Apple Incapable of Decrypting iOS 8 User Data, Even for Government

As noted by The Washington Post, iOS 8 marks a new, more aggressive stance in protecting customer data from prying eyes, as Apple engineered an encryption system even it is unable to break.

In a document (PDF link) meant to guide law enforcement officers in requesting user information, Apple notes that it no longer stores encryption keys for devices with iOS 8, meaning agencies are unable to gain access even with a valid search warrant. This includes data store on a physical device protected by a passcode, including photos, call history, contacts and more.  Continue reading →

Stores Sniff Out Smartphones to Follow Shoppers

Indoor location technology brings Internet-style tracking to physical spaces.

You’ve just tossed a jar of peanut butter in your grocery cart when your smartphone buzzes. You glance down at the screen to see a message that seems downright clairvoyant: Buy some jelly. Get $1 off.

Convenient? Certainly. Creepy? Maybe.  Continue reading →

FBI’s Secret NET-Surveillance

The FBI has recently formed a secretive surveillance unit with an ambitious goal: to invent technology that will let police more readily eavesdrop on Internet and wireless communications.

The establishment of the Quantico, Va.-based unit, which is also staffed by agents from the U.S. Marshals Service and the Drug Enforcement Agency, is a response to technological developments that FBI officials believe outpace law enforcement’s ability to listen in on private communications.

Continue reading →

CIA Surveillance Through Your Dishwasher

More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

Continue reading →