CRYPTO DEBATE BIBLIOGRAPHY in reverse chronological order

Major Announcements, Statements, General News Coverage

Microsoft will encrypt Bing search traffic by default James Vincent, The Verge, June 16, 2015 ​ ​ http://www.theverge.com/2015/6/16/8788373/encrypted­search­microsoft­bing

Wikipedia Is Now Using HTTPS By Default To Prevent Snooping And Censorship Kate Vinton, Forbes, June 12, 2015 ​ ​ http://www.forbes.com/sites/katevinton/2015/06/12/wikipedia­is­now­using­https­by­default­to­prevent­snoop ing­and­censorship/

If the FBI has a backdoor to or Apple encryption, we are less safe Trevor Timm, , June 9, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/jun/09/fbi­facebook­backdoor­apple­encryption­less­safe­p rivacy

With Islamic State using instant messaging apps, FBI seeks access to data Brian Bennett, The LA Times, June 8, 2015 ​ ​ http://www.latimes.com/world/middleeast/la­fg­terror­messaging­20150608­story.html#page=1

Congress on verge of major cuts to key cryptography agency Drew Mitnick, Access, June 5, 2015 ​ ​ https://www.accessnow.org/blog/2015/06/05/congress­on­verge­of­major­cuts­to­key­cryptography­agency

FBI anti­terror official calls on tech firms to 'prevent encryption above all else' Alex Hern, The Guardian, June 5, 2015 ​ ​ http://www.theguardian.com/technology/2015/jun/05/fbi­anti­terror­tech­firms­encryption?CMP=twt_gu

Microsoft Gives Details About Its Controversial Disk Encryption Micah Lee, The Intercept, June 4, 2015 ​ ​ https://firstlook.org/theintercept/2015/06/04/microsoft­disk­encryption/

Facebook introduces PGP encryption for sensitive emails Alex Hern, The Guardian, June 1, 2015 ​ ​ http://www.theguardian.com/technology/2015/jun/01/facebook­introduces­pgp­encryption­for­sensitive­email s

Lawmakers urge FBI to stand down on decryption push Ellen Nakashima, The Washington Post, June 1, 2015 ​ ​ http://www.washingtonpost.com/blogs/post­politics/wp/2015/06/01/lawmakers­urge­fbi­to­stand­down­on­dec ryption­push/

The man behind Yahoo’s plan to become the most ‘trustworthy’ tech company Andrea Peterson, The Washington Post, May 29, 2015 ​ ​ 1 http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/29/the­man­behind­yahoos­plan­to­become­th e­most­trustworthy­tech­company/

U.N. Special Rapporteur: Governments Must Not “Backdoor” Encryption For Spying Ryan Gallagher, The Intercept, May 28, 2015 ​ ​ https://firstlook.org/theintercept/2015/05/28/united­nations­encryption­anonymity­surveillance/

Today’s Internet users are still being hurt by ’90s­era U.S. encryption policies Andrea Peterson, The Washington Post, May 28, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/28/todays­internet­users­are­still­being­hurt­by ­90s­era­u­s­encryption­policies/

U.N. report: Encryption is important to human rights — and backdoors undermine it Andrea Peterson, The Washington Post, May 28, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/28/un­report­encryption­is­important­to­human ­rights­and­backdoors­undermine­it/

NSA chief: Encryption isn't bad, it's the future Steve Ranger, ZDNet, May 28, 2015 ​ ​ http://www.zdnet.com/article/nsa­chief­encryption­isnt­bad­its­the­future/

Loretta Lynch Joins Obama Administration Fearmongering Over Encryption Sam Sacks, The Intercept, May 27, 2015 ​ ​ https://firstlook.org/theintercept/2015/05/27/loretta­lynch­joins­obama­administration­fearmongering­encrypti on/

Microsoft’s Top Lawyer Says Company Must Weigh Encryption Limits Danny Yadron, The Wall Street Journal, May 27, 2015 ​ ​ http://blogs.wsj.com/digits/2015/05/27/brad­smith­suggests­microsoft­might­obey­law­that­limits­encryption/

Encryption innovator leaves US over surveillance Elise Viebeck, The Hill, May 26, 2015 ​ ​ http://thehill.com/policy/cybersecurity/243101­encryption­innovator­leaves­us­over­surveillance

Is This the NSA’s Secret to Cracking Secure Comms? Nicholas Weaver, The Daily Beast, May 21, 2015 ​ ​ http://www.thedailybeast.com/articles/2015/05/21/is­this­the­nsa­s­secret­to­cracking­secure­comms.html

Encryption, But With Backdoors? The FBI Has Business Running In Circles Tim Sparapani, Forbes, May 21, 2015 ​ ​ http://www.forbes.com/sites/timsparapani/2015/05/21/encryption­but­with­backdoors­the­fbi­has­business­ru nning­in­circles/

Anatomy of a LOGJAM ­ another TLS vulnerability, and what to do about it Paul Ducklin, Naked Security, May 21, 2015 ​ ​ https://nakedsecurity.sophos.com/2015/05/21/anatomy­of­a­logjam­another­tls­vulnerability­and­what­to­do­ about­it/

2 Transcript: Comey Says Authors of Encryption Letter Are Uninformed or Not Fair­Minded Megan Graham, Just Security, May 20, 2015 ​ ​ http://justsecurity.org/23120/transcript­comey­authors­encryption­letter­uniformed­fair­minded/

FBI head found Silicon Valley encryption letter 'depressing' Corey Bennett, The Hill, May 20, 2015 ​ ​ http://thehill.com/policy/cybersecurity/242666­fbi­head­found­silicon­valley­encryption­letter­depressing

HTTPS­crippling attack threatens tens of thousands of Web and mail servers Dan Goodin, ArsTechnica, May 20, 2015 ​ ​ http://arstechnica.com/security/2015/05/https­crippling­attack­threatens­tens­of­thousands­of­web­and­mail­ servers/

What You Need to Know About the New LogJam Bug Jennifer Valentino­Devries, The Wall Street Journal, May 20, 2015 ​ ​ http://blogs.wsj.com/digits/2015/05/20/what­you­need­to­know­about­the­new­logjam­bug/

Tech Giants Urge Obama to Reject Policies That Weaken Encryption Nicole Perlroth, The New York Times, May 19, 2015 ​ ​ http://www.nytimes.com/2015/05/20/technology/tech­giants­urge­obama­to­reject­policies­that­weaken­encr yption­technology.html?ref=technology&_r=0

Tech giants don’t want Obama to give police access to encrypted phone data Ellen Nakashima, The Washington Post, May 19, 2015 ​ ​ http://www.washingtonpost.com/world/national­security/as­encryption­spreads­us­worries­about­access­to­d ata­for­investigations/2015/04/10/7c1c7518­d401­11e4­a62f­ee745911a4ff_story.html

Apple and Google sign letter urging Obama to support encryption Alex Hern, The Guardian, May 19, 2015 ​ ​ http://www.theguardian.com/technology/2015/may/19/apple­google­letter­president­obama­encryption­fbi­su rveillance

Pretty Much Anyone With Any Understanding Of Crypto Tells President Obama That Backdooring Crypto Is Monumentally Stupid Mike Masnick, Tech Dirt, May 19, 2015 ​ ​ https://www.techdirt.com/articles/20150518/21180031044/pretty­much­anyone­with­any­understanding­crypt o­tells­president­obama­that­backdooring­crypto­is­monumentally­stupid.shtml

“We Support Strong Encryption” Jonathan Mayer, Web Policy, May 12, 2015 ​ ​ http://webpolicy.org/2015/05/12/we­support­strong­encryption/

Bill would prohibit government­ordered tech ‘back doors’ Elise Viebeck, The Hill, May 5, 2015 ​ ​ http://thehill.com/policy/cybersecurity/241130­bill­would­prohibit­government­ordered­tech­back­doors

Internet godfather warns about plans for technology ‘back doors’

3 Julian Hattem, The Hill, May 4, 2015 ​ ​ http://thehill.com/policy/technology/240965­internet­godfather­warns­about­plans­for­technology­back­doors

Increased encryption a double­edged sword Maria Korolov, CSO Online, May 4, 2015 ​ ​ http://www.csoonline.com/article/2917210/network­security/increased­encryption­a­double­edged­sword.htm

The FBI wants us to have computer security so strong that only they can break in… John Naughton, The Guardian, May 3, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/may/03/fbi­computer­security­strong­break­in

Encryption won't work if it has a back door only the 'good guys' have keys to Cory Doctorow, The Guardian, May 1, 2015 ​ ​ http://www.theguardian.com/technology/2015/may/01/encryption­wont­work­if­it­has­a­back­door­only­the­go od­guys­have­keys­to­

Mozilla goes all out for Web encryption Elise Viebeck, The Hill, May 1, 2015 ​ ​ http://thehill.com/policy/cybersecurity/240777­mozilla­goes­all­out­for­web­encryption

Irate Congressman gives cops easy rule: “just follow the damn Constitution” Cyrus Farivar, Ars Technica, April 30, 2015 ​ ​ http://arstechnica.com/tech­policy/2015/04/irate­congressman­gives­cops­easy­rule­just­follow­the­damn­co nstitution/

InfoSec pros reject DHS criticisms of encryption Maria Korolov, CSO Online, April 30, 2015 ​ ​ http://www.csoonline.com/article/2916820/data­protection/infosec­pros­reject­dhs­criticisms­of­encryption.ht ml

Feds are using fear, not facts, in anti­encryption crusade Joshua Kopstein, Al Jazeera America, April 30, 2015 ​ ​ http://america.aljazeera.com/opinions/2015/4/feds­are­using­fear­not­facts­in­anti­encryption­crusade.html

Congressman with computer science degree: Encryption back­doors are ‘technologically stupid’ Andrea Peterson, The Washington Post, April 30, 2915 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/04/30/congressman­with­computer­science­degre e­encryption­back­doors­are­technologically­stupid/

Lawmakers Challenge FBI On Surveillance Backdoors, Encryption Hamza Shaban, Buzzfeed News, April 30, 2015 ​ ​ http://www.buzzfeed.com/hamzashaban/lawmakers­challenge­fbi­on­surveillance­backdoors­encryption#.qe 1aQ1xv6M

Both sides of data encryption debate face off in Congress Joe Uchill, The Christian Science Monitor, April 30, 2015 ​ ​ http://www.csmonitor.com/World/Passcode/2015/0430/Both­sides­of­data­encryption­debate­face­off­in­Con gress 4

Lawmakers skeptical of FBI's encryption warnings Cory Bennet, The Hill, April 29, 2015 ​ ​ http://thehill.com/policy/cybersecurity/240553­lawmakers­skeptical­of­fbis­encryption­breaking­request

Representatives question FBI and point out fallacies during default encryption hearing Ashley Carman, SC Magazine, April 29, 2015 ​ ​ http://www.scmagazine.com/committee­on­oversight­government­reform­hosts­encryption­hearing/article/41 1928/

American Civil Liberties Union Letter: Hearing on “Encryption Technology and Potential U.S. Policy Responses.” ACLU, April 29, 2015 https://www.aclu.org/sites/default/files/field_document/encryption_letter_for_hearing_4­30_final.pdf

Google and Facebook Execs Question Government Desire for Encryption Backdoors Tom Simonite, MIT Technology Review, April 23, 2015 ​ ​ http://www.technologyreview.com/news/536986/google­and­facebook­execs­question­government­desire­for ­encryption­backdoors/

White House seeks Silicon Valley help on strong yet breakable encryption Joseph Menn, Reuters, April 23, 2015 ​ ​ http://mobile.reuters.com/article/idUSKBN0NC2LT20150421?irpc=932

The FBI Keeps Demanding Impossible Solutions to Its Encryption Problem Jason Koebler, Motherboard, April 21, 2015 ​ ​ http://motherboard.vice.com/read/the­fbi­keeps­demanding­impossible­solutions­to­its­encryption­problem?tr k_source=recommended

Some tech firms being 'friendly to terrorists' says UK police chief Michael Holden, Reuters, April 21, 2015 ​ ​ http://uk.reuters.com/article/2015/04/21/uk­britain­security­tech­idUKKBN0NC1HX20150421

The FBI’s Stance on Encrypted Communications FBI Executive Assistant Director Amy Hess, The Wall Street Journal, April 21, 2015 ​ ​ http://blogs.wsj.com/experts/2015/04/20/the­fbis­stance­on­encrypted­communications/

The NSA’s Split­Key Encryption Proposal is Not Serious Joseph Lorenzo Hall, Center for Democracy and Technology, April 20, 2015 ​ ​ https://cdt.org/blog/the­nsas­split­key­encryption­proposal­is­not­serious/

Should Law Enforcement Have the Ability to Access Encrypted Communications? Carrie Cordero and Marc Zwillinger, The Wall Street Journal, April 19, 2015 ​ ​ http://www.wsj.com/article_email/should­law­enforcement­have­the­ability­to­access­encrypted­communicati ons­1429499474­lMyQjAxMTE1NjI5MDMyMzA2Wj

Manhattan DA: Terrorists love using Apple and Google phones Mark Hensch, The Hill, April 19, 2015 ​ ​ 5 http://thehill.com/policy/technology/239349­new­york­da­terrorists­love­using­apple­google­phones

Google Says “Vast Majority” Of Ads On Its Platforms Will Be Encrypted By June 30 Anthony Ha, Tech Crunch, April 17, 2015 ​ ​ http://techcrunch.com/2015/04/17/google­ads­https/

Senator Wyden: Congress may block government access to encrypted consumer devices (+video) Sara Sorcher, The Christian Science Monitor, April 17, 2015 ​ ​ http://www.csmonitor.com/World/Passcode/2015/0417/Senator­Wyden­Congress­may­block­government­ac cess­to­encrypted­consumer­devices­video

On the Clipper Chip's Birthday, Looking Back on Decades of Key Escrow Failures Parker Higgins, Electronic Frontier Foundation, April 16, 2015 ​ ​ https://www.eff.org/deeplinks/2015/04/clipper­chips­birthday­looking­back­22­years­key­escrow­failures

Netflix will start encrypting its streams to block prying eyes and internet providers Zachary M. Seward, Quartz, April 16, 2015 ​ ​ http://qz.com/384184/netflix­will­start­encrypting­its­streams­to­block­prying­eyes­and­internet­providers/

ACLU: Watchdogs must protect whistleblowers with encryption Elise Viebeck, The Hill, April 16, 2015 ​ ​ http://thehill.com/policy/cybersecurity/239092­aclu­watchdogs­must­protect­whistleblowers­with­encryption

Why confidential tips to the government may not be confidential after all Craig Timberg and Lisa Rein, The Washington Post, April 16, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/04/16/why­confidential­tips­to­the­government­ma y­not­be­confidential­after­all/

How do we build encryption backdoors? Matthew Green, Matthew Green’s Blog, April 16, 2015 ​ ​ http://blog.cryptographyengineering.com/2015/04/how­do­we­build­encryption­backdors.html

EFF at 25: Remembering the Case that Established Code as Speech Alison Dame­Boyle, Electronic Frontier Foundation, April 16, 2015 ​ ​ https://www.eff.org/deeplinks/2015/04/remembering­case­established­code­speech

White House seeks to break encryption stalemate Elise Viebeck, The Hill, April 13, 2015 ​ ​ http://thehill.com/policy/cybersecurity/238602­white­house­seeks­to­break­encryption­stalemate

NSA dreams of smartphones with “split” crypto keys protecting user data Dan Goodin, Arstechnica, April 12, 2015 ​ ​ http://arstechnica.com/tech­policy/2015/04/nsa­dreams­of­smartphones­with­split­crypto­keys­protecting­use r­data/

As encryption spreads, U.S. grapples with clash between privacy, security Ellen Nakashima and Barton Gellman, The Washington Post, April 10, 2015 ​ ​

6 http://www.washingtonpost.com/world/national­security/as­encryption­spreads­us­worries­about­access­to­d ata­for­investigations/2015/04/10/7c1c7518­d401­11e4­a62f­ee745911a4ff_story.html?postshare=53142869 9926574

China Is Said to Use Powerful New Weapon to Censor Internet Nicole Perlroth, The New York Times, April 10, 2015 ​ ​ http://www.nytimes.com/2015/04/11/technology/china­is­said­to­use­powerful­new­weapon­to­censor­interne t.html?hpw&rref=technology&action=click&pgtype=Homepage&module=well­region®ion=bottom­well&W T.nav=bottom­well&_r=3

TrueCrypt audit shows no evidence of NSA backdoors Zack Wittker, ZDNet, April 2, 2015 ​ ​ http://www.zdnet.com/article/truecrypt­likely­didnt­quit­on­nsa­backdoor­fears/

New Firefox version says “might as well” to encrypting all Web traffic Dan Goodin, Ars Technica, April 1, 2015 ​ ​ http://arstechnica.com/security/2015/04/new­firefox­version­says­might­as­well­to­encrypting­all­web­traffic/

Europe’s law enforcement chief joins in crypto panic Glyn Moody, Ars Technica, March 30, 2015 ​ ​ http://arstechnica.com/tech­policy/2015/03/europes­law­enforcement­chief­joins­in­crypto­panic/

Silicon Valley spars with Obama over 'backdoor' surveillance Cory Bennet, The Hill, March 22, 2015 ​ ​ http://thehill.com/policy/cybersecurity/236512­silicon­valley­spars­with­obama­over­backdoor­surveillance

Google's Schmidt predicts 'win' on encryption debate Mario Trujillo, The Hill, March 18, 2015 ​ ​ http://thehill.com/policy/technology/236141­googles­schmidt­predicts­win­on­encryption­debate

Yahoo Is Jostling to Be Known as the Most Secure Email Provider Lily Hay Newman, Slate, March 16, 2015 ​ ​ http://www.slate.com/blogs/future_tense/2015/03/16/yahoo_it_lead_alex_stamos_says_end_to_end_plugin_ and_disposable_passwords.html iSpy: The CIA Campaign to Steal Apple’s Secrets Jeremy Scahill and Josh Begley, The Intercept, March 10, 2015 ​ ​ https://firstlook.org/theintercept/2015/03/10/ispy­cia­campaign­steal­apples­secrets/

Encryption Backdoors Will Always Turn Around And Bite You In The Ass Mike Masnick, Tech Dirt, March 4, 2015 ​ ​ https://www.techdirt.com/articles/20150304/06534030206/encryption­backdoors­will­always­turn­around­bite ­you­ass.shtml

FREAK Flaw in Android and Apple Devices Cripples HTTPS Crypto Protection ​ Dan Goodin, ArsTechnica, March 3, 2015 ​ ​ http://arstechnica.com/security/2015/03/freak­flaw­in­android­and­apple­devices­cripples­https­crypto­protec tion/ 7

The Human Rights Benefits of Encryption Andi Wilson and Danielle Kehl, New America’s Open Technology Institute, March 2, 2015 ​ ​ http://www.newamerica.org/oti/the­human­rights­benefits­of­encryption/

Exclusive: Obama Sharply Criticizes China's Plans for New Technology Rules Jeff Mason, Reuters, March 2, 2015 ​ ​ http://www.reuters.com/article/2015/03/02/us­usa­obama­china­idUSKBN0LY2H520150302?feedType=RSS &feedName=technologyNews

The United States Is Angry That China Wants Crypto Backdoors, Too Lorenzo Franceschi­Biccierai, Motherboard, February 27, 2015 ​ ​ http://motherboard.vice.com/read/the­united­states­is­angry­that­china­wants­crypto­backdoors­too

The Man Who Crafted the Patriot Act Now Supports Your Right to Encrypt Data Jason Koebler, Motherboard, February 27, 2015 ​ ​ http://motherboard.vice.com/read/the­man­who­crafted­the­patriot­act­now­supports­your­right­to­encrypt­da ta

West Coast vs. East Coast: The Crypto Cold War Between the Feds and the Tech Industry Just Got Hot Kevin Bankston, Slate, February 25th, 2015 ​ ​ http://www.slate.com/articles/technology/future_tense/2015/02/yahoo_s_alex_stamos_and_nsa_s_mike_rog ers_fight_about_encryption.html?wpsrc=sh_all_dt_tw_top

Clinton is Looking for a Middle Ground on Encryption that Experts Say Doesn’t Exist Andrea Peterson, The Washington Post, February 25, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/02/25/clinton­is­looking­for­a­middle­ground­on­e ncryption­that­experts­say­doesnt­exist/

What NSA Director Mike Rogers Doesn’t Get About Encryption Julian Sanchez, Cato Institute, February 24, 2015 ​ ​ http://www.cato.org/blog/what­nsa­director­mike­rogers­doesnt­get­about­encryption

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle Jeremy Scahill and Josh Begley, The Intercept, February 19, 2015 ​ ​ https://firstlook.org/theintercept/2015/02/19/great­sim­heist/

Security Services Capable of Bypassing Encryption, Draft Code Reveals Alan Travis, The Guardian, February 6, 2015 ​ ​ http://www.theguardian.com/uk­news/2015/feb/06/uk­security­services­capable­bypassing­encryption­draft­c ode

An Open Letter to Prime Minister Cameron Jonathan Zittrain, Medium, February 6, 2015 ​ ​ https://medium.com/message/dear­prime­minister­cameron­20th­century­solutions­wont­help­21st­century­s urveillance­ff2d7a3d300c

8

Tyrants will find the key to the internet’s back door Jonathan Zittrain, The , February 2, 2015 ​ ​ http://www.ft.com/intl/cms/s/0/e99017f2­a572­11e4­ad35­00144feab7de.html#axzz3RMI0y8Pb

Harvard vs Cameron: Professors defend encryption John Gapper, The Financial Times, January 22, 2015 ​ ​ http://blogs.ft.com/the­world/2015/01/harvard­vs­cameron­professors­defend­encryption/

EU Could Demand That Web Firms Decrypt Emails: Adviser Reuters, The New York Times, January 21, 2015 ​ ​ http://www.nytimes.com/reuters/2015/01/21/technology/21reuters­eu­security­encryption.html

