Here's How Apple Plans to Beat the FBI
Among other things, Apple alleges that the FBI violates its First Amendment rights by compelling company engineers to write code.
Among other things, Apple alleges that the FBI violates its First Amendment rights by compelling company engineers to write code.
Big names in tech file briefs in support.
Maryland legislators want to limit the use of listening devices on public buses.
School administrators say she should have password-protected the phone.
Judiciary Committee members understand the precedent involved.
Federal officials can't keep their own secrets. Would you really trust them with the ability to access yours?
Says government has overstepped bounds
The 6-to-1 ruling says it's unconstitutional to punish people for withdrawing "implied consent."
The stories of yesterday provide hints for the lawmakers of tomorrow.
This is why you shouldn't accept the FBI's 'just one phone' decryption argument.
The national security whistleblower talks to the Free State Project from an undisclosed location in Russia.
The DOJ has persuaded a judge to issue a search warrant for a thing that does not exist, by forcing Apple to create a key that the FBI is incapable of creating.
Kennedy and Matt Welch defend Apple against the FBI
It's possible that the FBI is not primarily concerned with the particular evidence stored on the San Bernardino shooter's phone at all.
Would the government really limit itself to just this one terrorist iPhone? Tune into Kennedy on Fox Business Network; replay at midnight
The talking points insist this Apple case is an isolated incident. Evidence suggests otherwise.
Cases involving drug prohibition reveal the late justice's fickle fidelity to the Fourth Amendment and federalism.
The stick has been suggested. Now where is the carrot?
This seemingly simple demand opens a massive can of extremely dangerous worms.
Which side are you on? Government spies or corporate guardians?
Consider Sen. Tom Cotton and Rep. Justin Amash and guess which is which.
Harvard and other elites take aim at any possibility of financial privacy in the name of curbing criminals flashing their big cash.
Company will not compromise user security to help access terrorist's phone.
The late Supreme Court justice was inaccurately described as "authoritarian."
Legislation would require warrants for old communications.
Whoops! The mandatory unmanned aerial vehicle database is public and searchable.
Turning journalistic deception into legal matter can have a chilling effect.
It seems that every week, more information comes to light about Clinton's grave legal woes.
The investigative journalism outfit launches hidden service website on the encrypted Tor Browser.
We can blame last summer's Office of Personnel Management hack on good, old-fashioned bureaucratic incompetence-not a lack of CISA-style "information sharing."
The Apple CEO has become an outspoken defender of privacy rights.
More bumbling around tech privacy issues
The USA Freedom Act wouldn't have happened without the leaks.
A guide to anonymous encrypted communication in 5 easy steps.
Poll shows citizens fine with warrantless snooping to fight terrorism.
At the heart of the measure is expansion of the feds' ability to access data without a warrant.
Some might find this argument in favor of expanded surveillance a bit underwhelming.
Right before the holidays, TSA changes the rules to stop some from opting for pat-downs.
Why you should question reporters who are obviously working with law enforcement for preferential treatment.
More government snooping of Americans; less liability for big business.
CISA is alive and appears to have the White House's support.
Baffling contradictions about privacy or just old-fashioned blame-shifting?
No-gun zones like the one in effect where the San Bernardino shooting took place are not only unconstitutional but also an invitation to disaster.
Meanwhile a cybersecurity bill could put private customer data in the hands of DHS.