GOVERNMENT HACKING BIBLIOGRAPHY

Similar documents
THE WRIT TO REFUSE. The Writ to Refuse 429

Case 3:16-cv Document 1 Filed 04/19/16 Page 1 of 8

Case 5:16-cm SP Document Filed 03/15/16 Page 1 of 5 Page ID #:2806. Exhibit HH

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8

Case 1:15-mc MKB-JO Document 40-1 Filed 04/15/16 Page 1 of 5 PageID #: 899

Investigatory Powers Bill

Case 3:07-cv SI Document 7-5 Filed 10/29/2007 Page 1 of 39 EXHIBIT J

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

In recent years, criminals have launched cyberattacks

STATEMENTS OF SUPPORT. R Street Op-Ed:

January 14, Dear Chairman Graham and Ranking Member Feinstein:

The 4th Amendment to the U.S. Constitution, Article 3 of the ALA Code of Ethics, and Section 215 of the USA PATRIOT Act: Squaring the Triangle

Weekly Geopolitical Report

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

NAPO WASHINGTON REPORT

v. 17 Cr. 548 (PAC) January 8, :30 p.m. HON. PAUL A. CROTTY, District Judge APPEARANCES

Case 5:16-cr XR Document 52 Filed 08/30/17 Page 1 of 10

Confrontation or Collaboration?

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE

August 23, BY U.S. MAIL AND Freedom of Information Act Request Request for Expedited Processing

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Phone-Records Surveillance Is Broadly Acceptable to Public

Stanford Law Review Online

Electronic Privacy Information Center September 24, 2001

The National Security Agency s Warrantless Wiretaps

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

Wanted by Ecuador, 2 Brothers Make Mark in U.S. Campaigns

Considerations on the use of technical surveillance in criminal proceedings

Global View Assessments Fall 2016

Privacy And? Surveillance

CRS Report for Congress

BHAIRAV ACHARYA, KEVIN BANKSTON, ROSS SCHULMAN, ANDI WILSON DECIPHERING THE EUROPEAN ENCRYPTION DEBATE: UNITED KINGDOM

Jack Dorsey: Co-Founder of Twitter. The most remarkable change has been the means for public relations practitioners to get their

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features:

The Honorable Reena Raggi Chair, Advisory Committee on Criminal Rules

Survey of US Voters Issues and Attitudes June 2014

I. ICE Must Ensure the Accuracy and Safety of Commercial Databases It Uses

The Honorable Robert J. Bryan UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT TACOMA 9 UNITED STATES OF AMERICA, No. 15-CR RJB 10

TITLE III WIRETAPS. WHO S LISTENING?

Computer Search and Seizure

STATEMENT STEVEN G. BRADBURY ACTING ASSISTANT ATTORNEY GENERAL OFFICE OF LEGAL COUNSEL DEPARTMENT OF JUSTICE

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

KABC-TV Los Angeles, CA

BASED ON ALL TABLET OWNERS AND THOSE WHO HAVE TABLETS IN HH [N=2806]:

IJ NI ITI E- D] SiTf AÌTI E Si G OVER N M E-NiTf MEMORANDUM!

News English.com Ready-to-Use English Lessons by Sean Banville

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD. Recommendations Assessment Report

National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments

CRS Report for Congress

Liberty s briefing on Part 5 of the Investigatory Powers Bill for Committee Stage in the House of Commons

Now in E!ect: Louisiana Medical Marijuana Law Shields Patients and Caregivers from Prosecution

Case 2:15-cv PA-AJW Document 1 Filed 01/02/15 Page 1 of 11 Page ID #:1 UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. Deadline.

Spring MUN United Nations Human Rights Council (UNHRC)

On Dec 20, 2017, at 3:17 PM, Lee S Gliddon Jr wrote: POSTED

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire

Student Worksheet Manning Case Challenges Definition of Whistleblower

Investigatory Powers Bill. How to make it fit-for-purpose

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Case3:13-cv JSW Document88 Filed03/10/14 Page1 of 4

February 8, The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515

Calif. Privacy Act Will Increase Data Breach Liability

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Submission to the Joint Committee on the draft Investigatory Powers Bill

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

The Investigatory Powers Bill recommendations for the Labour Party. March 2016

tinitrd~tat s~fnatf WASHINGTON, DC 20510

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. Plaintiff,

United States District Court

OFFICE OF THE CITY ATTORNEY

Fear of Online Crime: Americans support FBI interception of criminal suspects and new laws to protect online privacy

1900 M Street, NW, Ste. 250, Washington, D.C

Remarks on United States Signals Intelligence and Electronic Surveillance Programs

Next- Generation National Security and Public Safety in Europe


1 PEW RESEARCH CENTER

The Politics of Privacy and Technology: Fighting an Uphill Battle. Eric Fulton, CEO SubSector Solutions Daniel Zolnikov, MT House Representative

Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1. before the House Permanent Select Committee on Intelligence

RUSSIAN HACKERS!: AN ANALYSIS OF THE THIRD CIRCUIT S IN RE HORIZON HEALTHCARE SERVICES INC. DATA BREACH LITIGATION RULING

TOP SECRET!/COMOO'//NO.i'ORN

Surveillance and Privacy in Indonesia

The Breach : Inside The Impeachment And Trial Of William Jefferson Clinton By Peter Baker

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

The Political Assassination of Michael Flynn

Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes?

6339/18 MK/sl 1 DGD 2 LIMITE EN

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

Benjamin, William Partner 6/23/2015 $2, Hillary Clinton USA Federal. Federal Smith, Michael Partner 6/21/2015 $1,500.

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas

STATEMENT ON THE NATIONAL SECURITY AGENCY S DOMESTIC SURVEILLANCE PROGRAM

Obama immigration plan favors Filipinos. Written by Administrator PRESIDENT OBAMA

IN SUPERIOR COURT OF THE STATE OF ARIZONA IN AND FOR THE COUNTY OF MARICOPA. Plaintiff, Defendant.

Cyber Crime and Cyber Security Data Protection Implications and Financial Regulation Expectations

Dear Members of the Judiciary Committee:

Transcription:

GOVERNMENT HACKING BIBLIOGRAPHY Major Announcements, Statements, General News Coverage Rule 41 has Silicon Valley, FBI Arguing Again Over Hacking Powers Sean Sposito, San Francisco Chronicle, June 27, 2016 http://www.sfchronicle.com/business/article/rule-41-has-silicon-valley-fbi-arguing-again- 8324318.php DOJ's Refusal to Expose Software Hack Complicates Child Porn Cases Gene Johnson, The Seattle Times, June 24, 2016 http://www.seattletimes.com/seattle-news/dojs-refusal-to-expose-software-hack-complicateschild-porn-cases/ FBI's Use of Tor Exploit Is Like Peering Through "Broken Blinds" Cyrus Farivar, Ars Technica, June 24, 2016 http://arstechnica.com/tech-policy/2016/06/fbis-use-of-tor-exploit-is-like-peering-through-brokenblinds/ Judge: FBI Didn't Need Warrant to Hack Child Porn Suspect's Computer Katie Bo Williams, The Hill, June 24, 2016 http://thehill.com/policy/cybersecurity/284772-federal-judge-fbi-didnt-need-warrant-to-hack-childporn-suspects The FBI Is Classifying Its Tor Browser Exploit Because 'National Security' Joseph Cox, Motherboard, June 24, 2016 http://motherboard.vice.com/read/the-fbi-is-classifying-its-tor-browser-exploit FBI Did Not Need Warrant to Hack Child Porn Suspect's Computer -Court Nate Raymond, Reuters, June 23 http://www.reuters.com/article/us-usa-cyber-searchwarrant-iduskcn0z92oy Google, Privacy Groups Urge Congress Not to Expand Federal Hacking Power Joshua Eaton, Christian Science Monitor, June 22, 2016 http://www.csmonitor.com/world/passcode/2016/0622/google-privacy-groups-urge-congressnot-to-expand-federal-hacking-power OTI Joins over 45 Groups & Companies for Day of Action to Say No to Rule 41 Changes Robyn Greene, New America s Open Technology Institute, June 21, 2016 https://www.newamerica.org/oti/blog/oti-joins-over-45-groups-companies-day-action-say-norule-41-changes/ Morning Cybersecurity: Rules of Engagement Tim Starks, Politico, June 20, 2016