Wrong Responses to Charlie Hebdo The Editorial Board, The New York Times, January 15, 2015 ​ ​ http://www.nytimes.com/2015/01/16/opinion/after­paris­attacks­wrong­responses­to­charlie­hebdo.html

Obama, Cameron to discuss encryption of online services Greg Jaffe and Katie Zezima, The Washington Post, January 15, 2015 ​ ​ http://www.washingtonpost.com/politics/obama­cameron­to­discuss­encryption­of­online­services/2015/01/1 5/e215effe­9ceb­11e4­96cc­e858eba91ced_story.html

Secret US Cybersecurity Report: Encryption Vital to Protect Private Data James Ball, The Guardian, January 15, 2015 ​ ​ http://www.theguardian.com/us­news/2015/jan/15/­sp­secret­us­cybersecurity­report­encryption­protect­data ­cameron­paris­attacks

Wrong Responses to Charlie Hebdo The Editorial Board, The New York Times, January 15, 2015 ​ ​ http://www.nytimes.com/2015/01/16/opinion/after­paris­attacks­wrong­responses­to­charlie­hebdo.html

Banning All Encryption Won't Make Us Safer, No Matter What David Cameron Says Trevor Timm, The Guardian, January 13, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/jan/13/banning­encryption­david­cameron­not­safer

For Political Leaders, More Surveillance is Always the Answer Dan Gilmor, Slate, January 13, 2015 ​ ​ http://www.slate.com/blogs/future_tense/2015/01/13/charlie_hebdo_david_cameron_encryption_politicians_ always_think_surveillance.html

What David Cameron just proposed would endanger every Briton and destroy the IT industry Cory Doctorow, Boing Boing, January 13, 2015 ​ ​ http://boingboing.net/2015/01/13/what­david­cameron­just­propos.html

Can the Government Ban Encryption? Jane Wakefield, BBC News, January 13, 2015 ​ ​ http://www.bbc.com/news/technology­30794953

9 Banning All Encryption Won't Make Us Safer, No Matter What David Cameron Says Trevor Timm, The Guardian, January 13, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/jan/13/banning­encryption­david­cameron­not­safer

Prying Eyes: Inside the NSA's War on Internet Security (what encryption they still can’t crack) SPIEGEL Staff, Der Spiegel, December 28, 2014 ​ ​ http://www.spiegel.de/international/germany/inside­the­nsa­s­war­on­internet­security­a­1010361.html

The Wrong Way to Respond to the Snowden Revelations Danielle Kehl and Robert Morgus, Slate, December 19, 2014 ​ ​ http://www.slate.com/articles/technology/future_tense/2014/12/technological_sovereignty_encrypting_not_fr agmenting_the_internet_is_the.html

Chrome Security Team Considers Marking All HTTP Pages As 'Non­Secure' Mike Masnick, Tech Dirt, December 15, 2014 ​ ​ https://www.techdirt.com/articles/20141213/07112629425/chrome­security­team­considers­marking­all­http­ pages­as­non­secure.shtml

With hackers running rampant, why would we poke holes in data security? Ron Wyden, LA Times, December 14, 2014 ​ ​ http://www.latimes.com/opinion/op­ed/la­oe­1215­wyden­backdoor­for­cell­phones­20141215­story.html

We Actually Lost the Crypto Wars Christopher Kuner, Media Policy Project, November 12, 2014 ​ ​ http://blogs.lse.ac.uk/mediapolicyproject/2014/11/12/we­actually­lost­the­crypto­wars/

James Comey, F.B.I. Director, Hints at Action as Cellphone Data is Locked David Sanger and Matt Apuzzo, The New York Times, October 16, 2014 ​ ​ http://www.nytimes.com/2014/10/17/us/politics/fbi­director­in­policy­speech­calls­dark­devices­hindrance­to­ crime­solving.html?_r=0

Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? Remarks of FBI Director James Comey at the Brookings Institution, October 16, 2014 http://www.fbi.gov/news/speeches/going­dark­are­technology­privacy­and­public­safety­on­a­collision­cours e

FBI Director on Privacy, Electronic Surveillance 60 Minutes, October 12, 2014 ​ http://www.cbsnews.com/news/fbi­director­james­comey­on­privacy­and­surveillance/

Smartphone “Backdoors” and Open Computing Julian Sanchez, Just Security, October 6, 2014 ​ ​ http://justsecurity.org/15903/smartphone­backdoors­open­computing/

Holder Urges Tech Companies to Leave Device Backdoors Open for Police Craig Timberg, The Washington Post, September 30, 2014 ​ ​

10 http://www.washingtonpost.com/blogs/the­switch/wp/2014/09/30/holder­urges­tech­companies­to­leave­devi ce­backdoors­open­for­police/

FBI Blasts Apple, Google for Locking Police Out of Phones Craig Timberg & Greg Miller, The Washington Post, September 25, 2014 ​ ​ http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e­4344­11e4­9a15­137aa015352 7_story.html

Newest Androids Will Join iPhones in Offering Default Encryption, Blocking Police Craig Timberg, The Washington Post, September 18, 2014 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2014/09/18/newest­androids­will­join­iphones­in­offerin g­default­encryption­blocking­police/

Apple Will No Longer Unlock Most iPhones, iPads for Police, Even With a Search Warrant Craig Timberg, The Washington Post, September 18, 2014 ​ ​ http://www.washingtonpost.com/business/technology/2014/09/17/2612af58­3ed2­11e4­b03f­de718edeb92f_ story.html

Original Apple Announcement, “A message from Tim Cook about Apple’s commitment to your privacy.” September 17, 2014 https://www.apple.com/privacy/

Pro­crypto analyses & op­eds, or news articles with strong positive angle

Debating the FBI on Smartphone Encryption Peter Swire, Future of Privacy Forum, November 10, 2014 ​ ​ http://www.futureofprivacy.org/2014/11/10/debating­the­fbi­on­phone­encryption/

Issue Brief: A “Backdoor” to Encryption for Government Surveillance Center for Democracy & Technology, November 10, 2014 https://cdt.org/insight/issue­brief­a­backdoor­to­encryption­for­government­surveillance/

The Law Needs To Keep Up With Technology But Not At The Expense of Civil Liberties Cameron Kerry, Forbes, November 6, 2014 ​ ​ ​ ​ http://www.forbes.com/sites/realspin/2014/11/06/the­law­needs­to­keep­up­with­technology­but­not­at­the­ex pense­of­civil­liberties/

James Comey Again Demands Tech Companies Do As He Says And Grant The FBI Complete Access To Whatever It Wants Tim Cushing, TechDirt, November 6, 2014 ​ ​ https://www.techdirt.com/articles/20141105/10194529056/james­comey­again­demands­tech­companies­do ­as­he­says­grant­fbi­complete­access­to­whatever­it­wants.shtml

11 FBI Holds Secret Meeting To Scare Congress Into Backdooring Phone Encryption Mike Masnick, TechDirt, October 31, 2014 ​ ​ https://www.techdirt.com/articles/20141030/16013228988/fbi­holds­secret­meeting­to­scare­congress­into­b ackdooring­phone­encryption.shtml

The 90s and Now: FBI and its Inability to Cope with Encryption Amul Kalia, Electronic Frontier Foundation, October 29, 2014 ​ ​ https://www.eff.org/deeplinks/2014/10/90s­and­now­fbi­and­its­inability­cope­encryption

Apple and Google Are Right. The FBI Is Wrong. CHiPs Nude Photo Scandal Shows Why. Chris Weigant, The Huffington Post, October 27, 2014 ​ ​ http://www.huffingtonpost.com/chris­weigant/apple­and­google­are­righ_b_6057928.html

Lollipop or lockdown? Wha a secure mobile OS means for BYOD Brian Robinson, GCN, October 24, 2014 ​ ​ http://gcn.com/blogs/cybereye/2014/10/android­lollipop­byod.aspx

FBI Director Says Congress Will Fix Phone Encryption ‘Problem;’ Congress Says ‘Bite Us’ Tim Cushing, TechDirt, October 23, 2014 ​ ​ https://www.techdirt.com/articles/20141022/12062628910/fbi­director­says­congress­will­fix­phone­encryptio n­problem­congress­says­bite­us.shtml

In Defense of Smart Phone Security by Default Annie Antón, The Privacy Place, October 19, 2014 ​ ​ http://theprivacyplace.org/2014/10/in­defense­of­smart­phone­security­by­default

Everybody Knows FBI Director James Comey Is Wrong About Encryption, Even The FBI Mike Masnick, TechDirt, October 20, 2014 ​ ​ https://www.techdirt.com/articles/20141019/07115528878/everybody­knows­fbi­director­james­comey­is­wro ng­about­encryption­even­fbi.shtml

FBI’s Comey Calls for Making Impenetrable Devices Unlawful Lauren Walker, Newsweek, October 18, 2014 ​ ​ http://www.newsweek.com/going­not­so­bright­fbi­director­james­comey­calls­making­impenetrable­devices­ 278190

EFF Response to FBI Director Comey’s Speech on Encryption Cindy Cohn, Electronic Frontier Foundation, October 17, 2014 ​ ​ https://www.eff.org/deeplinks/2014/10/eff­response­fbi­director­comeys­speech­encryption

Do FBI’s Examples Support Encryption Worries? (Answer: no.) ​ Jack Gillum and Eric Tucker, Associated Press, October 17, 2014 ​ ​ http://bigstory.ap.org/article/e03177df2c9a4e0ebe5b584c909218bf/do­cases­fbi­cites­support­encryption­wo rries

The FBI Director’s Evidence Against Encryption is Pathetic Dan Froomkin and Nathas Vargas­Cooper, The Intercept, October 17, 2014 ​ ​ https://firstlook.org/theintercept/2014/10/17/draft­two­cases­cited­fbi­dude­dumb­dumb/ 12

Privacy Advocates Don't Buy FBI's Warning About Encryption Practices Carrie Johnson, National Public Radio, October 17, 2014 ​ ​ http://www.npr.org/2014/10/17/356869566/privacy­advocates­don­t­buy­fbi­s­warning­about­encryption­pract ices

FBI Director Comey calls on Congress to stop unlockable encryption. Good luck with that. Nancy Scola, The Washington Post, October 17, 2014 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2014/10/17/fbi­director­comey­calls­on­congress­to­sto p­unlockable­encryption­good­luck­with­that/ (Notes Congressional wariness on issue, pro­crypto voices extensively quoted)

Encryption Whiplash Tim Sparapani, Application Developers Alliance, October 17, 2014 http://www.appdevelopersalliance.org/news/encryption­whiplash

Tales from Decrypt: FBI Wants Backdoors and Ability to Compel Access Jake Laperruque, Center for Democracy & Technology, October 17, 2014 https://cdt.org/blog/tales­from­decrypt­fbi­wants­backdoors­and­ability­to­compel­access/

The FBI Is Dead Wrong: Apple’s Encryption Is Clearly in the Public Interest Ken Gude, Wired, October 17, 2014 ​ ​ Wired op­ed http://www.wired.com/2014/10/fbi­is­wrong­apple­encryption­is­good/ ​

NSA Surveillance Costs and the Crypto Debate: Tech Companies Compete on Privacy Post­Snowden Danielle Kehl and Kevin Bankston, New America’s Open Technology Institute, October 17, 2014 ​ ​ http://newamerica.org/oti/nsa­surveillance­costs­and­the­crypto­debate/

The government wants tech companies to give them a backdoor to your electronic life Trevor Timm, The Guardian, October 17, 2014 ​ ​ http://www.theguardian.com/commentisfree/2014/oct/17/government­internet­backdoor­surveillance­fbi

In attack on encryption, FBI director ignores those who need protection Jon Healey, LA Times, October 17, 2014 ​ ​ http://www.latimes.com/opinion/opinion­la/la­ol­fbi­encryption­apple­google­smartphones­20141017­story.ht ml

Fool’s Gold: Data Security is Vital to End Users Amie Stepanovich, Access, October 16, 2014 ​ ​ https://www.accessnow.org/blog/2014/10/16/fools­gold­data­security­is­vital­to­users

FBI Director Continues His Attack On Technology, Privacy And Encryption Mike Masnick, TechDirt, October 16, 2014 ​ ​ https://www.techdirt.com/articles/20141016/11531128849/fbi­director­continues­his­attack­technology­privac y­encryption.shtml

Even a Golden Key Can Be Stolen By Thieves: The Simple Facts of Apple’s Encryption Decision 13 Jeremy Gillula, Electronic Frontier Foundation, October 10, 2014 ​ ​ https://www.eff.org/deeplinks/2014/10/even­golden­key­can­be­stolen­thieves­simple­facts­apples­encryptio n­decision

Crypto Wars Redux: Why the FBI’s Desire to Unlock Your Private Life Must Be Resisted Cory Doctorow, The Guardian, October 9, 2014 ​ ​ http://www.theguardian.com/technology/2014/oct/09/crypto­wars­redux­why­the­fbis­desire­to­unlock­your­pr ivate­life­must­be­resisted

As Surveillance Reforms Languish, New Tools for Consumers to Protect Data Criticized by FBI Ed Black, The Huffington Post, October 9, 2014 ​ ​ http://www.huffingtonpost.com/edward­j­black/as­surveillance­reforms­l_b_5958352.html

Encryption Makes Us All Safer Nuala O’Connor, Center for Democracy & Technology, October 8, 2014 ​ ​ https://cdt.org/blog/encryption­makes­us­all­safer/

What Default Phone Encryption Really Means for Law Enforcement Cindy Cohn, Jeremy Gillula and Seth Schoen, Vice, October 8, 2014 ​ ​ https://news.vice.com/article/what­default­phone­encryption­really­means­for­law­enforcement. ​

Apple’s iPhone Encryption Is a Godsend, Even if Cops Hate It Kevin Poulson, Wired, October 8, 2014 ​ ​ http://www.wired.com/2014/10/golden­key/ iPhone Encryption and the Return of the Crypto Wars Bruce Schneier, Schneier on Security, October 6, 2014 ​ ​ https://www.schneier.com/blog/archives/2014/10/iphone_encrypti_1.html

Experts Laud Changes to iPhone, Android Encryption Daniel Fisher, Threatpost, October 6, 2014 ​ ​ http://threatpost.com/experts­laud­changes­to­iphone­android­encryption/108708

America’s huge iPhone lie: Why Apples is being accused of coddling child molesters Marcy Wheeler, Salon, October 6, 2014 ​ ​ http://www.salon.com/2014/10/06/americas_huge_iphone_lie_why_law_enforcement_really_hates_its_new_ policy/

Stop the Hysteria Over Apple Encryption Bruce Schneier, CNN, October 4, 2014 ​ ​ http://www.cnn.com/2014/10/03/opinion/schneier­apple­encryption­hysteria/index.html

Apple and Google are Helping to Protect our Privacy Nuala O’Connor, The Washington Post, October 2, 2014 ​ ​ http://www.washingtonpost.com/opinions/apple­and­google­are­helping­to­protect­our­privacy/2014/10/02/ea 35524a­4824­11e4­a4bf­794ab74e90f0_story.html

Law Enforcement Has Declared War on Encryption It Can’t Break 14 Dan Gillmor, Slate, October 1, 2014 ​ ​ http://www.slate.com/blogs/future_tense/2014/10/01/law_enforcement_has_declared_war_on_encryption_it _can_t_break.html

Room for Debate: “Apple vs. The Law” Multiple authors, The New York Times, September 30, 2014 ​ ​ http://www.nytimes.com/roomfordebate/2014/09/30/apple­vs­the­law

Smartphone Encryption Restores Public Trust in Technology Seeta Pena Gangadharan, New America’s Open Technology Institute, September 30, 2014 ​ ​ http://www.nytimes.com/roomfordebate/2014/09/30/apple­vs­the­law/smartphone­encryption­restores­public­ trust­in­technology

Securing Our Data Should Come First Alex Abdo, ACLU, September 30, 2014 ​ ​ http://www.nytimes.com/roomfordebate/2014/09/30/apple­vs­the­law/securing­our­data­should­come­first

Holding On to a Small Measure of Privacy Faiza Patel, Brennan Center, September 30, 2014 ​ ​ http://www.nytimes.com/roomfordebate/2014/09/30/apple­vs­the­law/holding­on­to­a­small­measure­of­priva cy

China OKs iPhone 6 sale after Apple addresses security concerns Paul Carsten, Reuters, September 30, 2014 ​ ​ ​ http://www.reuters.com/article/2014/09/30/us­apple­china­idUSKCN0HP04820140930 (highlights how this is also a trade/economic issue)

