. She was expected to make an initial appearance in Virginia federal court later in the day.
  • FBI repeatedly overstated encryption threat figures to Congress, public

    05/23/2018 11:52:03 AM PDT · by BenLurkin · 10 replies
    Washington Post ^ | May 22 at 7:11 PM | Devlin Barrett
    The FBI has repeatedly provided grossly inflated statistics to Congress and the public about the extent of problems posed by encrypted cellphones, claiming investigators were locked out of nearly 7,800 devices connected to crimes last year when the correct number was much smaller, probably between 1,000 and 2,000, The Washington Post has learned. Over a period of seven months, FBI Director Christopher A. Wray cited the inflated figure as the most compelling evidence for the need to address what the FBI calls “Going Dark” — the spread of encrypted software that can block investigators’ access to digital data even with...
  • Is A Former Feinstein Staffer Running Fusion GPS’s Post-Election Steele Dossier Operation?

    02/20/2018 2:15:27 PM PST · by saywhatagain · 17 replies
    The Federalist ^ | FEBRUARY 20, 2018 | Sean Davis
    New evidence suggests that a former top staffer for Sen. Dianne Feinstein (D-Calif.) may be directing the post-election efforts of Fusion GPS, a Democrat-linked political opposition research firm, to vindicate a series of memos alleging illegal collusion between the Donald Trump campaign and Russian officials
  • NSA Mole Took Codes Targeting US Cyber Enemies (Harold Thomas Martin)

    10/07/2016 4:35:38 PM PDT · by drewh · 19 replies
    Debkfiles ^ | October 7, 2016, ast
    Harold Thomas Martin, a 51-year-old US National Security Agency contractor from Maryland, may be remembered as the second Edward Snowden, although there are many differences between the two cases. Martin, a former US Navy officer with top secret national security clearance, was arrested on Aug. 27 by the FBI and charged with the unauthorized removal and retention for many years of highly-sensitive classified documents. The purloined materials found in raids of his home and his car, which were described by as capable of causing “exceptionally grave damage” to US national security. Like Snowden, Martin worked for Booz Allen Hamilton, which...
  • Why was Senator Mark Warner using Signal and Disappearing Messages if he had Nothing to Hide?

    02/09/2018 1:44:19 PM PST · by bitt · 59 replies
    medium.com ^ | 2/9/2018 | Mark Cernovich
    Mark Warner was texting a Russian oligarch using an encrypted app, Signal, and his messages were set to automatically delete. FoxNews broke a huge story about Senator Mark Warner, which has been discussed elsewhere. What I haven’t seen anyone else cover is the fact that the “text messages” were not ordinary messages. Warner was communicating via Signal, an encrypted app. Moreover, Warner had his messages set to disappear. (The hour glass icon in the text exchange.)
  • FBI Baffled by Encryption (FBI DIRECTOR Wray wants back diirs on devices)

    01/14/2018 8:51:50 AM PST · by Ernest_at_the_Beach · 65 replies
    The Still Report - Youtube ^ | Jan 13, 2018 | Bill Still
    Good evening, I’m still reporting on: FBI Baffled by Encryption, 1978 Synopsis: New FBI Director Christopher Wray, speaking on Tuesday at a cyber-security conference in New York, said that powerful encryption tools now becoming widely available are frustrating his agency. Surprise, surprise; last year, the FBI was unable to access data from 7800 devices – that’s over 50% - despite having legal authority to do so – i.e. a legitimate warrant from a real judge. Wray warned the audience of cyber-security experts from around the world: “This is an urgent public safety issue. [The solution] is not so clear cut.”...
  • Cause of Action Targets CFPB, EPA Feds Using Encryption to Hide Public Docs

    12/09/2017 5:14:50 PM PST · by Twotone · 23 replies
    Lifezette ^ | December 9, 20217 | Brendan Kirby
    Agents of the federal government have been sending coded messages to one another, but they aren’t deep-cover spies evading the Russian spooks or transmitting North Korean launch codes. They are run-of-the-mill bureaucrats who appear to be using digital technology to evade the American people and their representatives in Congress and the White House. “There’s no elected control if the bureaucrats can have conversations that are not reviewable by elected officials,” said John Vecchione, president and CEO of the Cause of Action Institute (COA). “They can’t control the bureaucracy.” Vecchione’s group filed a Freedom of Information Act (FOIA) request earlier this...
  • The Fed’s Encryption Conniption

