CRYPTO DEBATE BIBLIOGRAPHY in reverse chronological order
Major Announcements, Statements, General News Coverage
Microsoft will encrypt Bing search traffic by default James Vincent, The Verge, June 16, 2015 http://www.theverge.com/2015/6/16/8788373/encryptedsearchmicrosoftbing
Wikipedia Is Now Using HTTPS By Default To Prevent Snooping And Censorship Kate Vinton, Forbes, June 12, 2015 http://www.forbes.com/sites/katevinton/2015/06/12/wikipediaisnowusinghttpsbydefaulttopreventsnoop ingandcensorship/
If the FBI has a backdoor to Facebook or Apple encryption, we are less safe Trevor Timm, The Guardian, June 9, 2015 http://www.theguardian.com/commentisfree/2015/jun/09/fbifacebookbackdoorappleencryptionlesssafep rivacy
With Islamic State using instant messaging apps, FBI seeks access to data Brian Bennett, The LA Times, June 8, 2015 http://www.latimes.com/world/middleeast/lafgterrormessaging20150608story.html#page=1
Congress on verge of major cuts to key cryptography agency Drew Mitnick, Access, June 5, 2015 https://www.accessnow.org/blog/2015/06/05/congressonvergeofmajorcutstokeycryptographyagency
FBI antiterror official calls on tech firms to 'prevent encryption above all else' Alex Hern, The Guardian, June 5, 2015 http://www.theguardian.com/technology/2015/jun/05/fbiantiterrortechfirmsencryption?CMP=twt_gu
Microsoft Gives Details About Its Controversial Disk Encryption Micah Lee, The Intercept, June 4, 2015 https://firstlook.org/theintercept/2015/06/04/microsoftdiskencryption/
Facebook introduces PGP encryption for sensitive emails Alex Hern, The Guardian, June 1, 2015 http://www.theguardian.com/technology/2015/jun/01/facebookintroducespgpencryptionforsensitiveemail s
Lawmakers urge FBI to stand down on decryption push Ellen Nakashima, The Washington Post, June 1, 2015 http://www.washingtonpost.com/blogs/postpolitics/wp/2015/06/01/lawmakersurgefbitostanddownondec ryptionpush/
The man behind Yahoo’s plan to become the most ‘trustworthy’ tech company Andrea Peterson, The Washington Post, May 29, 2015 1 http://www.washingtonpost.com/blogs/theswitch/wp/2015/05/29/themanbehindyahoosplantobecometh emosttrustworthytechcompany/
U.N. Special Rapporteur: Governments Must Not “Backdoor” Encryption For Spying Ryan Gallagher, The Intercept, May 28, 2015 https://firstlook.org/theintercept/2015/05/28/unitednationsencryptionanonymitysurveillance/
Today’s Internet users are still being hurt by ’90sera U.S. encryption policies Andrea Peterson, The Washington Post, May 28, 2015 http://www.washingtonpost.com/blogs/theswitch/wp/2015/05/28/todaysinternetusersarestillbeinghurtby 90serausencryptionpolicies/
U.N. report: Encryption is important to human rights — and backdoors undermine it Andrea Peterson, The Washington Post, May 28, 2015 http://www.washingtonpost.com/blogs/theswitch/wp/2015/05/28/unreportencryptionisimportanttohuman rightsandbackdoorsundermineit/
NSA chief: Encryption isn't bad, it's the future Steve Ranger, ZDNet, May 28, 2015 http://www.zdnet.com/article/nsachiefencryptionisntbaditsthefuture/
Loretta Lynch Joins Obama Administration Fearmongering Over Encryption Sam Sacks, The Intercept, May 27, 2015 https://firstlook.org/theintercept/2015/05/27/lorettalynchjoinsobamaadministrationfearmongeringencrypti on/
Microsoft’s Top Lawyer Says Company Must Weigh Encryption Limits Danny Yadron, The Wall Street Journal, May 27, 2015 http://blogs.wsj.com/digits/2015/05/27/bradsmithsuggestsmicrosoftmightobeylawthatlimitsencryption/
Encryption innovator leaves US over surveillance Elise Viebeck, The Hill, May 26, 2015 http://thehill.com/policy/cybersecurity/243101encryptioninnovatorleavesusoversurveillance
Is This the NSA’s Secret to Cracking Secure Comms? Nicholas Weaver, The Daily Beast, May 21, 2015 http://www.thedailybeast.com/articles/2015/05/21/isthisthensassecrettocrackingsecurecomms.html
Encryption, But With Backdoors? The FBI Has Business Running In Circles Tim Sparapani, Forbes, May 21, 2015 http://www.forbes.com/sites/timsparapani/2015/05/21/encryptionbutwithbackdoorsthefbihasbusinessru nningincircles/
Anatomy of a LOGJAM another TLS vulnerability, and what to do about it Paul Ducklin, Naked Security, May 21, 2015 https://nakedsecurity.sophos.com/2015/05/21/anatomyofalogjamanothertlsvulnerabilityandwhattodo aboutit/
2 Transcript: Comey Says Authors of Encryption Letter Are Uninformed or Not FairMinded Megan Graham, Just Security, May 20, 2015 http://justsecurity.org/23120/transcriptcomeyauthorsencryptionletteruniformedfairminded/
FBI head found Silicon Valley encryption letter 'depressing' Corey Bennett, The Hill, May 20, 2015 http://thehill.com/policy/cybersecurity/242666fbiheadfoundsiliconvalleyencryptionletterdepressing
HTTPScrippling attack threatens tens of thousands of Web and mail servers Dan Goodin, ArsTechnica, May 20, 2015 http://arstechnica.com/security/2015/05/httpscripplingattackthreatenstensofthousandsofwebandmail servers/
What You Need to Know About the New LogJam Bug Jennifer ValentinoDevries, The Wall Street Journal, May 20, 2015 http://blogs.wsj.com/digits/2015/05/20/whatyouneedtoknowaboutthenewlogjambug/
Tech Giants Urge Obama to Reject Policies That Weaken Encryption Nicole Perlroth, The New York Times, May 19, 2015 http://www.nytimes.com/2015/05/20/technology/techgiantsurgeobamatorejectpoliciesthatweakenencr yptiontechnology.html?ref=technology&_r=0
Tech giants don’t want Obama to give police access to encrypted phone data Ellen Nakashima, The Washington Post, May 19, 2015 http://www.washingtonpost.com/world/nationalsecurity/asencryptionspreadsusworriesaboutaccesstod ataforinvestigations/2015/04/10/7c1c7518d40111e4a62fee745911a4ff_story.html
Apple and Google sign letter urging Obama to support encryption Alex Hern, The Guardian, May 19, 2015 http://www.theguardian.com/technology/2015/may/19/applegoogleletterpresidentobamaencryptionfbisu rveillance
Pretty Much Anyone With Any Understanding Of Crypto Tells President Obama That Backdooring Crypto Is Monumentally Stupid Mike Masnick, Tech Dirt, May 19, 2015 https://www.techdirt.com/articles/20150518/21180031044/prettymuchanyonewithanyunderstandingcrypt otellspresidentobamathatbackdooringcryptoismonumentallystupid.shtml
“We Support Strong Encryption” Jonathan Mayer, Web Policy, May 12, 2015 http://webpolicy.org/2015/05/12/wesupportstrongencryption/
Bill would prohibit governmentordered tech ‘back doors’ Elise Viebeck, The Hill, May 5, 2015 http://thehill.com/policy/cybersecurity/241130billwouldprohibitgovernmentorderedtechbackdoors
Internet godfather warns about plans for technology ‘back doors’
3 Julian Hattem, The Hill, May 4, 2015 http://thehill.com/policy/technology/240965internetgodfatherwarnsaboutplansfortechnologybackdoors
Increased encryption a doubleedged sword Maria Korolov, CSO Online, May 4, 2015 http://www.csoonline.com/article/2917210/networksecurity/increasedencryptionadoubleedgedsword.htm
The FBI wants us to have computer security so strong that only they can break in… John Naughton, The Guardian, May 3, 2015 http://www.theguardian.com/commentisfree/2015/may/03/fbicomputersecuritystrongbreakin
Encryption won't work if it has a back door only the 'good guys' have keys to Cory Doctorow, The Guardian, May 1, 2015 http://www.theguardian.com/technology/2015/may/01/encryptionwontworkifithasabackdooronlythego odguyshavekeysto
Mozilla goes all out for Web encryption Elise Viebeck, The Hill, May 1, 2015 http://thehill.com/policy/cybersecurity/240777mozillagoesalloutforwebencryption
Irate Congressman gives cops easy rule: “just follow the damn Constitution” Cyrus Farivar, Ars Technica, April 30, 2015 http://arstechnica.com/techpolicy/2015/04/iratecongressmangivescopseasyrulejustfollowthedamnco nstitution/
InfoSec pros reject DHS criticisms of encryption Maria Korolov, CSO Online, April 30, 2015 http://www.csoonline.com/article/2916820/dataprotection/infosecprosrejectdhscriticismsofencryption.ht ml
Feds are using fear, not facts, in antiencryption crusade Joshua Kopstein, Al Jazeera America, April 30, 2015 http://america.aljazeera.com/opinions/2015/4/fedsareusingfearnotfactsinantiencryptioncrusade.html
Congressman with computer science degree: Encryption backdoors are ‘technologically stupid’ Andrea Peterson, The Washington Post, April 30, 2915 http://www.washingtonpost.com/blogs/theswitch/wp/2015/04/30/congressmanwithcomputersciencedegre eencryptionbackdoorsaretechnologicallystupid/
Lawmakers Challenge FBI On Surveillance Backdoors, Encryption Hamza Shaban, Buzzfeed News, April 30, 2015 http://www.buzzfeed.com/hamzashaban/lawmakerschallengefbionsurveillancebackdoorsencryption#.qe 1aQ1xv6M
Both sides of data encryption debate face off in Congress Joe Uchill, The Christian Science Monitor, April 30, 2015 http://www.csmonitor.com/World/Passcode/2015/0430/BothsidesofdataencryptiondebatefaceoffinCon gress 4
Lawmakers skeptical of FBI's encryption warnings Cory Bennet, The Hill, April 29, 2015 http://thehill.com/policy/cybersecurity/240553lawmakersskepticaloffbisencryptionbreakingrequest
Representatives question FBI and point out fallacies during default encryption hearing Ashley Carman, SC Magazine, April 29, 2015 http://www.scmagazine.com/committeeonoversightgovernmentreformhostsencryptionhearing/article/41 1928/
American Civil Liberties Union Letter: Hearing on “Encryption Technology and Potential U.S. Policy Responses.” ACLU, April 29, 2015 https://www.aclu.org/sites/default/files/field_document/encryption_letter_for_hearing_430_final.pdf
Google and Facebook Execs Question Government Desire for Encryption Backdoors Tom Simonite, MIT Technology Review, April 23, 2015 http://www.technologyreview.com/news/536986/googleandfacebookexecsquestiongovernmentdesirefor encryptionbackdoors/
White House seeks Silicon Valley help on strong yet breakable encryption Joseph Menn, Reuters, April 23, 2015 http://mobile.reuters.com/article/idUSKBN0NC2LT20150421?irpc=932
The FBI Keeps Demanding Impossible Solutions to Its Encryption Problem Jason Koebler, Motherboard, April 21, 2015 http://motherboard.vice.com/read/thefbikeepsdemandingimpossiblesolutionstoitsencryptionproblem?tr k_source=recommended
Some tech firms being 'friendly to terrorists' says UK police chief Michael Holden, Reuters, April 21, 2015 http://uk.reuters.com/article/2015/04/21/ukbritainsecuritytechidUKKBN0NC1HX20150421
The FBI’s Stance on Encrypted Communications FBI Executive Assistant Director Amy Hess, The Wall Street Journal, April 21, 2015 http://blogs.wsj.com/experts/2015/04/20/thefbisstanceonencryptedcommunications/
The NSA’s SplitKey Encryption Proposal is Not Serious Joseph Lorenzo Hall, Center for Democracy and Technology, April 20, 2015 https://cdt.org/blog/thensassplitkeyencryptionproposalisnotserious/
Should Law Enforcement Have the Ability to Access Encrypted Communications? Carrie Cordero and Marc Zwillinger, The Wall Street Journal, April 19, 2015 http://www.wsj.com/article_email/shouldlawenforcementhavetheabilitytoaccessencryptedcommunicati ons1429499474lMyQjAxMTE1NjI5MDMyMzA2Wj
Manhattan DA: Terrorists love using Apple and Google phones Mark Hensch, The Hill, April 19, 2015 5 http://thehill.com/policy/technology/239349newyorkdaterroristsloveusingapplegooglephones
Google Says “Vast Majority” Of Ads On Its Platforms Will Be Encrypted By June 30 Anthony Ha, Tech Crunch, April 17, 2015 http://techcrunch.com/2015/04/17/googleadshttps/
Senator Wyden: Congress may block government access to encrypted consumer devices (+video) Sara Sorcher, The Christian Science Monitor, April 17, 2015 http://www.csmonitor.com/World/Passcode/2015/0417/SenatorWydenCongressmayblockgovernmentac cesstoencryptedconsumerdevicesvideo
On the Clipper Chip's Birthday, Looking Back on Decades of Key Escrow Failures Parker Higgins, Electronic Frontier Foundation, April 16, 2015 https://www.eff.org/deeplinks/2015/04/clipperchipsbirthdaylookingback22yearskeyescrowfailures
Netflix will start encrypting its streams to block prying eyes and internet providers Zachary M. Seward, Quartz, April 16, 2015 http://qz.com/384184/netflixwillstartencryptingitsstreamstoblockpryingeyesandinternetproviders/
ACLU: Watchdogs must protect whistleblowers with encryption Elise Viebeck, The Hill, April 16, 2015 http://thehill.com/policy/cybersecurity/239092acluwatchdogsmustprotectwhistleblowerswithencryption
Why confidential tips to the government may not be confidential after all Craig Timberg and Lisa Rein, The Washington Post, April 16, 2015 http://www.washingtonpost.com/blogs/theswitch/wp/2015/04/16/whyconfidentialtipstothegovernmentma ynotbeconfidentialafterall/
How do we build encryption backdoors? Matthew Green, Matthew Green’s Blog, April 16, 2015 http://blog.cryptographyengineering.com/2015/04/howdowebuildencryptionbackdors.html
EFF at 25: Remembering the Case that Established Code as Speech Alison DameBoyle, Electronic Frontier Foundation, April 16, 2015 https://www.eff.org/deeplinks/2015/04/rememberingcaseestablishedcodespeech
White House seeks to break encryption stalemate Elise Viebeck, The Hill, April 13, 2015 http://thehill.com/policy/cybersecurity/238602whitehouseseekstobreakencryptionstalemate
NSA dreams of smartphones with “split” crypto keys protecting user data Dan Goodin, Arstechnica, April 12, 2015 http://arstechnica.com/techpolicy/2015/04/nsadreamsofsmartphoneswithsplitcryptokeysprotectinguse rdata/
As encryption spreads, U.S. grapples with clash between privacy, security Ellen Nakashima and Barton Gellman, The Washington Post, April 10, 2015
6 http://www.washingtonpost.com/world/nationalsecurity/asencryptionspreadsusworriesaboutaccesstod ataforinvestigations/2015/04/10/7c1c7518d40111e4a62fee745911a4ff_story.html?postshare=53142869 9926574
China Is Said to Use Powerful New Weapon to Censor Internet Nicole Perlroth, The New York Times, April 10, 2015 http://www.nytimes.com/2015/04/11/technology/chinaissaidtousepowerfulnewweapontocensorinterne t.html?hpw&rref=technology&action=click&pgtype=Homepage&module=wellregion®ion=bottomwell&W T.nav=bottomwell&_r=3
TrueCrypt audit shows no evidence of NSA backdoors Zack Wittker, ZDNet, April 2, 2015 http://www.zdnet.com/article/truecryptlikelydidntquitonnsabackdoorfears/
New Firefox version says “might as well” to encrypting all Web traffic Dan Goodin, Ars Technica, April 1, 2015 http://arstechnica.com/security/2015/04/newfirefoxversionsaysmightaswelltoencryptingallwebtraffic/
Europe’s law enforcement chief joins in crypto panic Glyn Moody, Ars Technica, March 30, 2015 http://arstechnica.com/techpolicy/2015/03/europeslawenforcementchiefjoinsincryptopanic/
Silicon Valley spars with Obama over 'backdoor' surveillance Cory Bennet, The Hill, March 22, 2015 http://thehill.com/policy/cybersecurity/236512siliconvalleysparswithobamaoverbackdoorsurveillance
Google's Schmidt predicts 'win' on encryption debate Mario Trujillo, The Hill, March 18, 2015 http://thehill.com/policy/technology/236141googlesschmidtpredictswinonencryptiondebate
Yahoo Is Jostling to Be Known as the Most Secure Email Provider Lily Hay Newman, Slate, March 16, 2015 http://www.slate.com/blogs/future_tense/2015/03/16/yahoo_it_lead_alex_stamos_says_end_to_end_plugin_ and_disposable_passwords.html iSpy: The CIA Campaign to Steal Apple’s Secrets Jeremy Scahill and Josh Begley, The Intercept, March 10, 2015 https://firstlook.org/theintercept/2015/03/10/ispyciacampaignstealapplessecrets/
Encryption Backdoors Will Always Turn Around And Bite You In The Ass Mike Masnick, Tech Dirt, March 4, 2015 https://www.techdirt.com/articles/20150304/06534030206/encryptionbackdoorswillalwaysturnaroundbite youass.shtml
FREAK Flaw in Android and Apple Devices Cripples HTTPS Crypto Protection Dan Goodin, ArsTechnica, March 3, 2015 http://arstechnica.com/security/2015/03/freakflawinandroidandappledevicescrippleshttpscryptoprotec tion/ 7
The Human Rights Benefits of Encryption Andi Wilson and Danielle Kehl, New America’s Open Technology Institute, March 2, 2015 http://www.newamerica.org/oti/thehumanrightsbenefitsofencryption/
Exclusive: Obama Sharply Criticizes China's Plans for New Technology Rules Jeff Mason, Reuters, March 2, 2015 http://www.reuters.com/article/2015/03/02/ususaobamachinaidUSKBN0LY2H520150302?feedType=RSS &feedName=technologyNews
The United States Is Angry That China Wants Crypto Backdoors, Too Lorenzo FranceschiBiccierai, Motherboard, February 27, 2015 http://motherboard.vice.com/read/theunitedstatesisangrythatchinawantscryptobackdoorstoo
The Man Who Crafted the Patriot Act Now Supports Your Right to Encrypt Data Jason Koebler, Motherboard, February 27, 2015 http://motherboard.vice.com/read/themanwhocraftedthepatriotactnowsupportsyourrighttoencryptda ta
West Coast vs. East Coast: The Crypto Cold War Between the Feds and the Tech Industry Just Got Hot Kevin Bankston, Slate, February 25th, 2015 http://www.slate.com/articles/technology/future_tense/2015/02/yahoo_s_alex_stamos_and_nsa_s_mike_rog ers_fight_about_encryption.html?wpsrc=sh_all_dt_tw_top
Clinton is Looking for a Middle Ground on Encryption that Experts Say Doesn’t Exist Andrea Peterson, The Washington Post, February 25, 2015 http://www.washingtonpost.com/blogs/theswitch/wp/2015/02/25/clintonislookingforamiddlegroundone ncryptionthatexpertssaydoesntexist/
What NSA Director Mike Rogers Doesn’t Get About Encryption Julian Sanchez, Cato Institute, February 24, 2015 http://www.cato.org/blog/whatnsadirectormikerogersdoesntgetaboutencryption
The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle Jeremy Scahill and Josh Begley, The Intercept, February 19, 2015 https://firstlook.org/theintercept/2015/02/19/greatsimheist/
Security Services Capable of Bypassing Encryption, Draft Code Reveals Alan Travis, The Guardian, February 6, 2015 http://www.theguardian.com/uknews/2015/feb/06/uksecurityservicescapablebypassingencryptiondraftc ode
An Open Letter to Prime Minister Cameron Jonathan Zittrain, Medium, February 6, 2015 https://medium.com/message/dearprimeministercameron20thcenturysolutionswonthelp21stcenturys urveillanceff2d7a3d300c
8
Tyrants will find the key to the internet’s back door Jonathan Zittrain, The Financial Times, February 2, 2015 http://www.ft.com/intl/cms/s/0/e99017f2a57211e4ad3500144feab7de.html#axzz3RMI0y8Pb
Harvard vs Cameron: Professors defend encryption John Gapper, The Financial Times, January 22, 2015 http://blogs.ft.com/theworld/2015/01/harvardvscameronprofessorsdefendencryption/
EU Could Demand That Web Firms Decrypt Emails: Adviser Reuters, The New York Times, January 21, 2015 http://www.nytimes.com/reuters/2015/01/21/technology/21reuterseusecurityencryption.html
Wrong Responses to Charlie Hebdo The Editorial Board, The New York Times, January 15, 2015 http://www.nytimes.com/2015/01/16/opinion/afterparisattackswrongresponsestocharliehebdo.html
Obama, Cameron to discuss encryption of online services Greg Jaffe and Katie Zezima, The Washington Post, January 15, 2015 http://www.washingtonpost.com/politics/obamacamerontodiscussencryptionofonlineservices/2015/01/1 5/e215effe9ceb11e496cce858eba91ced_story.html
Secret US Cybersecurity Report: Encryption Vital to Protect Private Data James Ball, The Guardian, January 15, 2015 http://www.theguardian.com/usnews/2015/jan/15/spsecretuscybersecurityreportencryptionprotectdata cameronparisattacks
Wrong Responses to Charlie Hebdo The Editorial Board, The New York Times, January 15, 2015 http://www.nytimes.com/2015/01/16/opinion/afterparisattackswrongresponsestocharliehebdo.html
Banning All Encryption Won't Make Us Safer, No Matter What David Cameron Says Trevor Timm, The Guardian, January 13, 2015 http://www.theguardian.com/commentisfree/2015/jan/13/banningencryptiondavidcameronnotsafer
For Political Leaders, More Surveillance is Always the Answer Dan Gilmor, Slate, January 13, 2015 http://www.slate.com/blogs/future_tense/2015/01/13/charlie_hebdo_david_cameron_encryption_politicians_ always_think_surveillance.html
What David Cameron just proposed would endanger every Briton and destroy the IT industry Cory Doctorow, Boing Boing, January 13, 2015 http://boingboing.net/2015/01/13/whatdavidcameronjustpropos.html
Can the Government Ban Encryption? Jane Wakefield, BBC News, January 13, 2015 http://www.bbc.com/news/technology30794953
9 Banning All Encryption Won't Make Us Safer, No Matter What David Cameron Says Trevor Timm, The Guardian, January 13, 2015 http://www.theguardian.com/commentisfree/2015/jan/13/banningencryptiondavidcameronnotsafer
Prying Eyes: Inside the NSA's War on Internet Security (what encryption they still can’t crack) SPIEGEL Staff, Der Spiegel, December 28, 2014 http://www.spiegel.de/international/germany/insidethensaswaroninternetsecuritya1010361.html
The Wrong Way to Respond to the Snowden Revelations Danielle Kehl and Robert Morgus, Slate, December 19, 2014 http://www.slate.com/articles/technology/future_tense/2014/12/technological_sovereignty_encrypting_not_fr agmenting_the_internet_is_the.html
Chrome Security Team Considers Marking All HTTP Pages As 'NonSecure' Mike Masnick, Tech Dirt, December 15, 2014 https://www.techdirt.com/articles/20141213/07112629425/chromesecurityteamconsidersmarkingallhttp pagesasnonsecure.shtml
With hackers running rampant, why would we poke holes in data security? Ron Wyden, LA Times, December 14, 2014 http://www.latimes.com/opinion/oped/laoe1215wydenbackdoorforcellphones20141215story.html
We Actually Lost the Crypto Wars Christopher Kuner, Media Policy Project, November 12, 2014 http://blogs.lse.ac.uk/mediapolicyproject/2014/11/12/weactuallylostthecryptowars/
James Comey, F.B.I. Director, Hints at Action as Cellphone Data is Locked David Sanger and Matt Apuzzo, The New York Times, October 16, 2014 http://www.nytimes.com/2014/10/17/us/politics/fbidirectorinpolicyspeechcallsdarkdeviceshindranceto crimesolving.html?_r=0
Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course? Remarks of FBI Director James Comey at the Brookings Institution, October 16, 2014 http://www.fbi.gov/news/speeches/goingdarkaretechnologyprivacyandpublicsafetyonacollisioncours e
FBI Director on Privacy, Electronic Surveillance 60 Minutes, October 12, 2014 http://www.cbsnews.com/news/fbidirectorjamescomeyonprivacyandsurveillance/
Smartphone “Backdoors” and Open Computing Julian Sanchez, Just Security, October 6, 2014 http://justsecurity.org/15903/smartphonebackdoorsopencomputing/
Holder Urges Tech Companies to Leave Device Backdoors Open for Police Craig Timberg, The Washington Post, September 30, 2014
10 http://www.washingtonpost.com/blogs/theswitch/wp/2014/09/30/holderurgestechcompaniestoleavedevi cebackdoorsopenforpolice/
FBI Blasts Apple, Google for Locking Police Out of Phones Craig Timberg & Greg Miller, The Washington Post, September 25, 2014 http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e434411e49a15137aa015352 7_story.html
Newest Androids Will Join iPhones in Offering Default Encryption, Blocking Police Craig Timberg, The Washington Post, September 18, 2014 http://www.washingtonpost.com/blogs/theswitch/wp/2014/09/18/newestandroidswilljoiniphonesinofferin gdefaultencryptionblockingpolice/
