Ex-Homeland Security boss University president says it’s all about safety
Source: UC Berkeley profs blast secret IT monitoring kit on campus • The Register
Ex-Homeland Security boss University president says it’s all about safety
Source: UC Berkeley profs blast secret IT monitoring kit on campus • The Register
California assembly member Jim Cooper (D-Elk Grove) introduced the legislation, bill 1681, that would require any smartphone manufactured “on or after January 1, 2017, and sold in California after that date” to be “capable of being decrypted and unlocked by its manufacturer or its operating system provider.”
Any smartphone that couldn’t be decrypted on demand would subject a seller to a $2,500 fine.
Of course, this very same Pete Hoekstra, who long defended NSA surveillance, didn’t seem to have much of an issue when the NSA was spying on anyone other than himself. Just last year, in a debate with Glenn Greenwald, Hoekstra mocked the idea that anyone was upset at the NSA spying on foreign governments and said if there was anything to complain about, it was that the NSA allowed such info to leak
All the DHS wanted was a warrantless “peek” at the contents of a seized iPhone. The phone, one of three seized from a person suspected of drug trafficking, was examined by the DHS, with the warrant arriving a month later. Now, all of the evidence obtained from the phone is being tossed out.
In the order granting the suppression of evidence obtained from the phone, Judge Sterling Johnson points out that the government revised its story several times during oral testimony.
DHS Special Agent Thomas Wilburt worked with the CBP to detain the suspect, Adamou Djibo, at the JFK Airport. Djibo’s iPhone was taken and examined by Wilburt, who couldn’t seem to accurately recall the details of the examination.
New Windows devices have disk encryption turned on by default. But what happens to your recovery key?
Source: Recently Bought a Windows Computer? Microsoft Probably Has Your Encryption Key
This doesn’t have much to do with the Juniper back door currently in the news, but the document does provide even more evidence that (despite what the government says) the NSA hoards vulnerabilities in commonly used software for attack purposes instead of improving security for everyone by disclosing it.
Source: NSA/GCHQ Exploits Against Juniper Networking Equipment – Schneier on Security