Homepage / Technology / Las Vegas tragedy reignites encryption debate
test Due Diligence Blog Digital Data Rooms for the Netherlands Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review How to Conduct a Virtual Data Room Review Glory Online Casino Türkiye En Iyi Oyunları Ve Bahisleri Olan Kumarhane

Technology

Las Vegas tragedy reignites encryption debate

Did Las Vegas shooter Stephen Paddock use a smartphone, and if so, will investigators ever unlock its secrets?

As law enforcement officials work to understand what motivated the gunman to kill at least 58 people in Las Vegas, Paddock’s technology habits have come into focus.

The suspect apparently acted alone. Because he was found dead in what appears to be a suicide, authorities are scrambling to find clues he may have left behind.

The incident revives questions about the privacy protections built into smartphones. Law enforcement officials want companies like Apple and Google to give them keys to unlock the devices. The companies have so far refused to give authorities a master key that would open every phone.

Chris Swecker, former FBI assistant director, told CNBC that if Paddock had a smartphone, it could be a ‘treasure trove’ of information about his motives and contacts.

“It is one of the more critical ways to reconstruct the shooter’s movements,” said Swecker.

Technology companies say there are often ways to gather digital evidence without compromising everyone’s privacy. Much of the information that law enforcement officials look for could be stored outside the device, such as with a suspect’s phone carriers or in the cloud. If so, companies can access and deliver that information so long as they are provided with appropriate warrants.

For example, Google publishes a Transparency Report in which the search giant details the number of user data requests from government authorities it receives every six months.

However, one potential problem could arise, said Roger Kay of tech research firm Endpoint Technologies: If the shooter carefully covered his tracks using encryption, then accessing information on the device itself could prove nearly impossible.

That issue made headlines last year when the FBI and Apple engaged in a heated court battle regarding one of the iPhones used by the San Bernardino terrorists.

The FBI demanded that Apple bypass the security of that phone. Apple countered that was dangerous because, in order to do so, it would have needed to create a new version of the operating system. The company said there was a real risk that such software could fall into the hands of criminals, thereby putting at risk millions of iPhone users.

In the case of the Las Vegas shooter, Kay said that if there is a device that contains encrypted data — which law enforcement cannot access through other means — then the same complex debate around privacy and security that defined the San Bernardino tragedy could take place again.

Source: Tech CNBC
Las Vegas tragedy reignites encryption debate

Comments are closed.