http://www.politico.com/tipsheets/morning-cybersecurity/2016/06/export-controls-oncybersecurity-products-back-on-the-agenda-214908 Tor Is Teaming up with Researchers to Protect Users from FBI Hacking Joshua Kopstein, Motherboard, June 19, 2016 http://motherboard.vice.com/read/tor-is-teaming-up-with-researchers-to-protect-users-from-fbihacking Ex-White House Officials Criticize Vague Rules around Disclosure of Hacking Tools Jenna McLaughlin, The Intercept, June 17, 2016 https://theintercept.com/2016/06/17/ex-white-house-officials-criticize-vague-rules-arounddisclosure-of-hacking-tools/ Morning Cybersecurity: A Vulnerable Process Tim Starks, Politico, June 17, 2016 http://www.politico.com/tipsheets/morning-cybersecurity/2016/06/surveillance-voteforeshadows-bigger-fight-ahead-214881 Overnight Cybersecurity: House Votes down Surveillance Reform Effort Katie Bo Williams and Joe Uchill, The Hill, June 16, 2016 http://thehill.com/policy/cybersecurity/overnights/283817-overnight-cybersecurity-house-votesdown-surveillance-reform-effort The FBI Needs Better Hackers to Solve Encryption Standoff, Research Says Joshua Eaton, The Christian Science Monitor, June 16, 2016 http://www.csmonitor.com/world/passcode/2016/0616/the-fbi-needs-better-hackers-to-solveencryption-standoff-research-says House to Vote on Curbing NSA Surveillance in Wake of Orlando Billy House, Bloomberg, June 15, 2016 http://www.bloomberg.com/politics/articles/2016-06-15/house-to-vote-on-limiting-nsasurveillance-in-wake-of-orlando NSA Couldn't Hack San Bernardino iphone, Official Say Joseph Cox, Motherboard, June 10, 2016 http://motherboard.vice.com/en_ca/read/iphone-san-bernardino-nsa-hack Software as Weaponry in a Computer-Connected World Nicole Perlroth, The New York Times, June 7, 2016 http://www.nytimes.com/2016/06/09/technology/software-as-weaponry-in-a-computerconnected-world.html?ref=technology FBI: Our Malware Sends Unencrypted Evidence, and That's a Good Thing

Joshua Kopstein, Motherboard, June 5, 2016 http://motherboard.vice.com/read/fbi-our-malwaresends-unencrypted-evidence-and-thats-a-good-thing FBI: Exploit That Revealed Tor-Enabled Child Porn Users Wasn't Malware Cyrus Farivar, Ars Technica, June 4, 2016 http://arstechnica.com/tech-policy/2016/06/fbi-exploit-that-revealed-tor-enabled-child-pornusers-wasnt-malware/ Congress Must Pass the Stopping Mass Hacking Act Robyn Greene, New America s Open Technology Institute, June 1, 2016 https://www.newamerica.org/oti/blog/congress-must-pass-stopping-mass-hacking-act/ Ron Wyden Q&A Tim Starks, Politico, May 31, 2016 http://www.politico.com/tipsheets/morning-cybersecurity/2016/05/ron-wyden-q-a-stolenpassword-news-for-tumblr-myspace-cybercrime-technique-is-hitting-businesses-hard-214556 A Judge Just Made It Harder for the FBI to Use Hacking Joseph Cox, Motherboard, May 25, 2016 http://motherboard.vice.com/read/playpen-tor-browser-exploit Once More, a Judge Rules against Gov't in Tor-Enabled Child Porn Case Cyrus Farivar, Ars Technica, May 25, 2016 http://arstechnica.com/tech-policy/2016/05/once-more-a-judge-rules-against-govt-in-torenabled-child-porn-case/ Senate Panel Advances Spy Policy Bill, after House Approves Its Own Version Julian Hattem, The Hill, May 24, 2016 http://thehill.com/policy/national-security/281136-senate-panel-advances-spy-policy-bill-afterhouse-approves-its-own Pressure Mounts on FBI to Reveal Tor Browser Exploit Joseph Cox, Motherboard, May 24, 2016 http://motherboard.vice.com/read/pressure-mounts-on-fbi-to-reveal-tor-browser-exploit-playpen House to Offer Bill Blocking Government Hacking Powers Katie Bo Williams, The Hill, May 24, 2016 http://thehill.com/policy/cybersecurity/281066-house-to-offer-bill-blocking-government-hackingpowers It's Not 'Malware' When We Have a Warrant, FBI Says Joshua Kopstein, Motherboard, May 22, 2016 http://motherboard.vice.com/read/its-not-malware-when-we-have-a-warrant-fbi-says

