TITLE

Obama on encryption: 'It's fetishizing our phones above every other value'

AUTHOR(S)
MCGARRY, CAITLIN
PUB. DATE
April 2016
SOURCE
PCWorld;Apr2016, Vol. 34 Issue 4, p8
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the views of U.S. President Barack Obama on matters relating to encryption and its impact on national security. He states the encryption schemes in mobile phones and government's intervention to unlock it to disrupt and even destroy a possible terrorist attack. An overview of the issue involving the case of Apple Inc. and the Federal Bureau of Investigation wherein the former was pressed to unlock an iPhone 5c mobile phone used in the terrorist plot in California is given.
ACCESSION #
114390088

 

Related Articles

  • 'Terrorism' raids target socialists, anti-war fighters. Sheppard, Barry // Green Left Weekly;10/6/2010, Issue 855, p15 

    The article reports on the order of the administration of U.S. President Barack Obama on "war on terror" against advocates of socialism in the country. It notes on the series of raids conducted by the Federal Bureau of Investigation (FBI) on homes and offices of those hinted to be supporters of...

  • Grandma's 5 Rules: Obama's Terrorist Report Has to Find Solutions to These Issues. Est├ęs, Dr. Clarissa Pinkola // Moderate Voice;1/ 7/2010, p8 

    In this article, the author discusses the solutions suggested to U.S. President Barack Obama to tackle with terrorism. The author suggests Obama to hire agents from the Federal Bureau of Investigation (FBI) and the Transportation Security Administration (TSA) who have good judgment and quickness...

  • Remarks Prior to a Meeting With Senior Officials at the Federal Bureau of Investigation and an Exchange With Reporters. Obama, Barack H. // Daily Compilation of Presidential Documents;4/28/2009, p1 

    The article presents the text of a speech by U.S. President Barack Obama, delivered on April 28, 2009 prior to a meeting with senior officials at the Federal Bureau of Investigation.

  • Remarks to Federal Bureau of Investigation Employees. Obama, Barack H. // Daily Compilation of Presidential Documents;4/28/2009, Special section p1 

    The article presents the text of a speech by U.S. President Barack Obama, delivered on April 28, 2009 to the employees of the Federal Bureau of Investigation.

  • How the Apple/FBI Fight Risks the Whole U.S. Tech Industry. Allworth, James // Harvard Business Review Digital Articles;2/24/2016, p2 

    The author discusses how the technology industry may be affected by the legal dispute between the U.S. Federal Bureau of Investigation (FBI) and American multinational technology firm Apple over the encryption of an Apple iPhone smartphone recovered from the 2015 terrorist attack in San...

  • Hillary Clinton's Circle of Jerks. CONTINETTI, MATTHEW // Commentary;Nov2015, Vol. 140 Issue 4, p88 

    The article offers information on the U.S. politician Hillary Clinton and her email scandal over hosting classified information on her private server. It discusses role of Clinton as U.S. President Barack Obama's policy secretary. It also informs that Federal Bureau of Investigation is...

  • Mobile Security Is at Stake in Apple-FBI Case. Abraham, Cherian // American Banker;2/25/2016, Vol. 181 Issue 37, p1 

    The article discusses the impact of the court case involving American consumer electronics maker Apple Inc. and the U.S. Federal Bureau of Investigation (FBI) on mobile security. The issue emerged due to the rigid stance of the company on privacy and encryption as hampered by its own ability to...

  • Threat Report.  // SC Magazine: For IT Security Professionals (15476693);Aug2010, Vol. 21 Issue 8, p8 

    The article presents updates on international hacking and information technology security. The encryption from hard drives taken from Daniel Dantas, a banker accused of financial crimes in Brazil, was not decrypted by the U.S. Federal Bureau of Investigation (FBI). According to the Dutch...

  • Image Encryption Scheme Based on Filter Bank and Lifting. Saraireh, Saleh; Al-Sbou, Yazeed; Al-Saraireh, Ja'afer; Alsmadi, Othman // International Journal of Communications, Network & System Scienc;Jan2014, Vol. 7 Issue 1, p43 

    In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and evaluated. Many extensive techniques have been applied to examine the security of the image encryption using the filter bank cipher with one or two rounds. To analyze and evaluate the...

  • TERRORIST WATCH LIST SCREENING: Recommendations to Promote a Comprehensive and Coordinated Approach to Terrorist-Related Screening. Larence, Eileen R. // GAO Reports;11/ 8/2007, preceding p1 

    The article presents recommendations to promote comprehensive and coordinated approach to terrorist-related screening by the Federal Bureau of Investigation's (FBI) Terrorist Screening Center in the U.S. The Government Accountability Office (GAO) suggested that the FBI needs actions to monitor...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics