Jetico’s BestCrypt Container Encryption for Linux – Linux Journal

Cyber-attacks are now constant, threats to privacy are increasing, and more rigid regulations are looming worldwide. To help IT folks relax in the face of these challenges, Jetico updated its BestCrypt Container Encryption solution to include Container Guard.

This unique feature of Jetico's Linux file encryption protects container files from unauthorized or accidental commandslike copying, modification, moving, deletion and re-encryptionresulting in bolstered security and more peace of mind. Only users with the admin password can disable Container Guard, increasing the security of sensitive files.

The BestCrypt update also adds the Resident feature, an automatic password prompt for mounting containers at startup. That same feature will dismount containers after a time period of inactivity as set by the user.

While user-friendly and time-saving, these added features also provide an extra layer of protection when working on shared computers. On endpoints or in the cloud, data encrypted with BestCrypt can be accessed via Linux, Android, Windows and Mac devices.

See original here:
Jetico's BestCrypt Container Encryption for Linux - Linux Journal

EU deals Theresa May encryption setback as MEPs propose ban on government backdoors – Telegraph.co.uk

After the attack the Home Secretary Amber Rudd accused WhatsApp of giving terrorists "a place to hide and said it was completely unacceptable that they could communicate in secret.

This week, Ms Mayand French presidentEmmanuel Macron vowed tougher action on tech companies applying encryption.

As well as outlawing encryption backdoors, the MEPs propose forcing communications providers that do not currently encrypt communications to do so.

Service providers who offer electronic communications services should ensure that such electronic communications data are protected by using specific types of software and encryption technologies,the proposals state.

A Home Office spokesman said: "The Government has been clear that we support the use of encryption. It helps keep peoples personal information safe and ensures secure online commerce.But we have also been clear that we must ensure that, in tightly proscribed circumstances, our law enforcement and security and intelligence agencies are able to access communications of criminals, including terrorists."

Continued here:
EU deals Theresa May encryption setback as MEPs propose ban on government backdoors - Telegraph.co.uk

Facebook defends encryption, says it is countering terrorism using AI – SC Magazine

"There's no place on Facebook for terrorism. We remove terrorists and posts that support terrorism whenever we become aware of them," reads a new Facebook company blog post.

Aware that terrorists take advantage of social media to spread propaganda, Facebook on Thursday divulged some of its methods for combating the problem, including recent efforts to employ machine learning to automatically identify objectionable content.

"Our stance is simple: There's no place on Facebook for terrorism. We remove terrorists and posts that support terrorism whenever we become aware of them," states a company blog postauthored by Facebook officialsMonika Bickert, director of global policy management, andBrian Fishman, counterterrorism policy manager.

The post came shortly after news broke that James Hodgkinson, the man who on Wednesday shot and critically injured House Majority Whip Steve Scalise at a baseball practice, regularly posted angry extremist views on Facebook regarding President Donald Trump and other Republicans. That same Wednesday, Facebook removed Hodgkinson's online profiles, according to various reports.

Facebook on Thursday also acknowledged the controversy surrounding terrorists who use encrypted messaging platforms such as the company's WhatsApp service tosecurely communicate with each other. It was following the March 2017 Westminster terror attack that British home secretary Amber Rudd suggested that UK law enforcement must be able to listen in on WhatsApp conversations, after it was discovered that the attacker, Khalid Masood, used the service before murdering four people.

Defending encryption technology, the blog post notes that these services also have legitimate purposes such as protecting the privacy of journalists and activists. In their joint blog post, Bickert and Fishman wrote that while Facebook does not have the ability to read encrypted messages, "we do provide the information we can in response to valid law enforcement requests, consistent with applicable law and our policies."

Prior to Thursday's post, Facebook had not previously detailed its use of AI to root out terrorist activity on its platforms. According to the post, the company is focusing its most cutting-edge machine-learning techniques on curbing terrorist content submitted by ISIS, Al Qaeda, and related affiliates, adding that its efforts are "already changing the ways we keep potential terrorist propaganda and accounts off Facebook."

Facebook reported that its AI technology allows its systems to image-match photos or videos that have previously been linked to terrorism, and reject such forbidden content before it is displayed.

The company is also experimenting with natural language recognition capabilities in order to identity content that appears to advocate for terrorism. To that end, Facebook has been feeding previously flagged content toits AI engine so that it does a better job recognizing such language in the future.

Additionally, Facebook is using algorithms to determine if various pages, posts, profiles and groups likely support terrorism based on connections and shared attributions with other confirmed terrorist pages. The company also claims it is getting faster at detecting new fake accounts created by repeat offenders.

Facebook has also begun to apply these AI techniques to take down terrorist accounts additional platforms, including WhatsApp and Instagram. "Given the limited data some of our apps collect as part of their service, the ability to share data across the whole family is indispensable to our efforts to keep all our platforms safe," the blog post reads.

Outside the realm of AI, Facebook is also relying on its own human expertise to counter terrorism activity online, including its global Community Operations teams that review user complaints and reports, more than 150 terrorism and safety specialists, and a global team that was formed to promptly respond to emergency law enforcement requests. The company also relies in cooperation with industry partners, governments and various community groups and non-governmental organizations.

Companies are increasingly turning to AI and automation technologies to fight a variety of illegal and forbidden online activity. A new study released this week by cybersecurity and application delivery solution provider Radware found that 81 percent of surveyed executives reported that they either recently implemented or began more heavily relying on automated solutions. Moreover, 57% of these polled executives said that they trust automated systems as much or more than humans to protect their organizations. And 38 percent predicted that automated security systems would be the primary resource for managing cyber security within two years.

See the rest here:
Facebook defends encryption, says it is countering terrorism using AI - SC Magazine

Quantum-encrypted communication satellites could be a reality within five years – Wired.co.uk

Google/ESA

A laser in space has measured quantum states on Earth, 38,000km away, for the first time.

This means a network of satellites communicating through quantum encryption could become a reality within five years, according to researchers behind the breakthrough experiment.

"We were quite surprised by how well the quantum states survived traveling through the atmospheric turbulence to a ground station," said Christoph Marquardt from the Max Planck Institute for the Science of Light, Germany, and lead author of the new paper.

Cracking quantum measurements at long distance is crucial to developing a network for quantum-encrypted communication.

Quantum-encrypted communication would be much more secure than the mathematical algorithms used currently. This is because of the properties of quantum mechanics called Heisenbergs uncertainty principle.

Currently, information can be encrypted with techniques based on mathematical algorithms. It is difficult to figure out the exact algorithm used to encrypt a piece of data, making the approach largely safe for now.

However, experts anticipate computers powerful enough to crack the codes will surface in the next 10 to 20 years. This development would mean current encryption methods would be redundant as they could easily be broken.

Last year, researchers at Chatham House's International Security Department said satellites and other space communications technology are at significant risk from hackers and cyber attacks.

But there is a potential solution - and this is where quantum mechanics comes into it.

Subscribe to WIRED

Heisenbergs uncertainty principle means the act of observing a particle creates certain changes in its behaviour. Specifically, it means we cannot know both the momentum and position of a particle to the same degree of certainty at once.

Quantum encryption uses this to create encoded data in the form of light that, if intercepted, will change its behaviour. This can alert the people communicating that the security key is not safe to use.

The problem comes when sending data over long distances. Researchers have been moving towards satellite-based systems because previous attempts at using optical fibres have proven difficult due to signal losses.

Marquardt and his team measured quantum states encoded in a laser beam sent from one of the satellites already in space, working with satellite telecommunications company Tesat-Spacecom GmbH and the German Space Administration.

The satellites had been designed for laser communication, but was not ideally suited for the task.

"From our measurements, we could deduce that the light traveling down to Earth is very well suited to be operated as a quantum key distribution network," Marquardt said. "We were surprised because the system was not built for this. The engineers had done an excellent job at optimizing the entire system."

The team created quantum states in a range the satellite normally does not operate, and were able to make quantum-limited measurements from the ground.

Based on the results, Marquardt says we could see quantum-encrypted communications via satellites within five to ten years.

"The paper demonstrates that technology on satellites, already space-proof against severe environmental tests, can be used to achieve quantum-limited measurements, thus making a satellite quantum communication network possible. This greatly cuts down on development time, meaning it could be possible to have such a system as soon as five years from now."

But there is much work left to do, he added. "There is serious interest from the space industry and other organizations to implement our scientific findings," said Marquardt.

"We, as fundamental scientists, are now working with engineers to create the best system and ensure no detail is overlooked."

See the original post here:
Quantum-encrypted communication satellites could be a reality within five years - Wired.co.uk

Germany Ready to Undermine Encryption in Terror Fight – Infosecurity Magazine

Germany has become the latest Western nation to signal its intent to undermine encryption in the name of preventing terrorism.

Central and state-level ministers have apparently expressed dismay that terrorists are using apps such as WhatsApp and Signal to communicate out of the reach of the authorities.

We can't allow there to be areas that are practically outside the law", said interior minister Thomas de Maiziere, according to Reuters.

He reportedly added that Berlin is planning a new law which will effectively give the authorities the right to view private messages.

Its not known how the government intends to achieve its ends. Its unlikely it would be able to force companies like Apple and Facebook to put backdoors in their products or services and a ban is most likely unworkable.

One option being mooted is "source telecom surveillance", where the authorities would force telecoms providers to install software on their customers devices which effectively bypasses the encrypted app to intercept messages before they are scrambled.

Germany has suffered its fair share of terror incidents of late, most notably when a lorry ploughed into a Christmas market in Berlin last December, killing 12.

However, the country has always been resistant to heavy-handed state surveillance given what it endured under the Nazis and in East Germany after the war.

The UK, on the other hand, appears to be blazing a trail with its Investigatory Powers Act, widely regarded as granting the most intrusive state surveillance powers of any Western democracy.

The Australian government is said to be considering implementing its own version of the law, while the European Commission has indicated it is willing to introduce legislation which would undermine end-to-end encryption.

Security experts maintain that doing so would fail to have the intended effect, as terrorists will migrate to more secure platforms, while ordinary users and businesses are left exposed.

The rest is here:
Germany Ready to Undermine Encryption in Terror Fight - Infosecurity Magazine

What Is Data Encryption? | Digital Guardian

Nate Lord Last Updated: Friday January 27, 2017

Data encryption defined in Data Protection 101, our series on the fundamentals of data security.

A Definition of Data Encryption

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data iscommonlyreferred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmetric encryption.

The Primary Function of Data Encryption

The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.

These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a messages origin, and integrity provides proof that a messages contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.

The Process of Data Encryption

Data, or plaintext, is encrypted with an encryption algorithm and an encryption key. The process results in ciphertext, which only can be viewed in its original form if it is decrypted with the correct key.

Symmetric-key ciphers use the same secret key for encrypting and decrypting a message or file. While symmetric-key encryption is much faster than asymmetric encryption, the sender must exchange the encryption key with the recipient before he can decrypt it. As companies find themselves needing to securely distribute and manage huge quantities of keys, most data encryption services have adapted and use an asymmetric algorithm to exchange the secret key after using a symmetric algorithm to encrypt data.

On the other hand, asymmetric cryptography, sometimes referred to as public-key cryptography, uses two different keys, one public and one private. The public key, as it is named, may be shared with everyone, but the private key must be protected. The Rivest-Sharmir-Adleman (RSA) algorithm is a cryptosystem for public-key encryption that is widely used to secure sensitive data, especially when it is sent over an insecure network like the internet. The RSA algorithms popularity comes from the fact that both the public and private keys can encrypt a message to assure the confidentiality, integrity, authenticity, and non-repudiability of electronic communications and data through the use of digital signatures.

Challenges to Contemporary Encryption

The most basic method of attack on encryption today is brute force, or trying random keys until the right one is found. Of course, the length of the key determines the possible number of keys and affects the plausibility of this type of attack. It is important to keep in mind that encryption strength is directly proportional to key size, but as the key size increases so do the number of resources required to perform the computation.

Alternative methods of breaking a cipher include side-channel attacks and cryptanalysis. Side-channel attacks go after the implementation of the cipher, rather than the actual cipher itself. These attacks tend to succeed if there is an error in system design or execution. Likewise, cryptanalysis means finding a weakness in the cipher and exploiting it. Cryptanalysis is more likely to occur when there is a flaw in the cipher itself.

Data Encryption Solutions

Data protection solutions for data encryption can provide encryption of devices, email, and data itself. In many cases, these encryption functionalities are also met with control capabilities for devices, email, and data. Companies and organizations face the challenge of protecting data and preventing data loss as employees use external devices, removable media, and web applications more often as a part of their daily business procedures. Sensitive data may no longer be under the companys control and protection as employees copy data to removable devices or upload it to the cloud. As a result, the best data loss prevention solutions prevent data theft and the introduction of malware from removable and external devices as well as web and cloud applications. In order to do so, they must also ensure that devices and applications are used properly and that data is secured by auto-encryption even after it leaves the organization.

As we mentioned, email control and encryption is another critical component of a data loss prevention solution. Secure, encrypted email is the only answer for regulatory compliance, a remote workforce, BYOD, and project outsourcing. Premier data loss prevention solutions allow your employees to continue to work and collaborate through email while the software and tools proactively tag, classify, and encrypt sensitive data in emails and attachments. The best data loss prevention solutions automatically warn, block, and encrypt sensitive information based on message content and context, such as user, data class, and recipient.

While data encryption may seem like a daunting, complicated process, data loss prevention software handles it reliably every day. Data encryption does not have to be something your organization tries to solve on its own. Choose a top data loss prevention software that offers data encryption with device, email, and application control and rest assured that your data is safe.

See more here:
What Is Data Encryption? | Digital Guardian

Look who’s joined the anti-encryption posse: Germany, come on down – The Register

Germany has joined an increasing number of countries looking to introduce anti-encryption laws.

Speaking on Wednesday, German interior minister Thomas de Maizire said the government was preparing a new law that would give the authorities the right to decipher and read private encrypted messages, specifically citing encrypted messaging apps such as WhatsApp and Signal.

Such services were allowing criminals and terrorists to evade surveillance, de Maizire said, adding: "We can't allow there to be areas that are practically outside the law."

He did not specify how the encryption breaking would be achieved, but did note that among the options under consideration was forcing phone operators to install software on phones that would effectively bypass encrypted apps by granting access to the phone itself.

That stance reflects a very similar one taken earlier this week by Australian prime minister Malcolm Turnbull, who told Parliament: "The privacy of a terrorist can never be more important than public safety never."

Turnbull revealed that the Five Eyes nations would be meeting next month to discuss how to prevent "terrorists and organized criminals" from "operating with impunity ungoverned digital spaces online" the exact same line pushed by the German interior minister.

In addition, earlier this month, German chancellor Angela Merkel argued in Mexico City for global restrictions and "sensible rules" to deal with online content, stating that Germany would use its presidency of the G20 to develop a concrete set of digital policies at the forthcoming summit in Hamburg next month.

When it comes to encryption issues, much of the focus has been on the UK's Investigatory Powers Act, which introduced a placeholder for a subsequent "technical capability notices paper" that would oblige telecom operators and ISPs to provide content access to law enforcement and require them to unencrypt content wherever possible.

A draft of the paper that was provided only to the telecom industry was leaked, and it revealed that the UK government wants real-time access to the full content of any named individual within one working day, as well as any "secondary data" relating to that person.

The system would oblige operators to provide real-time interception of 1 in 10,000 of its customers: in other words, the government would be able to simultaneously spy on 6,500 folks at any given moment.

That law has been spoken of favorably by the Australian government and it is reportedly considering introducing a similar version.

This rash of anti-encryption legislation comes in the wake of new terrorist attacks in Europe and a determined push by the security services to be able to maintain their current spying capabilities into modern smartphone technologies.

In Germany's case there is also the added factor of an election in September, and the expectation that the country will become a target of terrorist activity as a result of that.

There is a big problem at the heart of the issue however, and that comes in two parts: first, the apps that offer hard-to-crack, end-to-end encryption to users are almost all based in the United States and so outside the legislative reach of Europe and Australasia; and second, encryption is a mathematical process, so introducing a backdoor into any system also leaves that door open for others.

Broadly speaking there are three ways to read people's private, encrypted messages:

It is clear from the German interior minister's comments that it is focusing on the third, most pragmatic solution: gaining access to someone's phone or other device.

No doubt someone in the NSA is currently putting together a PowerPoint presentation that outlines how it has been able to hack into people's phones and bypass protections (including the Russian ambassador to the US?).

We'll have to wait until the next Snowden to find out exactly how it does that, but in the meantime, you can expect new legislation built around successful phone hacks to find its way in the capitals of most Western nations.

PS: A German court has ordered Google to stop linking to Lumen Database, formerly the Chilling Effects website.

Read the rest here:
Look who's joined the anti-encryption posse: Germany, come on down - The Register

Telegram founder: US intelligence agencies tried to bribe us to weaken encryption – Fast Company

Facebook is unquestionably the largest social network the world has ever seen. Every month, 1.94 billion people use the service. Every day, 1.28 billion peopleabout one in seven on the entire planetuse it. With that scale comes all kinds of responsibilities.

That's why Facebook has decided to formally address what it calls the "hard questions," the things that it feels will most govern what it does, and how it should be governed, going forward.

In a blog post, Elliot Schrage, Facebook's vice president for public policy and communications, wrote that the company wants to talk "openly" about these "complex subjects:"

* How should platforms approach keeping terrorists from spreading propaganda online?

* After a person dies, what should happen to their online identity?

* How aggressively should social media companies monitor and remove controversial posts and images from their platforms? Who gets to decide what's controversial, especially in a global community with a multitude of cultural norms?

* Who gets to define what's false news and what's simply controversial political speech?

* Is social media good for democracy?

* How can we use data for everyone's benefit, without undermining people's trust?

* How should young internet users be introduced to new ways to express themselves in a safe environment?

Facebook recognizes that not everyone will be in lock-step with it on how it addresses those questions, and it knows people will think there are other hard questions that need to be looked at as well. So the company is inviting users to suggest additional questions at hardquestions@fb.com.

Meanwhile, the folks at TechCrunch have annotated Facebook's list with their thoughts on the context behind each of the seven initial questions. DT

See original here:
Telegram founder: US intelligence agencies tried to bribe us to weaken encryption - Fast Company

Backdoors, encryption and internet surveillance: Which way now? – ZDNet

Theresa May wants the UK government to get a backdoor into devices.

The UK government has once again raised the issue of online surveillance and internet regulation. But it's unclear exactly what the Conservatives want to do, while cybersecurity experts accuse the government of naivety in its current approach.

"We cannot allow this ideology the safe space it needs to breed -- yet that is precisely what the internet, and the big companies that provide internet-based services provide," said Prime Minister Theresa May, following the recent terrorist attacks in Manchester and London.

"We need to work with allied democratic governments to reach international agreements to regulate cyberspace to prevent the spread of extremist and terrorism planning," May added.

A similar statement appeared in a section of the Conservative Party manifesto for the recent election, which resulted in a hung parliament: "Some people say that it is not for government to regulate when it comes to technology and the internet. We disagree," it read.

However, there's little clarity on what the new minority government intends to do: that will have to wait for the Queen's Speech, which is due next week. Another factor is whether, lacking an overall majority, the government will want to expend limited political capital on this controversial topic.

It's also worth remembering that the UK government massively expanded its surveillance powers only recently. This policy was introduced by Theresa May herself when serving as Home Secretary; the resulting Investigatory Powers Act 2016 was dubbed the 'snooper's charter' by critics because it forces tech companies to store the 'internet connection records' (websites visited) of every UK internet user for a year.

Another area that the government seems keen to gain control over is is end-to-end encryption.

Neither of these moves met with a positive response from those in the information security sector at the recent Infosecurity Europe conference in London.

"Where I think it goes wrong is that when a government starts to talk about regulating the internet, they don't get it. We don't own the internet and no one nation, no one government, and no one state owns and can influence the internet," said Rik Ferguson, VP of security research at Trend Micro.

Part of the problem is that governments and legislation haven't caught up with the fast-paced evolution of the internet and the services built around it.

"A lot of the world's governments were formed at a time when we were still largely an agricultural society: 120 years ago if you worked for the government at the US Postal Service, you were probably better educated than anyone within 100 miles of your post office," said Paul Vixie, CEO at Farsight Security.

But now, the expertise of individuals within the technology and internet sectors has far outstripped the knowledge of the lawmakers -- and governments don't necessarily have the wherewithal to catch up.

"The assumption that the government should know and should see what everyone is doing has to be reopened. We have to ask that question again," argued Vixie.

Even those with some understanding of the situation "don't necessarily have the right security tools to keep your information secure" -- especially in situations where zero-day exploits are being stockpiled.

That was clearly demonstrated by the WannaCry ransomware attack, which was so effective because the US National Security Agency (NSA) lost control of hacking tools which were then used to make the ransomware spread even faster.

If internet regulation is tricky, then what to do about the widespread use of end-to-end encryption is even harder to deal with. If the UK or US insist on tech companies introducing a backdoor into the encryption they currently use to protect communications across the internet, then more authoritarian nations will certainly demand the same.

"I don't think the option of completely dismantling encryption is an option. There's privacy implications that need to be considered, individual rights which need to be considered," said Liviu Arsene, Senior E-threat Analyst at Bitdefender.

Then there's also the risk that severe regulation of the internet will only hamper regular users, while criminals remain unaffected as they continue to find new ways of staying under the radar.