Senators Put Forward New Bill to Halt Expansion of Gov't Hacking Powers Cyrus Farivar, Ars Technica, May 19, 2016 http://arstechnica.com/tech-policy/2016/05/senators-put-forward-new-bill-to-halt-expansion-ofgovt-hacking-powers/ Dem Introduces Bill to Block New Government Hacking Powers Katie Bo Williams, The Hill, May 19, 2016 http://thehill.com/policy/cybersecurity/280568-wyden-introduces-bill-to-block-expandedgovernment-hacking-powers How a Child Porn Case Became a Battle Over Government Secrets Joseph Cox, Motherboard, May 19, 2016 http://motherboard.vice.com/read/how-a-child-porn-case-became-a-battle-over-governmentsecrets-playpen-hack Judge Says Suspect Has Right to Review Code That FBI Has Right to Keep Secret Cyrus Farivar, Ars Technica, May 19, 2016 http://arstechnica.com/tech-policy/2016/05/judge-says-suspect-has-right-to-review-code-that-fbihas-right-to-keep-secret/ New Bill Aims to Stop Judges from Authorizing Mass Hacking Joseph Cox, Motherboard, May 19, 2016 http://motherboard.vice.com/read/stop-mass-hacking Second Republican Joins Push to Block Federal Hacking Powers Katie Bo Williams, The Hill, May 18, 2016 http://thehill.com/policy/cybersecurity/280325-daines-to-join-dem-bill-on-government-hacking Court Docs Confirm FBI's Child Porn Hack Was International Joseph Cox, Motherboard, May 17, 2016 http://motherboard.vice.com/read/court-docs-confirm-fbis-child-porn-hack-was-international Judge Won't Force Government to Disclose Vulnerability to Mozilla Mario Trujillo, The Hill, May 17, 2016 http://thehill.com/policy/technology/280139-judge-wont-force-government-to-disclosevulnerability-to-mozilla An Admin's Foolish Errors Helped the FBI Unmask Child Porn Site 'Playpen' Joseph Cox, Motherboard, May 16, 2016 http://motherboard.vice.com/read/an-admins-foolish-errors-helped-the-fbi-unmask-child-pornsite-playpen Week Ahead: Feds' Hacking Powers under Scrutiny Katie Bo Williams, The Hill, May 16, 2016

http://thehill.com/policy/cybersecurity/279871-week-ahead-feds-hacking-powers-under-scrutiny Everything We Know about How the FBI Hacks Kim Zetter, Wired, May 15, 2016 https://www.wired.com/2016/05/history-fbis-hacking/ Judge Changes Mind, Says FBI Doesn't Have to Reveal Tor Browser Hack Joseph Cox, Motherboard, May 13, 2016 http://motherboard.vice.com/read/judge-changes-mind-says-fbi-doesnt-have-to-reveal-torbrowser-hack Mozilla Wants Heads-Up from FBI on Tor Browser Hack Dan Froomkin, The Intercept, May 12, 2016 https://theintercept.com/2016/05/12/mozilla-wants-heads-up-from-fbi-on-tor-browser-hack/ FBI Head Expects More Government Litigation over Locked Phones Katie Bo Williams, The Hill, May 12, 2016 http://thehill.com/policy/cybersecurity/279646-comey-expects-more-government-litigation-overlocked-phones Mozilla Urges FBI to Disclose Potential Firefox Security Vulnerability Joseph Cox, Motherboard, May 12, 2016 http://motherboard.vice.com/read/mozilla-urges-fbi-to-disclose-firefox-security-vulnerability Mozilla Enters Court Fight over FBI Hacking Technique Mario Trujillo, The Hill, May 12, 2016 http://thehill.com/policy/technology/279676-mozilla-enters-court-fight-to-press-fbi-to-disclosehacking-technique Senator Rand Paul to Back Bill Blocking FBI Hacking Expansion Dustin Volz, Reuters, May 12, 2016 http://www.reuters.com/article/us-usa-cyber-warrants-iduskcn0y32yc Congress Can Put iphones Back within Reach of Law Enforcement Cyrus R. Vance Jr., Jackie Lacey and Bonnie Dumanis, Los Angeles Times, May 11, 2016 http://www.latimes.com/opinion/op-ed/la-oe-vance-congress-act-on-iphones-20160511- story.html Week Ahead: Senate Fight Brews over Feds' Hacking Powers Katie Bo Williams, The Hill, May 9, 2016 http://thehill.com/policy/cybersecurity/279015-week-ahead-senate-fight-brews-over-fedshacking-powers Lawyer Scrambles to Withdraw Plea after FBI Mass Hacking Case Collapses

