Law Enforcement Hacking

× Clear Filters
9 Articles
FBI Building in Miami, Florida.

Hack-to-Patch by Law Enforcement Is a Dangerous Practice

Recent so-called hack-to-patch activity by law enforcement sets a dangerous precedent for the global business community. Serious security, technical, and policy drawbacks emerge…
A bus passes a large Microsoft sign and logo lit up in bright lights.

We’re From the Government, We’re Here to Help: The FBI and the Microsoft Exchange Hack

In a recent operation, the FBI removed malware from hacked Microsoft Exchange servers, and only attempted to notify the servers’ owners after the fact. This approach is almost…
A man walks inside the Apple store in Hong Kong on October 10, 2019.

App Stores as Back-Doors for Government Regulation of End-to-End Encryption

App stores make natural chokepoints for de facto government regulation, without the long and politically expensive process of legislation. But the privacy and security implications…
A participant attends the 34C3 Chaos Communication Congress of the Chaos Computer Club on December 27, 2017 in Leipzig, Germany.

Why the Ghost Keys ‘Solution’ to Encryption is No Solution

The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Two…

Shining a Light on Federal Law Enforcement’s Use of Computer Hacking Tools

Ten years ago, an FBI official impersonated an Associated Press reporter to lure and track a teenager suspected of sending in prank bomb threats to his school. To find him, the…

Looking back at 2016, A Status Check on Government Hacking

Last year, the ongoing encryption debate took a backseat to a steady drip of stories and developments related to government hackings. This set the stage for a set of policy and…
Just Security

Rule 41 Has Been Updated: What’s Needed Next

On December, 1, the revised version of Federal Rule of Criminal Procedure 41 went into effect. The Department of Justice, which first proposed an earlier (and more expansive) version…
Just Security

Whose World Is This?: US and UK Government Hacking

On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules…
Just Security

With Remote Hacking, the Government’s Particularity Problem Isn’t Going Away

Electronic surveillance succeeds because it is secret. When the government seeks to record “what is whispered in the closet,” in the words of Justice Brandeis, it must use…
1-9 of 9 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: