How Apple's locked down security gives extra protection to the best hackers

How Apple's locked down security gives extra protection to the best hackers

But the 1% of top hackers are going to find a way in and, once they’re inside, the impenetrable fortress of the iPhone protects them.”Bill Marczak, Citizen Lab. Despite these difficulties, Stortz says, modern computers are converging on the lockdown philosophy—and he thinks the trade-off is worth it.

Hacked messages can be used as evidence in court

Hacked messages can be used as evidence in court

EncroChat’s instant messaging service was used by criminals around the world before it was hacked by French police.In a victory for prosecutors in their fight against organised crime the Court of Appeal ruled that communications obtained by French police by hacking into mobile phones were lawfully obtained.

No Secret Evidence in Our Courts

No Secret Evidence in Our Courts

In an important victory, an appeals court in New Jersey agreed with EFF and the ACLU of NJ that a defendant is entitled to see the source code of software that’s used to generate evidence against them.

Encryption: Council adopts resolution on security through encryption and security despite encryption

Encryption: Council adopts resolution on security through encryption and security despite encryption

At the same time, the Council notes the need to ensure that competent law enforcement and judicial authorities are able to exercise their legal powers, both online and offline, to protect our societies and citizens.

Before Envelopes, People Protected Messages With Letterlocking

Before Envelopes, People Protected Messages With Letterlocking

To guard her final missive from prying eyes, the queen used a “butterfly lock”—one of hundreds of techniques catalogued by Dambrogio, collaborator Daniel Starza Smith, and their research team in a fast-growing dictionary of letterlocking.

E.U. Privacy Rule Would Rein In the Hunt for Online Child Sexual Abuse

E.U. Privacy Rule Would Rein In the Hunt for Online Child Sexual Abuse

Privacy concerns in Europe have led to some of the world’s toughest restrictions on companies like Facebook and Google and the ways they monitor people online.It would also restrict the use of software that scans for child sexual abuse imagery and so-called grooming by online predators.

Dark web crime: how Australia's powerful new warrants would work

Dark web crime: how Australia's powerful new warrants would work

Data disruption and network activity warrants can be issued by an eligible judge or a nominated member of the administrative appeals tribunal (AAT), while account takeover warrants must come from a magistrate.

Ukraine plan to tackle hackers sparks privacy fears

Ukraine plan to tackle hackers sparks privacy fears

Another measure would oblige internet providers to store everyone’s web traffic information for 12 months and grant investigating authorities access to it, in some cases with no need for a court order, said Oksana Pokalchuk, head of Amnesty International Ukraine.

Web sites shared over 100 trillion pieces of our personal data last year: time to stop real-time bidding’s blatant disregard of privacy

Web sites shared over 100 trillion pieces of our personal data last year: time to stop real-time bidding’s blatant disregard of privacy

Today, we at the ICCL [Irish Council for Civil Liberties] submitted evidence to the DPC that show the consequence of failure to enforce the GDPR to stop the vast RTB data breach at the heart of the online advertising industry.

The EU is set to declare war on encryption

The EU is set to declare war on encryption

The EU is set to declare war on encryption with plans to allow law enforcement officials “targeted lawful access” to protected communications, according to a European Commission internal note seen by the Financial Times.

U.S. court: Mass surveillance program exposed by Snowden was illegal

U.S. court: Mass surveillance program exposed by Snowden was illegal

(Reuters) - Seven years after former National Security Agency contractor Edward Snowden blew the whistle on the mass surveillance of Americans’ telephone records, an appeals court has found the program was unlawful - and that the U.S. intelligence leaders who publicly defended it were not telling the truth.

New Jersey Supreme Court rules that passcodes aren’t protected by Fifth Amendment

New Jersey Supreme Court rules that passcodes aren’t protected by Fifth Amendment

ShareTweet The New Jersey Supreme Court has ruled that passcodes aren’t protected by the Fifth Amendment.The rationale in these states is that while law enforcement may know about certain incriminating documents that could be accessed if the passcode were provided, providing the passcode allows access to absolutely everything on the phone – which could turn up additional evidence that prosecutors didn’t know about.

Seattle Judge Orders Media to Share Unpublished Protest Photos with Police

Seattle Judge Orders Media to Share Unpublished Protest Photos with Police

However on Thursday, King County Superior Court Judge Nelson Lee ultimately sided with the Police, ruling that the subpoena is enforceable, though he set several limitations on how they could use the unpublished materials.

Immunity passport

Immunity passport

Over the years, PI and our global network of partners have documented and challenged the growing push towards identity systems around the world - leading to some of the world’s largest biometric databases, as well as other technologies that can be used to track and profile individuals and communities.

Judge Orders Newsrooms to Give Unpublished Portland Protest Images to the Police

Judge Orders Newsrooms to Give Unpublished Portland Protest Images to the Police

Judge on Thursday ruled that five Seattle news outlets had to comply with a subpoena demanding them to provide the Seattle Police Department (SPD) with unpublished pictures and video from a May 30 protest against police brutality and racial injustice, the Seattle Times reported Thursday.

