Description |
1 online resource (18 pages) |
Contents |
Introduction. -- Hacking the mob with keyloggers. -- Hacking a bomb threat with CIPAV. -- One court pushes back on a hack. -- Hacking the onion router. -- Hacking the San Bernardino phone. -- The future of hacking. -- Notes |
Summary |
Hacking by law enforcement has been front page news since the FBI purchased a tool to bypass the security of an encrypted iPhone while investigating the San Bernardino shooting. However, this type of hacking is nothing new: it has been over fifeen years since the first known case of police intrusion into a computer as part of an investigation. Understanding the history of government hacking is important in order to engage more people in the on-going policy discussion. This paper focuses on a selection of illustrative historical cases, with the understanding that due to the secret nature of government investigations, we can only know a fraction of the hacking that has taken place. This overview highlights major trends in investigative hacking and will hopefully foster more inquiries into these practices by policymakers and the public |
Notes |
At head of title: Cybersecurity Initiative |
|
"September 2016"--Cover |
Bibliography |
Includes bibliographical references (pages 11-15) |
Notes |
Online resource; title from PDF cover page (Amazonaws, viewed October 21, 2016) |
Subject |
Criminal investigation -- United States -- Case studies
|
|
Hackers.
|
|
Law enforcement -- United States
|
|
Criminal investigation.
|
|
Hackers.
|
|
Law enforcement.
|
|
United States.
|
Genre/Form |
Case studies.
|
Form |
Electronic book
|
Author |
Wilson, Andi, author
|
|
New America Foundation, publisher.
|
|