Joseph Cox, Motherboard, May 6, 2016 http://motherboard.vice.com/read/playpen-hack-fbi-child-pornography-investigation LAPD Used 'Expert' to Hack into iphone of Actor's Slain Wife Katie Bo Williams, The Hill, May 6, 2016 http://thehill.com/policy/cybersecurity/278990-lapd-used-expert-to-hack-into-iphone-of-actorsslain-wife New Rule Allows Feds to Hack Millions of Computers More Easily Erin Kelly, USA Today, May 6, 2016 http://www.usatoday.com/story/news/politics/2016/05/05/new-rule-allows-feds-hack-millionscomputers-more-easily/83832690/ DOJ: Wyden Misunderstanding Law in Fight over Secret Cyber Memo Julian Hattem, The Hill, May, 6, 2016 http://thehill.com/policy/national-security/278979-doj-hits-senate-dem-in-standoff-over-secretcyber-memo LAPD Hacked into iphone of Slain Wife of 'Shield' Actor, Documents Show Matt Hamilton and Richard Winton, Los Angeles Times, May 5, 2016 http://www.latimes.com/local/lanow/la-me-ln-lapd-locked-iphone-actor-wife-michael-jace- 20160504-story.html So Now the Government Wants to Hack Cybercrime Victims Kim Zetter, Wired, May 4, 2016 https://www.wired.com/2016/05/now-government-wants-hack-cybercrime-victims/ Wyden to Introduce Bill Fighting New Fed Hacking Powers Katie Bo Williams, The Hill, May 4, 2016 http://thehill.com/policy/cybersecurity/278722-wyden-set-to-introduce-bill-fighting-new-fedhacking-powers Secret US Spy Court Approved Every Surveillance Request in 2015 David Kraveta, Ars Technica, May 2, 2016 http://arstechnica.com/tech-policy/2016/05/secret-us-spy-court-approved-every-surveillancerequest-in-2015/ US Foreign Intelligence Court Did Not Deny Any Surveillance Requests Last Year Reuters, The Guardian, April 30, 2016 http://www.theguardian.com/law/2016/apr/30/fisa-court-foreign-intelligence-surveillance-fbi-nsaapplications Can Courts Order You to Provide a Fingerprint So the Cops Can Unlock Your Phone? Matt Hamilton and Richard Winton, Los Angeles Times, April 30, 2016

http://www.latimes.com/nation/ct-iphone-fingerprint-encryption-battle-20160430-story.html Supreme Court Grants FBI Massive Expansion of Powers to Hack Computers Danny Yadron, The Guardian, April 29, 2016 https://www.theguardian.com/technology/2016/apr/29/fbi-hacking-computers-warrants-supremecourt-congress Overnight Cybersecurity: Fight over Feds' Hacking Powers Moves to Congress Cory Bennett, The Hill, April 28, 2016 http://thehill.com/policy/cybersecurity/overnights/278095-overnight-cybersecurity-doj-hackingrequest-moves-to-congress FBI Computer Searches Expanded under New U.S. Supreme Court Rule Chris Strohm, Bloomberg, April 28, 2016 http://www.bloomberg.com/politics/articles/2016-04-28/fbi-computer-searches-expanded-undernew-u-s-supreme-court-rule Supreme Court Gives FBI More Hacking Power Jenna McLaughlin, The Intercept, April 28, 2016 https://theintercept.com/2016/04/28/supreme-court-gives-fbi-more-hacking-power/ FBI Confirms It Won't Tell Apple How It Hacked San Bernardino Shooter's iphone Danny Yadron, The Guardian, April 28, 2016 https://www.theguardian.com/technology/2016/apr/27/fbi-apple-iphone-secret-hack-sanbernardino With Finality, F.B.I. Opts Not to Share iphone-unlocking Method Eric Lightblau and Katie Benner, New York Times, April 27, 2016 http://www.nytimes.com/2016/04/28/technology/with-finality-fbi-opts-not-to-share-iphoneunlocking-method.html FBI Makes Official Its Decision to Keep Apple iphone Hack Secret Chris Strohm, Bloomberg, April 27, 2016 http://www.bloomberg.com/politics/articles/2016-04-27/fbi-makes-official-its-decision-to-keepapple-iphone-hack-secret FBI Decides against Taking Steps to Tell Apple about iphone-hacking Method Devlin Barrett, Wall Street Journal, April 27, 2016 http://www.wsj.com/articles/fbi-decides-against-taking-steps-to-tell-apple-about-iphone-hackingmethod-1461791007 FBI Says It Won't Tell Apple How Hackers Got into Terrorist's iphone Because It Doesn't Know Del Quentin Wilber, Los Angeles Times, April 27, 2016

http://www.latimes.com/business/technology/la-fi-fbi-iphone-hack-20160427-snap-story.html How the FBI's Approach to Hacking Affects the Future of Vulnerabilities Research Andi Wilson, New America s Open Technology Institute, April 26, 2016 https://www.newamerica.org/oti/blog/how-fbis-approach-hacking-affects-future-vulnerabilitiesresearch/