"How completely stupid is that? Every time we see regulation, we see regular folks being impacted and criminals not being impacted", said Peter Wood, an ethical hacker and member the ISACA London Security Advisory Group.

"How is banning an encrypted algorithm from the US going to sort out criminals in any way? Do they really think terrorists will think 'I'm not allowed to, so I won't use it," he continued. "The naivety astounds me."

That's not to say the government shouldn't be able to regulate anything at all. There are numerous aspects of the internet on which governments have established rules and procedures -- including hate speech, exploitation and more -- that help to keep people safe, said Ferguson.

"These are illegal, people do get prosecuted. That's regulation and I'm happy with that, we need that -- many people need to be protected from themselves," he said.

However, Ferguson continued, "It's got to be with public agreement and it's got to be targeted. There is a line we have to be careful not to cross when regulation becomes censorship."

Not only is large-scale censorship a massive infringement on individual civil liberties, it could also also have large-scale economic consequences. According to Vixie, China's 'Great Firewall' is harming its economy and any leaders -- like Theresa May -- who are looking to follow suit should heed that warning.

"If China's experiment is ending by teaching them they should be more open and the government should have less control, then I'd like Theresa May to talk to some of the people that are there and find out what they've learned, rather than insisting Britain run its own parallel experiment to get the same results."

"In other words," Vixie said, "it's crazy talk".

See original here:
Backdoors, encryption and internet surveillance: Which way now? - ZDNet

Justice Department requests $21.6M to tackle ‘Going Dark’ encryption problem – Washington Times

The Justice Department is requesting more than $20 million in federal funding to bankroll efforts related to resolving the governments continuing Going Dark problem, Deputy Attorney General Rod Rosenstein said Tuesday, signaling one of the Trump administrations first attempts at tackling the issue of ubiquitous, hard-to-crack encryption amid growing concerns involving its impact on criminal investigations.

While federal investigators have fought for years to counter the so-called Going Dark phenomenon the governments growing inability to access and decipher digitally encrypted communications Mr. Rosenstein said during a Justice Department budget-request hearing Tuesday that resources needed to reverse the trend are required now more than ever.

The seriousness of this threat cannot be overstated, Mr. Rosenstein told the Senate Subcommittee on Commerce, Justice, Science and Related Agencies. This phenomenon is severely impairing our ability to conduct investigations and bring criminals to justice.

The Justice Department is requesting $21.6 million specifically towards countering its Going Dark program, Mr. Rosenstein testified in his prepared remarks.

The FBI will use this funding to develop and acquire tools for electronic device analysis, cryptanalytic capability and forensic tools, he added, in turn enabling the Justice Department to continues its leading role in enhancing the capabilities of the law enforcement and national security communities.

Mr. Rosenstein was not initially slated to testify Tuesday, but appeared after the hearings previously scheduled witness, Attorney General Jeff Sessions, canceled in lieu of speaking before the Senate Intelligence Committee with respect to the Trump administration and its purported ties to Russia, as well the presidents abrupt firing last month of former FBI Director James Comey.

Days before leaving office on May 9, Mr. Comey said federal investigators had legally seized more than 6,000 smartphones and electronic devices during a recent six-month span but found that 46 percent couldnt be opened with any technique.

That means half of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique, Mr. Comey told the Senate Judiciary Committee on May 3. That is a big problem. And so the shadow continues to fall.

The vast majority of smartphones currently sold in the U.S. run either Apples iOS or Googles Android operating systems, the likes of which allow customers the ability to protect their digital contents and communications from eavesdroppers with security-minded technology including strong encryption. While hailed by privacy and security proponents, however, the issue became a hot-button issue last year after federal authorities found themselves unable at first to access the contents of an Apple iPhone recovered from the scene of a December 2015 mass shooting in San Bernardino, California.

If Apple doesnt give info to authorities on the terrorists Ill only be using Samsung until they give info, President Trump tweeted from the campaign trail February. Boycott all Apple products until such time as Apple gives cellphone info to authorities regarding radical Islamic terrorist couple from Cal.

The Obama administration was not in a position where they were seeking legislation, Mr. Comey told lawmakers last month when asked about the possibility of establishing a legal statue to resolve the Going Dark dilemma. I dont know yet how President Trump intends to approach this. I know he spoke about it during the campaign, I know he cares about it, but its premature for me to say.

Read more:
Justice Department requests $21.6M to tackle 'Going Dark' encryption problem - Washington Times