Understanding The Challenges Of Strong Encryption: Part 1

Law360, New York (April 10, 2017, 2:37 PM EDT) -- On March 7, 2017, WikiLeaks released some 8,761 confidential documents from the U.S. Central Intelligence Agency. Known as "Vault 7," this leak represented an unprecedented exposure of secret CIA files. The public, late night TV and Twitter chewed over the more salacious details, some of which almost seemed to be tailor-made for jokes (thanks to the CIA, your TV watches you!). Almost buried within the revelations, however, stood a surprising detail. The CIA may have complex malware and hacking tools to infiltrate your smartphones, your networks and, yes, your Samsung TVs, but they have no way to bypass strong encryption....

Stay ahead of the curve

In the legal profession, information is the key to success. You have to know what’s happening with clients, competitors, practice areas, and industries. Law360 provides the intelligence you need to remain an expert and beat the competition.


  • Access to case data within articles (numbers, filings, courts, nature of suit, and more.)
  • Access to attached documents such as briefs, petitions, complaints, decisions, motions, etc.
  • Create custom alerts for specific article and case topics and so much more!

TRY LAW360 FREE FOR SEVEN DAYS

Hello! I'm Law360's automated support bot.

How can I help you today?

For example, you can type:
  • I forgot my password
  • I took a free trial but didn't get a verification email
  • How do I sign up for a newsletter?
Ask a question!