    11/15/2017 7:04:06 AM PST · by Kaslin · 22 replies
    Townhall.com ^ | November 15, 2017 | Bob Barr
    As soon as the news broke last week that the FBI was unable to gain access to the phone belonging to the Sutherland Springs, Texas killer, you could hear the indignant feet-stomping of security hawks on Capitol Hill. It did not matter that the killer was not a member of ISIS, and acted alone. It did not matter that the motive was a domestic dispute, not the result of some broader terrorist plot. And, it did not matter that it was the government’s clerical error in the first place, which allowed for this tragedy to occur.There was data to be...
  • The FBI can’t unlock the Texas church shooter’s phone

    11/07/2017 2:05:20 PM PST · by detective · 198 replies
    Yahoo News ^ | 11/7/2017 | David Lumb
    At a press conference today, an FBI official investigating the man who killed 26 people in a Texas church on Sunday said the agency can't open the shooter's encrypted phone. The agent painted the issue as a growing concern among law enforcement at all levels who can't access data on devices without their owner's credentials. It's essentially the same argument the FBI made two years ago when it demanded Apple help break into the phone of the San Bernardino shooter, a conflict that escalated into the courtroom.
  • DOJ grows frustrated with tech firms over encryption

    10/24/2017 12:21:24 AM PDT · by Fedora · 14 replies
    CNN ^ | 10/10/2017 | David Shortell
    A top Justice Department official on Tuesday criticized technology companies that "enable criminals and terrorists" with encryption software and foreshadowed a new government approach to the issue that has increasingly frustrated law enforcement."When investigations of violent criminal organizations come to a halt because we cannot access a phone, lives may be lost," Deputy Attorney General Rod Rosenstein said..."The approach taken in the recent past--negotiating with technology companies and hoping that they eventually will assist law enforcement out of a sense of civic duty--is unlikely to work," he said.Though he did not outline future steps, Rosenstein, seemed to be taking up..a...
  • Turkish police say seeking 144 people over links to failed coup, 35 detained

    05/23/2017 10:09:32 AM PDT · by Texas Fossil · 5 replies
    KOM News ^ | 23 May 2017 13:25 CEST | none stated
    Turkish police said on Tuesday they are seeking 144 people including police, soldiers and prosecutors, over suspected links to the network of a US-based cleric blamed by Ankara for orchestrating last year’s failed coup. In raids across 42 provinces, 35 of the 144 wanted people have already been detained, the police said in a statement, adding that the suspects were thought to be using ByLock, an encrypted messaging app the government says was used by preacher Fethullah Gulen’s followers. Turkey accuses Gulen, who has lived in self-imposed exile for almost 20 years, of running a decades-long campaign to overthrow the...
  • NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet

    05/11/2017 2:57:36 PM PDT · by Red Badger · 14 replies
    theintercept.com ^ | May 11 2017, 9:57 a.m. | Sam Biddle
    In early December 2016, Adam was doing what he’s always doing, somewhere between hobby and profession: looking for things that are on the internet that shouldn’t be. That week, he came across a server inside New York University’s famed Institute for Mathematics and Advanced Supercomputing, headed by the brilliant Chudnovsky brothers, David and Gregory. The server appeared to be an internet-connected backup drive. But instead of being filled with family photos and spreadsheets, this drive held confidential information on an advanced code-breaking machine that had never before been described in public. Dozens of documents spanning hundreds of pages detailed the...
  • U.S. House Judiciary Committee determines encryption backdoors against national interests

    12/21/2016 8:08:49 PM PST · by Swordmaker · 56 replies
    Apple Insider ^ | Wednesday, December 21, 2016, 02:18 pm PT (05:18 pm ET) | By Daniel Eran Dilger
    In a rebuke to the anti-encryption campaign waged by the U.S. Federal Bureau of Investigation--with Apple as a target--the U.S. House Judiciary Committee's Encryption Working Group issued a report today stating "any measure that weakens encryption works against the national interest." In a bipartisan report, the group observed that "any measure that weakens encryption works against the national interest," citing representatives of the national security community who noted that "strong encryption is vital to the national defense and to securing vital assets, such as critical infrastructure." A second finding of the report was that "encryption technology is a global technology...