Apple Will No Longer Unlock Most iPhones, iPads for Police, Even With a Search Warrant Craig Timberg, The Washington Post, September 18, 2014 http://www.washingtonpost.com/business/technology/2014/09/17/2612af583ed211e4b03fde718edeb92f_ story.html
Original Apple Announcement, “A message from Tim Cook about Apple’s commitment to your privacy.” September 17, 2014 https://www.apple.com/privacy/
Procrypto analyses & opeds, or news articles with strong positive angle
Debating the FBI on Smartphone Encryption Peter Swire, Future of Privacy Forum, November 10, 2014 http://www.futureofprivacy.org/2014/11/10/debatingthefbionphoneencryption/
Issue Brief: A “Backdoor” to Encryption for Government Surveillance Center for Democracy & Technology, November 10, 2014 https://cdt.org/insight/issuebriefabackdoortoencryptionforgovernmentsurveillance/
The Law Needs To Keep Up With Technology But Not At The Expense of Civil Liberties Cameron Kerry, Forbes, November 6, 2014 http://www.forbes.com/sites/realspin/2014/11/06/thelawneedstokeepupwithtechnologybutnotattheex penseofcivilliberties/
James Comey Again Demands Tech Companies Do As He Says And Grant The FBI Complete Access To Whatever It Wants Tim Cushing, TechDirt, November 6, 2014 https://www.techdirt.com/articles/20141105/10194529056/jamescomeyagaindemandstechcompaniesdo ashesaysgrantfbicompleteaccesstowhateveritwants.shtml
11 FBI Holds Secret Meeting To Scare Congress Into Backdooring Phone Encryption Mike Masnick, TechDirt, October 31, 2014 https://www.techdirt.com/articles/20141030/16013228988/fbiholdssecretmeetingtoscarecongressintob ackdooringphoneencryption.shtml
The 90s and Now: FBI and its Inability to Cope with Encryption Amul Kalia, Electronic Frontier Foundation, October 29, 2014 https://www.eff.org/deeplinks/2014/10/90sandnowfbianditsinabilitycopeencryption
Apple and Google Are Right. The FBI Is Wrong. CHiPs Nude Photo Scandal Shows Why. Chris Weigant, The Huffington Post, October 27, 2014 http://www.huffingtonpost.com/chrisweigant/appleandgooglearerigh_b_6057928.html
Lollipop or lockdown? Wha a secure mobile OS means for BYOD Brian Robinson, GCN, October 24, 2014 http://gcn.com/blogs/cybereye/2014/10/androidlollipopbyod.aspx
FBI Director Says Congress Will Fix Phone Encryption ‘Problem;’ Congress Says ‘Bite Us’ Tim Cushing, TechDirt, October 23, 2014 https://www.techdirt.com/articles/20141022/12062628910/fbidirectorsayscongresswillfixphoneencryptio nproblemcongresssaysbiteus.shtml
In Defense of Smart Phone Security by Default Annie Antón, The Privacy Place, October 19, 2014 http://theprivacyplace.org/2014/10/indefenseofsmartphonesecuritybydefault
Everybody Knows FBI Director James Comey Is Wrong About Encryption, Even The FBI Mike Masnick, TechDirt, October 20, 2014 https://www.techdirt.com/articles/20141019/07115528878/everybodyknowsfbidirectorjamescomeyiswro ngaboutencryptionevenfbi.shtml
FBI’s Comey Calls for Making Impenetrable Devices Unlawful Lauren Walker, Newsweek, October 18, 2014 http://www.newsweek.com/goingnotsobrightfbidirectorjamescomeycallsmakingimpenetrabledevices 278190
EFF Response to FBI Director Comey’s Speech on Encryption Cindy Cohn, Electronic Frontier Foundation, October 17, 2014 https://www.eff.org/deeplinks/2014/10/effresponsefbidirectorcomeysspeechencryption
Do FBI’s Examples Support Encryption Worries? (Answer: no.) Jack Gillum and Eric Tucker, Associated Press, October 17, 2014 http://bigstory.ap.org/article/e03177df2c9a4e0ebe5b584c909218bf/docasesfbicitessupportencryptionwo rries
The FBI Director’s Evidence Against Encryption is Pathetic Dan Froomkin and Nathas VargasCooper, The Intercept, October 17, 2014 https://firstlook.org/theintercept/2014/10/17/drafttwocasescitedfbidudedumbdumb/ 12
Privacy Advocates Don't Buy FBI's Warning About Encryption Practices Carrie Johnson, National Public Radio, October 17, 2014 http://www.npr.org/2014/10/17/356869566/privacyadvocatesdontbuyfbiswarningaboutencryptionpract ices
FBI Director Comey calls on Congress to stop unlockable encryption. Good luck with that. Nancy Scola, The Washington Post, October 17, 2014 http://www.washingtonpost.com/blogs/theswitch/wp/2014/10/17/fbidirectorcomeycallsoncongresstosto punlockableencryptiongoodluckwiththat/ (Notes Congressional wariness on issue, procrypto voices extensively quoted)
Encryption Whiplash Tim Sparapani, Application Developers Alliance, October 17, 2014 http://www.appdevelopersalliance.org/news/encryptionwhiplash
Tales from Decrypt: FBI Wants Backdoors and Ability to Compel Access Jake Laperruque, Center for Democracy & Technology, October 17, 2014 https://cdt.org/blog/talesfromdecryptfbiwantsbackdoorsandabilitytocompelaccess/
The FBI Is Dead Wrong: Apple’s Encryption Is Clearly in the Public Interest Ken Gude, Wired, October 17, 2014 Wired oped http://www.wired.com/2014/10/fbiiswrongappleencryptionisgood/
NSA Surveillance Costs and the Crypto Debate: Tech Companies Compete on Privacy PostSnowden Danielle Kehl and Kevin Bankston, New America’s Open Technology Institute, October 17, 2014 http://newamerica.org/oti/nsasurveillancecostsandthecryptodebate/
The government wants tech companies to give them a backdoor to your electronic life Trevor Timm, The Guardian, October 17, 2014 http://www.theguardian.com/commentisfree/2014/oct/17/governmentinternetbackdoorsurveillancefbi
In attack on encryption, FBI director ignores those who need protection Jon Healey, LA Times, October 17, 2014 http://www.latimes.com/opinion/opinionla/laolfbiencryptionapplegooglesmartphones20141017story.ht ml
Fool’s Gold: Data Security is Vital to End Users Amie Stepanovich, Access, October 16, 2014 https://www.accessnow.org/blog/2014/10/16/foolsgolddatasecurityisvitaltousers
FBI Director Continues His Attack On Technology, Privacy And Encryption Mike Masnick, TechDirt, October 16, 2014 https://www.techdirt.com/articles/20141016/11531128849/fbidirectorcontinueshisattacktechnologyprivac yencryption.shtml
Even a Golden Key Can Be Stolen By Thieves: The Simple Facts of Apple’s Encryption Decision 13 Jeremy Gillula, Electronic Frontier Foundation, October 10, 2014 https://www.eff.org/deeplinks/2014/10/evengoldenkeycanbestolenthievessimplefactsapplesencryptio ndecision
Crypto Wars Redux: Why the FBI’s Desire to Unlock Your Private Life Must Be Resisted Cory Doctorow, The Guardian, October 9, 2014 http://www.theguardian.com/technology/2014/oct/09/cryptowarsreduxwhythefbisdesiretounlockyourpr ivatelifemustberesisted
As Surveillance Reforms Languish, New Tools for Consumers to Protect Data Criticized by FBI Ed Black, The Huffington Post, October 9, 2014 http://www.huffingtonpost.com/edwardjblack/assurveillancereformsl_b_5958352.html
Encryption Makes Us All Safer Nuala O’Connor, Center for Democracy & Technology, October 8, 2014 https://cdt.org/blog/encryptionmakesusallsafer/
What Default Phone Encryption Really Means for Law Enforcement Cindy Cohn, Jeremy Gillula and Seth Schoen, Vice, October 8, 2014 https://news.vice.com/article/whatdefaultphoneencryptionreallymeansforlawenforcement.
Apple’s iPhone Encryption Is a Godsend, Even if Cops Hate It Kevin Poulson, Wired, October 8, 2014 http://www.wired.com/2014/10/goldenkey/ iPhone Encryption and the Return of the Crypto Wars Bruce Schneier, Schneier on Security, October 6, 2014 https://www.schneier.com/blog/archives/2014/10/iphone_encrypti_1.html
Experts Laud Changes to iPhone, Android Encryption Daniel Fisher, Threatpost, October 6, 2014 http://threatpost.com/expertslaudchangestoiphoneandroidencryption/108708
America’s huge iPhone lie: Why Apples is being accused of coddling child molesters Marcy Wheeler, Salon, October 6, 2014 http://www.salon.com/2014/10/06/americas_huge_iphone_lie_why_law_enforcement_really_hates_its_new_ policy/
Stop the Hysteria Over Apple Encryption Bruce Schneier, CNN, October 4, 2014 http://www.cnn.com/2014/10/03/opinion/schneierappleencryptionhysteria/index.html
Apple and Google are Helping to Protect our Privacy Nuala O’Connor, The Washington Post, October 2, 2014 http://www.washingtonpost.com/opinions/appleandgooglearehelpingtoprotectourprivacy/2014/10/02/ea 35524a482411e4a4bf794ab74e90f0_story.html
Law Enforcement Has Declared War on Encryption It Can’t Break 14 Dan Gillmor, Slate, October 1, 2014 http://www.slate.com/blogs/future_tense/2014/10/01/law_enforcement_has_declared_war_on_encryption_it _can_t_break.html
Room for Debate: “Apple vs. The Law” Multiple authors, The New York Times, September 30, 2014 http://www.nytimes.com/roomfordebate/2014/09/30/applevsthelaw
Smartphone Encryption Restores Public Trust in Technology Seeta Pena Gangadharan, New America’s Open Technology Institute, September 30, 2014 http://www.nytimes.com/roomfordebate/2014/09/30/applevsthelaw/smartphoneencryptionrestorespublic trustintechnology
Securing Our Data Should Come First Alex Abdo, ACLU, September 30, 2014 http://www.nytimes.com/roomfordebate/2014/09/30/applevsthelaw/securingourdatashouldcomefirst
Holding On to a Small Measure of Privacy Faiza Patel, Brennan Center, September 30, 2014 http://www.nytimes.com/roomfordebate/2014/09/30/applevsthelaw/holdingontoasmallmeasureofpriva cy
China OKs iPhone 6 sale after Apple addresses security concerns Paul Carsten, Reuters, September 30, 2014 http://www.reuters.com/article/2014/09/30/usapplechinaidUSKCN0HP04820140930 (highlights how this is also a trade/economic issue)
The Government Says iPhone Encryption Helps Criminals. They’re Wrong. Timothy B. Lee, Vox, September 29, 2014 http://www.vox.com/2014/9/29/6854679/iphoneencryptionjamescomeygovernmentbackdoor
Nine Epic Failures of Regulating Cryptography Cindy Cohn, Electronic Frontier Foundation, September 26, 2014 https://www.eff.org/deeplinks/2014/09/nineepicfailuresregulatingcryptography
FBI Director Angry At Homebuilders For Putting Up Walls That Hide Any Crimes Therein Mike Masnick, TechDirt, September 26, 2014 https://www.techdirt.com/articles/20140925/17303928647/fbidirectorangryhomebuildersputtingupwallst hathideanycrimestherein.shtml
Apple’s ‘WarrantProof’ Encryption Steve Bellovin, SMBlog, September 23, 2014 https://www.cs.columbia.edu/~smb/blog/control/
Old Technopanic in New iBottles Julian Sanchez, Cato Institute, September 23, 2014 http://www.cato.org/blog/oldtechnopanicnewibottles
15
Anticrypto (or probackdoor) analyses & opeds, or news articles with strong negative angle
Theresa May: we must deny terrorists safe spaces to communicate Patrick Wintour, The Guardian, January 14, 2015 http://www.theguardian.com/politics/2015/jan/14/theresamaynosafespacesterroristscommunicate
Tech companies are making it harder for the nation's law enforcement Ellen Glasser, Baltimore Sun, November 6, 2014 http://www.baltimoresun.com/news/opinion/oped/bsedfbiapple20141106story.html
The web is a terrorist’s commandandcontrol network of choice Robert Hannigan, Financial Times, November 3, 2014 http://www.ft.com/cms/s/2/c89b6c58634211e48a6300144feabdc0.html#axzz3I00vaptF
Apple, Boyd, and Going Dark Andrew Weissman, Just Security, October 20, 2014 http://justsecurity.org/16592/appleboyddark/
Silicon Valley Enables Terrorists and Criminals Jennifer Rubin, Washington Post, October 19, 2014 http://www.washingtonpost.com/blogs/rightturn/wp/2014/10/19/siliconvalleyenablesterroristsandcriminal s/
Compromise Needed on Smartphone Encryption Editorial Board, The Washington Post, October 3, 2014 http://www.washingtonpost.com/opinions/compromiseneededonsmartphoneencryption/2014/10/03/96680 bf84a7711e4891d713f052086a0_story.html
U.S. Law Enforcement Seeks to Halt AppleGoogle Encryption of Mobile Data Del Quentin Wilber, September 30, 2014 (Not an oped but incredibly slanted, all prolaw enforcement, antiencryption quotes) http://www.bloomberg.com/news/20140930/usseekstoreverseappleandroiddatalockingdecision.html
Room for Debate: “Apple vs. The Law” Multiple authors, The New York Times, September 30, 2014 http://www.nytimes.com/roomfordebate/2014/09/30/applevsthelaw
Don’t Create Virtual Sanctuaries for Criminals Ronald T. Hosko, Law Enforcement Legal Defense Fund, September 30, 2014 http://www.nytimes.com/roomfordebate/2014/09/30/applevsthelaw/dontcreatevirtualsanctuariesforcrimi nals
Data Access Shouldn’t Be Up to Companies Alone Stewart Baker, Steptoe, September 30, 2014 16 http://www.nytimes.com/roomfordebate/2014/09/30/applevsthelaw/dataaccessshouldntbeuptocompan iesalone
Apple and Google threaten public safety with default smartphone encryption Cyrus Vance (Manhattan DA), The Washington Post, September 26, 2014 http://www.washingtonpost.com/opinions/appleandgooglethreatenpublicsafetywithdefaultsmartphone encryption/2014/09/25/43af9bf044ab11e4b4371a7368204804_story.html
Apple and Google’s New Encryption Rules Will Make Law Enforcement’s Job Much Harder Ronald Hosko (Law Enforcement Legal Defense Fund), The Washington Post, September 23, 2014 http://www.washingtonpost.com/posteverything/wp/2014/09/23/ihelpedsaveakidnappedmanfrommurder withapplesnewencryptionrulesweneverwouldvefoundhim/
Apple’s Dangerous Game, part 3: Where Do You Draw the Line, and What’s the Privacy Tradeoff? Orin Kerr, The Washington Post, September 22, 2014 http://www.washingtonpost.com/news/volokhconspiracy/wp/2014/09/22/applesdangerousgamepart3wh eredoyoudrawthelineandwhatstheprivacytradeoff/
Apple’s Dangerous Game, Part 2: The Strongest Counterargument Orin Kerr, The Washington Post, September 22, 2014 http://www.washingtonpost.com/news/volokhconspiracy/wp/2014/09/22/applesdangerousgamepart2the strongestcounterargument/
Apple’s Dangerous Game Orin Kerr, The Washington Post, September 19, 2014 http://www.washingtonpost.com/news/volokhconspiracy/wp/2014/09/19/applesdangerousgame/
17