The Government Says iPhone Encryption Helps Criminals. They’re Wrong. Timothy B. Lee, Vox, September 29, 2014 ​ ​ http://www.vox.com/2014/9/29/6854679/iphone­encryption­james­comey­government­backdoor

Nine Epic Failures of Regulating Cryptography Cindy Cohn, Electronic Frontier Foundation, September 26, 2014 ​ ​ https://www.eff.org/deeplinks/2014/09/nine­epic­failures­regulating­cryptography

FBI Director Angry At Homebuilders For Putting Up Walls That Hide Any Crimes Therein Mike Masnick, TechDirt, September 26, 2014 ​ ​ https://www.techdirt.com/articles/20140925/17303928647/fbi­director­angry­homebuilders­putting­up­walls­t hat­hide­any­crimes­therein.shtml

Apple’s ‘Warrant­Proof’ Encryption Steve Bellovin, SMBlog, September 23, 2014 ​ ​ https://www.cs.columbia.edu/~smb/blog/control/

Old Technopanic in New iBottles Julian Sanchez, Cato Institute, September 23, 2014 ​ ​ http://www.cato.org/blog/old­technopanic­new­ibottles

15

Anti­crypto (or pro­backdoor) analyses & op­eds, or news articles with strong negative angle

Theresa May: we must deny terrorists safe spaces to communicate Patrick Wintour, The Guardian, January 14, 2015 ​ ​ http://www.theguardian.com/politics/2015/jan/14/theresa­may­no­safe­spaces­terrorists­communicate

Tech companies are making it harder for the nation's law enforcement Ellen Glasser, Baltimore Sun, November 6, 2014 ​ ​ http://www.baltimoresun.com/news/opinion/oped/bs­ed­fbi­apple­20141106­story.html

The web is a terrorist’s command­and­control network of choice Robert Hannigan, Financial Times, November 3, 2014 ​ ​ http://www.ft.com/cms/s/2/c89b6c58­6342­11e4­8a63­00144feabdc0.html#axzz3I00vaptF

Apple, Boyd, and Going Dark ​ ​ Andrew Weissman, Just Security, October 20, 2014 http://justsecurity.org/16592/apple­boyd­dark/

Silicon Valley Enables Terrorists and Criminals Jennifer Rubin, Washington Post, October 19, 2014 ​ ​ http://www.washingtonpost.com/blogs/right­turn/wp/2014/10/19/silicon­valley­enables­terrorists­and­criminal s/

Compromise Needed on Smartphone Encryption Editorial Board, The Washington Post, October 3, 2014 ​ ​ http://www.washingtonpost.com/opinions/compromise­needed­on­smartphone­encryption/2014/10/03/96680 bf8­4a77­11e4­891d­713f052086a0_story.html

U.S. Law Enforcement Seeks to Halt Apple­Google Encryption of Mobile Data Del Quentin Wilber, September 30, 2014 (Not an op­ed but incredibly slanted, all pro­law enforcement, anti­encryption quotes) http://www.bloomberg.com/news/2014­09­30/u­s­seeks­to­reverse­apple­android­data­locking­decision.html

Room for Debate: “Apple vs. The Law” Multiple authors, The New York Times, September 30, 2014 ​ ​ http://www.nytimes.com/roomfordebate/2014/09/30/apple­vs­the­law

Don’t Create Virtual Sanctuaries for Criminals Ronald T. Hosko, Law Enforcement Legal Defense Fund, September 30, 2014 ​ ​ http://www.nytimes.com/roomfordebate/2014/09/30/apple­vs­the­law/dont­create­virtual­sanctuaries­for­crimi nals

Data Access Shouldn’t Be Up to Companies Alone Stewart Baker, Steptoe, September 30, 2014 ​ ​ 16 http://www.nytimes.com/roomfordebate/2014/09/30/apple­vs­the­law/data­access­shouldnt­be­up­to­compan ies­alone

Apple and Google threaten public safety with default smartphone encryption Cyrus Vance (Manhattan DA), The Washington Post, September 26, 2014 ​ ​ http://www.washingtonpost.com/opinions/apple­and­google­threaten­public­safety­with­default­smartphone­ encryption/2014/09/25/43af9bf0­44ab­11e4­b437­1a7368204804_story.html

Apple and Google’s New Encryption Rules Will Make Law Enforcement’s Job Much Harder Ronald Hosko (Law Enforcement Legal Defense Fund), The Washington Post, September 23, 2014 ​ ​ http://www.washingtonpost.com/posteverything/wp/2014/09/23/i­helped­save­a­kidnapped­man­from­murder ­with­apples­new­encryption­rules­we­never­wouldve­found­him/

Apple’s Dangerous Game, part 3: Where Do You Draw the Line, and What’s the Privacy Tradeoff? Orin Kerr, The Washington Post, September 22, 2014 ​ ​ http://www.washingtonpost.com/news/volokh­conspiracy/wp/2014/09/22/apples­dangerous­game­part­3­wh ere­do­you­draw­the­line­and­whats­the­privacy­tradeoff/

Apple’s Dangerous Game, Part 2: The Strongest Counterargument Orin Kerr, The Washington Post, September 22, 2014 ​ ​ http://www.washingtonpost.com/news/volokh­conspiracy/wp/2014/09/22/apples­dangerous­game­part­2­the­ strongest­counterargument/

Apple’s Dangerous Game Orin Kerr, The Washington Post, September 19, 2014 ​ ​ http://www.washingtonpost.com/news/volokh­conspiracy/wp/2014/09/19/apples­dangerous­game/

17