Indiana Supreme Court: Woman did not have to unlock phone for police

Indiana Supreme Court: Woman did not have to unlock phone for police

A Carmel woman who was held in contempt when she refused to unlock her smartphone for police during a criminal investigation is protected by the U.S. Constitution, the Indiana Supreme Court ruled Tuesday in a decision that could affect how law enforcement uses technology to gather evidence.

Judge Dismisses Twitter’s Lawsuit Over Its Rights to Publish Information About Government Surveillance Orders

Judge Dismisses Twitter’s Lawsuit Over Its Rights to Publish Information About Government Surveillance Orders

And, based on that secret evidence that Twitter’s attorneys were never allowed to access, the judge held that the government’s purported national security concerns were sufficient to justify its censorship of Twitters draft transparency report.

Flaw in iPhone, iPads may have allowed hackers to steal data for years

Flaw in iPhone, iPads may have allowed hackers to steal data for years

WASHINGTON/SAN FRANCISCO (Reuters) - Apple Inc (AAPL.O) is planning to fix a flaw that a security firm said may have left more than half a billion iPhones vulnerable to hackers.

Restrictions Are Slowing Coronavirus Infections, New Data Suggest

Restrictions Are Slowing Coronavirus Infections, New Data Suggest

Harsh measures, including stay-at-home orders and restaurant closures, are contributing to rapid drops in the numbers of fevers — a signal symptom of most coronavirus infections — recorded in states across the country, according to intriguing new data produced by a medical technology firm.

Big Tech Is Testing You

Big Tech Is Testing You

But, as Luca and Bazerman recount, eBay’s marketing group defended the millions of dollars spent on the ads each year, noting that many people who clicked on them ended up buying things on eBay. An experiment was in order.

Huawei fires back, points to US’ history of spying on phone networks

Huawei fires back, points to US’ history of spying on phone networks

The US alleges that Huawei violated these laws by "buil[ding] equipment that secretly preserves the manufacturer's ability to access networks through these interfaces without the carriers' knowledge," the Journal article said.

US says it can prove Huawei has backdoor access to mobile-phone networks

US says it can prove Huawei has backdoor access to mobile-phone networks

US officials say they have evidence that Huawei has backdoor access to mobile-phone networks around the world, according to a Wall Street Journal article published today.

FYI: FBI raiding NSA's global wiretap database to probe US peeps is probably illegal, unconstitutional, court says

FYI: FBI raiding NSA's global wiretap database to probe US peeps is probably illegal, unconstitutional, court says

In a decision [PDF] that could put an end to a practice that civil-liberties groups have decried as illegal for years, the US Court of Appeals for the Second Circuit noted that the way the Feds today use a database of seized communications “would be at odds with the bedrock Fourth Amendment concept that law enforcement agents may not invade the privacy of individuals without some objective reason to believe that evidence of crime will be found by a search.”.

Republicans propose mass student surveillance plan to prevent shootings

Republicans propose mass student surveillance plan to prevent shootings

Senate Republicans have a new plan for preventing mass shootings: require public schools to use surveillance technology to monitor students’ online behavior for signs of violence or self-harm.

Court Ruling Shows How FBI Abused NSA Mass Surveillance

Court Ruling Shows How FBI Abused NSA Mass Surveillance

While the law requires that FBI searches of such data be related to investigations in which agents have reasonable suspicion that crimes are occurring or in which national security is at risk, assessments provide an enormous loophole that potentially allows agents to search through the communications of any American without a warrant.

Europol Looks Forward to a Substantial Collaboration with Amazon’s Alexa

Europol Looks Forward to a Substantial Collaboration with Amazon’s Alexa

The five pillars of the presentations concerned data retention methods, email address-based tracking, data protection considerations, global access to criminal evidence, and predictive policing.

Empire Files: NSA Whistleblower: Government Collecting Everything You Do

Empire Files: NSA Whistleblower: Government Collecting Everything You Do

So, if NSA didn’t want to publish anything that I thought was important to get to people in any agency, I used what was called the gray phone, you know, it’s the encrypted line.

Russell Stover Chocolates hit by data breach - what customers need to know

Russell Stover Chocolates hit by data breach - what customers need to know

Candymaker Russell Stover Chocolates announced Friday that a recent data security breach at its stores potentially affected the information of customers’ credit and debit cards.If a consumer suspects an unauthorized charge, they should immediately notify the bank or financial institution that issued the payment card.”.

You Know That Mobile Phone Tracking Data You Used As Evidence In Over 10,000 Court Cases? Turns Out Some Of It Was Wrong, But We're Not Sure Which Yet

You Know That Mobile Phone Tracking Data You Used As Evidence In Over 10,000 Court Cases? Turns Out Some Of It Was Wrong, But We're Not Sure Which Yet

In addition, Denmark's director of public prosecutions has ordered a two-month halt in the use of this location data in criminal cases while experts try to sort out the problems: The first error was found in an I.T. system that converts phone companies' raw data into evidence that the police and prosecutors can use to place a person at the scene of a crime.

Facebook denies claims of discrepancies in evidence to MPs

Facebook denies claims of discrepancies in evidence to MPs

“In their evidence, Facebook representatives truthfully answered questions about when the company first learned of Aleksandr Kogan/GSR’s improper transfer of data to Cambridge Analytica, which was in December 2015 through The Guardian’s reporting.