It is not a simple slow moving or even complex environment but marked by a certain degree of ambiguity the does not fit well with current law or legislature. Carpenter had no NS or CT impact. And he was not being critical at all:
“I am not in any way being critical of our judiciary. Rather, I am simply pointing out that the limitations of our “case or controversy” scheme can result in a patchwork quilt of legal precedent that takes into account only the particular technology directly before the court in each case, which in turn leads to decisions that are sometimes hard to reconcile or are distinguishable only by factors that seem of dubious significance. It also yields a set of legal determinations in this area that are, at best, of uneven value in predictive utility. Indeed, the very fact that the nine justices generated five distinct opinions in Carpenter itself makes clear that even the best legal minds are divided over the right approach. And this was in a relatively straightforward case involving fairly well-established technology, where there was already ample Supreme Court precedent about the government’s access to other types of cell phone information and its use of technology to track a person’s physical movements.
Source: Speech of NSA General Counsel Glenn Gerstell to 2018 ABA National
It might sound scary, but the ‘dark web’ is not much different from the rest of the internet
Source: Illuminating the Dark Web
The fiber-optic cables carrying data across the internet are vulnerable to hacking. Two US initiatives aim to fix that by creating super-secure quantum transmissions.
Source: The US pushes to build unhackable quantum networks
Lots of valid points, but Trump’s calls of any significance being intercepted by any one, while a good eye-roll or shocked concerned citizen talking point, is just silly.
Chinese and Russian eavesdropping of President Trump’s calls on his personal smartphone points out the need for securing communications.
Source: Encryption by Default Equals National Security
How should a court rule when the subject of an order to compel decryption of a device pleads the Fifth Amendment?
Source: The Fifth Amendment and Compelled Decryption
Bloomberg said that its sources were key to its decision to run the Chinese spy chip story, the site writing that ’17 people confirmed the manipulation of Supermicro’s hardware and other elem…
Source: One of Bloomberg’s sources told them Chinese spy chip story “didn’t make sense”
Following last week’s bombshell report from Bloomberg Businessweek that claimed that Chinese spies infiltrated commercial servers in the US with hidden microchips, the Department of Homeland Security says that it has “no reason to doubt the statements from the companies named in the story.”
Source: Homeland Security backs Apple and Amazon’s denials of Chinese microchip hack – The Verge
Bloomberg reports that the Chinese People’s Liberation Army has quietly been corrupting a key computer chip. The technical implications are frightening.
Source: The China SuperMicro Hack: About That Bloomberg Report
The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.
Source: The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies – Bloomberg
Another way to look at Facetime!
Cops tell a child abuse suspect to unlock their iPhone with their face. It’s the first time since the iPhone X launched that any cop has used Face ID to force an iOS device open.
Source: Feds Force Suspect To Unlock An Apple iPhone X With Their Face