A trove of communications from ISIS plots and activity in Europe reveals a mix of direct control and improvisation and shows the crucial importance of encrypted messaging tools. “Detonate your belt in the crowds,” one message declared.
The U.S. government says Apple’s refusal to help investigators access data on a San Bernardino shooter’s phone is guided by brand and business concerns. A hearing date has been set in California.
Apple is in a unique position to challenge the FBI’s request for access to a terrorist suspect’s iPhone. Nonetheless, more tech companies worry about the precedent.
The National Security Agency has the keys to most Internet encryption methods and it has gotten them by using supercomputers to break them and by enlisting the help of private IT companies