Federal Bureau of Investigation (FBI)

× Clear Filters
258 Articles
Just Security

[UPDATED] Magistrate Judge Orenstein’s order in the EDNY, denying DOJ’s All Writs Act request . . .

. . . is here. The order that the government requested the judge to issue would have required Apple to bypass the passcode security on an iPhone 5s (which used Apple’s iOS…
Just Security

Apple’s motion to vacate the All Writs Act assistance order: Has Apple chosen the best “test case”?

Here it is. On first read, I think it has some very strong sections, including, in particular, its description of the efforts Apple would have to undertake to create and secure…
Just Security

Apple vs. FBI: “Just This Once”?

I wrote about the FBI’s attempt to force Apple to write an iPhone hacking tool for the bureau over at Time last week — and go read that if you’re getting caught up on the…
Just Security

Who Sets the Rules of the Privacy and Security Game?

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

FBI’s Push to “Fix a Typo” Would Really Expand Its Surveillance Authority

At last week’s Senate Intelligence Committee hearing on Worldwide Threats, FBI Director James Comey reiterated his call for a major expansion of the FBI’s surveillance authorities,…
Just Security

Law Enforcement Online: Innovative Doesn’t Mean Illegal

Even the Wild West needed a sheriff. And today’s law enforcement agents, to be effective, need more than a Colt .45 and a gold star. Criminal actors have an increasing ability…
Just Security

National Security Letters and Leak Investigations

Journalists were reminded again last week of how little legal protection actually exists when the federal government decides to investigate national security leaks. In an ongoing…
Just Security

James Comey’s Default-Encryption Bogeyman

FBI Director James Comey recently told the Senate Judiciary Committee that encryption routinely poses a problem for law enforcement. He stated that encryption has “moved from…
Just Security

“Your Account May Have Been Targeted by State-Sponsored Actors”: Attribution and Evidence of State-Sponsored Cyberattacks

This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
Just Security

The FBI Should Stop Undermining Norms Before They Take Root

Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet…
Just Security

Cy Vance’s Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities

Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s…
Just Security

Is the FBI Using Zero-Days in Criminal Investigations?

We have known for a while now that the FBI uses hacking techniques to conduct remote computer searches in criminal investigations — particularly those that involve the dark web.…
1-12 of 258 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: