SlideShare a Scribd company logo
An Update from the
Crypto Wars 2.0
BSidesPDX - October 25, 2019
Wendy Knox Everette
@wendyck
Who am I? Wendy Knox Everette
@wendyck
Hacker lawyer. Has handled law enforcement
requests for companies.
I am a lawyer. I am very much not your
lawyer.
Some history:
1993 Clipper Chip
1995-1997 Bernstein v. United States
2015 Apple v. FBI
Daniel J. Bernstein et al., v. United States Department of State, 922 F. Supp. 1426
(April 15, 1996)
Daniel J. Bernstein et al., v. United States Department of State, 945 F. Supp. 1279
(December 9, 1996)
Daniel J. Bernstein et al., v. United States Department of State, 176 F.3d 1132
(August 25, 1997)
Encryption regulations prevented export of
software code. Court finds that software code is
speech & receives First Amendment protections
Law enforcement argues that encryption of iCloud
backups prevented them from investigating the San
Bernardino shooting. February 16, 2016, a C.D.
Cal. magistrate judge issued an order requiring
Apple to assist the FBI with extracting data.
Apple replies that building any custom iOS
software to circumvent the encryption raises
unacceptable implications for all iOS customers.
https://www.apple.com/customer-letter/
4th Amendment creates the
groundwork for this area
● Based on the “reasonable
expectation of privacy”
standard
● Most 4th Amendment law is
case law
Wiretaps are covered
by Title III
Electronic Communications Privacy Act & Stored
Communications Act
NIT Warrants
https://motherboard.vice.com/en_us/article/d3b3xk/the-fbi-created-a-fake-fedex-website-to-unmask-a-cybercriminal
Great, so the government has ways to request data from
software companies and service providers so that they
can investigate crimes.
Except
Sometimes new systems are built
and the old ways of wiretapping,
etc., don’t work anymore
All Writs Act
Courts may issue all writs
necessary or appropriate in
aid of their respective
jurisdictions and agreeable
to the usages and
principles of law
United States v. New York Telephone Co.,
434 U.S. 159 (1977)
“We agree that the power of federal courts to impose
duties upon third parties is not without limits;
unreasonable burdens may not be imposed.”
So now we have
CALEA
CALEA
● telecom providers are
required to assist law
enforcement
● fuzzy applicability to internet
service companies
The All Writs Act was
used in Apple v. FBI
What was the outcome in Apple
v. FBI?
The FBI used a vulnerability to
hack into the phone - to date,
bugs have been providing a
form of pressure release
What now?
“According to Reuters and The Washington Post,
the Justice Department sought an order from a
federal court to force Facebook to wiretap
encrypted voice conversations on Facebook
Messenger as part of an investigation into the MS-
13 gang”
https://www.aclu.org/blog/privacy-
technology/internet-privacy/aclu-seeks-secret-
ruling-stopped-feds-hacking-facebook
Facebook refuses, saying would need to re-write
Messenger app’s code & undermine security for all
users.
DOJ tries to hold Facebook in contempt of court,
but lost. ACLU filed a motion to unseal judicial
rulings associated with the attempt to make
Facebook decrypt Messenger calls.
https://www.aclu.org/blog/privacy-
technology/internet-privacy/aclu-seeks-secret-
ruling-stopped-feds-hacking-facebook
also
https://www.nytimes.com/interactive/2019/09/28/us/child-sex-abuse.html
Can we have messaging systems that are engineered to
deal with child porn and law enforcement access, without
building tech that gets used for censorship and copyright
enforcement?
Forced signing of
“malicious” updates by a
government?
DOJ’s Lawful Access
Summit
Barr’s remarks
“But the digital world that has proven such a boon in many ways has also
empowered criminals. Like everybody else, criminals of all stripes increasingly
rely on wireless communications, hand-held devices, and the internet. In today’s
world, evidence of crime is increasingly digital evidence. As we work to secure
our data and communications from hackers, we must recognize that our citizens
face a far broader array of threats...While we should not hesitate to deploy
encryption to protect ourselves from cybercriminals, this should not be done in a
way that eviscerates society’s ability to defend itself against other types of criminal
threats.”
Barr’s remarks
“What is happening here is that some companies want to say to the individual,
“Hey, we can make you invisible to law enforcement.” But do we want to live in a
society where everyone is invisible to law enforcement?”
Barr’s remarks
“These considerations apply to privacy. That right has never been absolute. The
Fourth Amendment strikes a balance between the individual citizen’s interest in
conducting certain affairs in private and the general public’s interest in subjecting
possible criminal activity to investigation.”
But weakening
encryption is not like
a 4th Amendment
balancing test
Backdoored encryption
standards are encryption
algorithms that have been
intentionally weakened
https://twitter.com/mattblaze/status/1180864669822652416
How would we
protect escrowed
keys?
Does only the FBI get them? How
do local law enforcement use them?
How does this
even work with the
global Internet?
https://www.jumble.io/blog/2016/02/26/apple-vs-fbi-battle-encryption-privacy-security/
Can’t we just compel people to provide decryption
keys?
1. This doesn’t work so well in the investigative stage
2. The Fifth Amendment can be invoked by the
defendant to resist providing their encryption keys
Sources
● Clipping Clipper https://www.wired.com/1994/09/clipping-clipper-matt-blaze/ &
https://www.mattblaze.org/papers/eesproto.pdf
● EFF’s Bernstein summaryhttps://www.eff.org/cases/bernstein-v-us-dept-justice
● Apple v FBI timeline: https://www.usatoday.com/story/tech/news/2016/03/15/apple-v-fbi-timeline/81827400/
● Software Alliance paper https://www.bsa.org/policy-filings/us-encryption-and-law-enforcement-access-to-data
● Video of DOJ’s Lawful Access Summit https://www.justice.gov/opa/video/lawful-access-summit
● https://freedom-to-tinker.com/2019/10/06/content-moderation-for-end-to-end-encrypted-messaging/ and Barr’s
remarks: https://www.justice.gov/opa/speech/attorney-general-william-p-barr-delivers-remarks-lawful-access-summit
● https://cyberlaw.stanford.edu/blog/2019/10/william-barr-and-winnie-pooh
● Content Moderation for End-to-End Encrypted Messaging by Jonathan Mayer, https://freedom-to-
tinker.com/2019/10/06/content-moderation-for-end-to-end-encrypted-messaging/
● US Attorney’s Manual, Section 9-7.000 - Electronic Surveillance, https://www.justice.gov/usam/usam-9-7000-
electronic-surveillance
● FBI Domestic Investigations and Operations Guide
https://vault.fbi.gov/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29/FBI%2
0Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29%202016%20Version
● Lawfare blog, https://www.lawfareblog.com

More Related Content

What's hot

10 tedesco karia social media - tedesco law group - wscff april 2014
10 tedesco karia   social media - tedesco law group - wscff april 201410 tedesco karia   social media - tedesco law group - wscff april 2014
10 tedesco karia social media - tedesco law group - wscff april 2014
shibrah76
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
Ejiro Ndifereke
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Christina Gagnier
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
Internet Law Center
 
Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Online Advertising Legal Update 2014
Online Advertising Legal Update 2014
Internet Law Center
 
Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11
dabrannen2
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
Internet Law Center
 
Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03CTIN
 
JUDGE BOBBY DeLAUGHTER - INDICTMENT
JUDGE BOBBY DeLAUGHTER - INDICTMENTJUDGE BOBBY DeLAUGHTER - INDICTMENT
JUDGE BOBBY DeLAUGHTER - INDICTMENT
VogelDenise
 
IP Institute Presentation on Internet Law
IP Institute Presentation on Internet LawIP Institute Presentation on Internet Law
IP Institute Presentation on Internet Law
Bennet Kelley
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
Internet Law Center
 
Digital law
Digital lawDigital law
Digital law
Jennifer Carmack
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
Yogesh Pandit
 
Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette caseMichael Perez
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
Jerric Lyns John
 

What's hot (20)

10 tedesco karia social media - tedesco law group - wscff april 2014
10 tedesco karia   social media - tedesco law group - wscff april 201410 tedesco karia   social media - tedesco law group - wscff april 2014
10 tedesco karia social media - tedesco law group - wscff april 2014
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Evolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet RegulationEvolution of US Approaches to Internet Regulation
Evolution of US Approaches to Internet Regulation
 
Online Advertising Legal Update 2014
Online Advertising Legal Update 2014Online Advertising Legal Update 2014
Online Advertising Legal Update 2014
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 
Polinter10
Polinter10Polinter10
Polinter10
 
Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11Collision Of My Space, Your Space And Our Space 3 11 11
Collision Of My Space, Your Space And Our Space 3 11 11
 
trial
trialtrial
trial
 
Trademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and MoreTrademarks, Incorporation, FTC Regs and More
Trademarks, Incorporation, FTC Regs and More
 
Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03
 
JUDGE BOBBY DeLAUGHTER - INDICTMENT
JUDGE BOBBY DeLAUGHTER - INDICTMENTJUDGE BOBBY DeLAUGHTER - INDICTMENT
JUDGE BOBBY DeLAUGHTER - INDICTMENT
 
IP Institute Presentation on Internet Law
IP Institute Presentation on Internet LawIP Institute Presentation on Internet Law
IP Institute Presentation on Internet Law
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Digital law
Digital lawDigital law
Digital law
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Jeremy and jeannette case
Jeremy and jeannette caseJeremy and jeannette case
Jeremy and jeannette case
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 

Similar to BSidesPDX "An update from the crypto wars 2.0"

Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
Frances Coronel
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law Center
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
Sean Whalen
 
286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx
rhetttrevannion
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
centralohioissa
 
Twitter v. holder suit to disclose ns ls
Twitter v. holder suit to disclose ns lsTwitter v. holder suit to disclose ns ls
Twitter v. holder suit to disclose ns lsPublicLeaks
 
Twitter contra USA
Twitter contra USATwitter contra USA
Twitter contra USA
Mario Guillermo Simonovich
 
Twitter vs. United States
Twitter vs. United StatesTwitter vs. United States
Twitter vs. United States
David Sweigert
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
Edwardk3aWallacey
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
Dhurba Mainali
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the governmentguest70f067f
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the governmentguest70f067f
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
London School of Cyber Security
 

Similar to BSidesPDX "An update from the crypto wars 2.0" (20)

Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx286CHAPTER 14CyberlawCHAPTER 15International and.docx
286CHAPTER 14CyberlawCHAPTER 15International and.docx
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
Twitter v. holder suit to disclose ns ls
Twitter v. holder suit to disclose ns lsTwitter v. holder suit to disclose ns ls
Twitter v. holder suit to disclose ns ls
 
Twitter contra USA
Twitter contra USATwitter contra USA
Twitter contra USA
 
Twitter vs. United States
Twitter vs. United StatesTwitter vs. United States
Twitter vs. United States
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Saying no to the government
Saying no to the governmentSaying no to the government
Saying no to the government
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 

More from Wendy Knox Everette

FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)
Wendy Knox Everette
 
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Wendy Knox Everette
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021
Wendy Knox Everette
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Wendy Knox Everette
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
Wendy Knox Everette
 
Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019
Wendy Knox Everette
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018
Wendy Knox Everette
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & Me
Wendy Knox Everette
 
Green Locks for You and Me
Green Locks for You and MeGreen Locks for You and Me
Green Locks for You and Me
Wendy Knox Everette
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
Wendy Knox Everette
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Wendy Knox Everette
 
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Wendy Knox Everette
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Wendy Knox Everette
 

More from Wendy Knox Everette (13)

FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)FedRAMP Is Broken (And here's how to fix it)
FedRAMP Is Broken (And here's how to fix it)
 
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
Weaponizing Your Fitness Tracker Against You_ Health, Fitness, & Location Tra...
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019Incident Response and the Attorney Client Privilege - ShmooCon 2019
Incident Response and the Attorney Client Privilege - ShmooCon 2019
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018
 
SeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & MeSeaSec East: Green Locks For You & Me
SeaSec East: Green Locks For You & Me
 
Green Locks for You and Me
Green Locks for You and MeGreen Locks for You and Me
Green Locks for You and Me
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
Regulatory Nets vs the Fishing Hook of Litigation - BSides Las Vegas 2017
 
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
Security Vulnerabilities, the Current State of Consumer Protection Law, & how...
 

Recently uploaded

Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 

Recently uploaded (20)

Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 

BSidesPDX "An update from the crypto wars 2.0"

  • 1. An Update from the Crypto Wars 2.0 BSidesPDX - October 25, 2019 Wendy Knox Everette @wendyck
  • 2. Who am I? Wendy Knox Everette @wendyck Hacker lawyer. Has handled law enforcement requests for companies. I am a lawyer. I am very much not your lawyer.
  • 3. Some history: 1993 Clipper Chip 1995-1997 Bernstein v. United States 2015 Apple v. FBI
  • 4.
  • 5.
  • 6. Daniel J. Bernstein et al., v. United States Department of State, 922 F. Supp. 1426 (April 15, 1996) Daniel J. Bernstein et al., v. United States Department of State, 945 F. Supp. 1279 (December 9, 1996) Daniel J. Bernstein et al., v. United States Department of State, 176 F.3d 1132 (August 25, 1997) Encryption regulations prevented export of software code. Court finds that software code is speech & receives First Amendment protections
  • 7.
  • 8. Law enforcement argues that encryption of iCloud backups prevented them from investigating the San Bernardino shooting. February 16, 2016, a C.D. Cal. magistrate judge issued an order requiring Apple to assist the FBI with extracting data.
  • 9. Apple replies that building any custom iOS software to circumvent the encryption raises unacceptable implications for all iOS customers.
  • 11.
  • 12. 4th Amendment creates the groundwork for this area ● Based on the “reasonable expectation of privacy” standard ● Most 4th Amendment law is case law
  • 14. Electronic Communications Privacy Act & Stored Communications Act
  • 17.
  • 18.
  • 19.
  • 20. Great, so the government has ways to request data from software companies and service providers so that they can investigate crimes. Except
  • 21. Sometimes new systems are built and the old ways of wiretapping, etc., don’t work anymore
  • 23. Courts may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law
  • 24. United States v. New York Telephone Co., 434 U.S. 159 (1977)
  • 25. “We agree that the power of federal courts to impose duties upon third parties is not without limits; unreasonable burdens may not be imposed.”
  • 26. So now we have CALEA
  • 27. CALEA ● telecom providers are required to assist law enforcement ● fuzzy applicability to internet service companies
  • 28. The All Writs Act was used in Apple v. FBI
  • 29. What was the outcome in Apple v. FBI? The FBI used a vulnerability to hack into the phone - to date, bugs have been providing a form of pressure release
  • 31. “According to Reuters and The Washington Post, the Justice Department sought an order from a federal court to force Facebook to wiretap encrypted voice conversations on Facebook Messenger as part of an investigation into the MS- 13 gang” https://www.aclu.org/blog/privacy- technology/internet-privacy/aclu-seeks-secret- ruling-stopped-feds-hacking-facebook
  • 32. Facebook refuses, saying would need to re-write Messenger app’s code & undermine security for all users. DOJ tries to hold Facebook in contempt of court, but lost. ACLU filed a motion to unseal judicial rulings associated with the attempt to make Facebook decrypt Messenger calls. https://www.aclu.org/blog/privacy- technology/internet-privacy/aclu-seeks-secret- ruling-stopped-feds-hacking-facebook
  • 33. also
  • 35. Can we have messaging systems that are engineered to deal with child porn and law enforcement access, without building tech that gets used for censorship and copyright enforcement?
  • 36. Forced signing of “malicious” updates by a government?
  • 38. Barr’s remarks “But the digital world that has proven such a boon in many ways has also empowered criminals. Like everybody else, criminals of all stripes increasingly rely on wireless communications, hand-held devices, and the internet. In today’s world, evidence of crime is increasingly digital evidence. As we work to secure our data and communications from hackers, we must recognize that our citizens face a far broader array of threats...While we should not hesitate to deploy encryption to protect ourselves from cybercriminals, this should not be done in a way that eviscerates society’s ability to defend itself against other types of criminal threats.”
  • 39. Barr’s remarks “What is happening here is that some companies want to say to the individual, “Hey, we can make you invisible to law enforcement.” But do we want to live in a society where everyone is invisible to law enforcement?”
  • 40. Barr’s remarks “These considerations apply to privacy. That right has never been absolute. The Fourth Amendment strikes a balance between the individual citizen’s interest in conducting certain affairs in private and the general public’s interest in subjecting possible criminal activity to investigation.”
  • 41. But weakening encryption is not like a 4th Amendment balancing test
  • 42. Backdoored encryption standards are encryption algorithms that have been intentionally weakened
  • 44. How would we protect escrowed keys? Does only the FBI get them? How do local law enforcement use them?
  • 45. How does this even work with the global Internet?
  • 47. Can’t we just compel people to provide decryption keys? 1. This doesn’t work so well in the investigative stage 2. The Fifth Amendment can be invoked by the defendant to resist providing their encryption keys
  • 48. Sources ● Clipping Clipper https://www.wired.com/1994/09/clipping-clipper-matt-blaze/ & https://www.mattblaze.org/papers/eesproto.pdf ● EFF’s Bernstein summaryhttps://www.eff.org/cases/bernstein-v-us-dept-justice ● Apple v FBI timeline: https://www.usatoday.com/story/tech/news/2016/03/15/apple-v-fbi-timeline/81827400/ ● Software Alliance paper https://www.bsa.org/policy-filings/us-encryption-and-law-enforcement-access-to-data ● Video of DOJ’s Lawful Access Summit https://www.justice.gov/opa/video/lawful-access-summit ● https://freedom-to-tinker.com/2019/10/06/content-moderation-for-end-to-end-encrypted-messaging/ and Barr’s remarks: https://www.justice.gov/opa/speech/attorney-general-william-p-barr-delivers-remarks-lawful-access-summit ● https://cyberlaw.stanford.edu/blog/2019/10/william-barr-and-winnie-pooh ● Content Moderation for End-to-End Encrypted Messaging by Jonathan Mayer, https://freedom-to- tinker.com/2019/10/06/content-moderation-for-end-to-end-encrypted-messaging/ ● US Attorney’s Manual, Section 9-7.000 - Electronic Surveillance, https://www.justice.gov/usam/usam-9-7000- electronic-surveillance ● FBI Domestic Investigations and Operations Guide https://vault.fbi.gov/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29/FBI%2 0Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29%202016%20Version ● Lawfare blog, https://www.lawfareblog.com

Editor's Notes

  1. https://flickr.com/photos/drbillydude/37337740262/
  2. Feb 1994, NSA wanted to test Clipper chip as a replacement to current standard, DES Used hardware; had “Law Enforcement Access Field (LEAF)” that can read data encoded with the chip; information was held in separate secret digital vaults by two government agencies
  3. The LEAF is protected by a 16-bit checksum, But any random sequence of 16 bits has a 1-in-65,000 shot at passing that checksum test & we can script that. Matt Blaze found it took about 42 minutes to make a fake one that was good enough that law enforcement officials can't tell if they have a valid or bogus LEAF -- the bogus number strings he generated could pass the checksum July 20, 1994 - govt abandons clipper chip
  4. In the Bernstein case, a professor challenged the ITAR restrictions on software encryption, arguing that they infringed his first amendment rights. He developed an encryption algorithm & wanted to publish a math paper & source code with the algorithm. ITAR requirements at the time required him to register as an arms dealer & have the software reviewed by the government. Software still can be covered by ITAR or EAR restrictions, but they aren’t as restrictive as they used to be, and the courts did recognize software as speech, and found that restrictions on some software could have first amendment implications.
  5. FBI didn’t know the passcode to iphone, and the iphone would erase the contents after 10 incorrect passcodes. So they needed a way to bypass this restriction. https://flickr.com/photos/matsuyuki/8444605838
  6. Apple says that building this custom iOS will cause security problems for all users of iPhones https://flickr.com/photos/151234415@N07/32480841316
  7. Apple published a letter to their customers explaining why they weren’t complying with the order
  8. Once this tool was created, how would Apple restrict who could use it? Would every cellphone taken from someone arrested for a drug misdemeanor charge be subject to this type of unlocking and search? There are some rules in this area, but it turns out that they tend to silent on a lot of topics relevant to the search of digital devices
  9. The 4th Amendment still applies here, though. It guarantees protection from unreasonable government intrusion, and is largely case law. Ask-> statutes v case law Common law Judge made law www.flickr.com/photos/ianafotog/6903741624
  10. Title III prohibits private citizens from using electronic surveillance techniques and sets up rules for law enforcement to use wiretaps and record calls, but it requires compliance with specific requirements www.flickr.com/photos/jcphotolog/5592963392
  11. ECPA passed in 1986-Specifically, Congress added "electronic communications" as a new category of communications whose interception is covered by Title III. Electronic communications are non-voice communications made over a network in or affecting interstate commerce, and include text messages, electronic mail ("email"), facsimiles ("faxes"), other non-voice Internet traffic, and communications over digital-display pagers
  12. Network Investigative Technique - rules around them changed with Rule 41 of Fed Rules of Crim Pro that took effect Dec 2016 www.flickr.com/photos/thomashawk/7117207093
  13. Warrant from a NIT from https://motherboard.vice.com/en_us/article/d3b3xk/the-fbi-created-a-fake-fedex-website-to-unmask-a-cybercriminal
  14. Location to be searched here is an email address
  15. Turns out that law enforcement having trouble getting evidence isn’t a new problem https://flickr.com/photos/tigerplish/250835499
  16. passed as part of the Judiciary Act of 1789 - this is what was used in the NY Telephone & in Apple v FBI. But it was also used in an earlier case as well https://www.flickr.com/photos/thomashawk/11028266054/
  17. Usually this is really boring stuff to help make the court system run https://www.flickr.com/photos/wiechert/6441071577/
  18. court used the authority of the All Writs Act to order the phone company to lend the FBI a telephone line and to help them install the monitoring device at the phone company The old methods of clipping into wires for PRTTs and wiretaps didn’t work anymore with the new phone company infrastructure
  19. This still leaves us with questions about what’s an unreasonable burden under the AWA, applicability to information services, and post-CALEA holdings
  20. https://www.flickr.com/photos/mccun934/4112187713/
  21. 1994: Communications Assistance for Law Enforcement Act to require phone service providers to assist law enforcement with wiretaps Treats internet services differently from communication services Internet services were explicitly excluded from being required to build their systems in a way that could be easily wiretapped www.flickr.com/photos/nic1/17262200550
  22. https://flickr.com/photos/smemon/8039833659/
  23. At least 10:00 - 15:00
  24. -FB refused, saying they’d need to rewrite the messenger code -DOJ tried to hold FB in contempt -ACLU filed a motion to unseal; no updates since November 2018 https://flickr.com/photos/jason_ff/1455514845
  25. Australia’s law
  26. Held on October 4 in DC https://www.justice.gov/opa/video/lawful-access-summit
  27. -criminals are using mobile phones and the internet! And Law Enforcement can’t access some of the content of their messages
  28. You say invisible to law enforcement, I say TLS and end to end encryption protect my data from data breaches
  29. https://flickr.com/photos/jbedrina/27514581535
  30. How do we write a system that can only be used by the government and is impervious to being hacked? It is unreasonable to assume that any such system won’t be probed and investigated, and the entire history of software suggests that someone will find an exploit that works against the system https://flickr.com/photos/94132145@N04/16039293156/
  31. How do you keep US citizens from just installing non-backdoored messaging apps made in other countries? https://flickr.com/photos/klubmoozak/8231390644
  32. And how do you keep repressive regimes from demanding the use of these backdoors as well?