{"page":"\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/resources-c03aa079.css\" /\u003e\n\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/lp_boclips_stylesheets-517835be.css\" media=\"all\" /\u003e\n\u003cdiv data-title='FBI, Apple Square Off Over Encryption at Hearing' data-url='/boclips/videos/5c54cae0d8eafeecae19f922' data-video-url='/boclips/videos/5c54cae0d8eafeecae19f922' id='bo_player_modal'\u003e\n\u003cdiv class='boclips-resource-page modal-dialog panel-container'\u003e\n\u003cdiv class='react-notifications-root'\u003e\u003c/div\u003e\n\u003cdiv class='rp-header'\u003e\n\u003cdiv class='rp-type'\u003e\n\u003ci aria-hidden='true' class='fai fa-regular fa-circle-play'\u003e\u003c/i\u003e\nVideo\n\u003c/div\u003e\n\u003ch1 class='rp-title' id='video-title'\u003e\nFBI, Apple Square Off Over Encryption at Hearing\n\u003c/h1\u003e\n\u003cdiv class='rp-actions'\u003e\n\u003cdiv class='mr-1'\u003e\n\u003ca class=\"btn btn-success\" data-posthog-event=\"Signup: LP Signup Activity\" data-posthog-location=\"body_link_boclips\" data-remote=\"true\" href=\"/subscription/new\"\u003e\u003cspan\u003e\u003cspan\u003eGet Free Access\u003c/span\u003e\u003cspan class=\"\"\u003e for 10 Days\u003c/span\u003e\u003cspan\u003e!\u003c/span\u003e\u003c/span\u003e\u003c/a\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-body'\u003e\n\u003cdiv class='rp-info'\u003e\n\u003cdiv aria-label='Hide resource details' class='rp-hide-info' role='button' tabindex='0'\u003e\u0026times;\u003c/div\u003e\n\u003ci aria-label='Expand resource details' class='rp-expand-info fai fa-solid fa-up-right-and-down-left-from-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003ci aria-label='Compress resource details' class='rp-compress-info fai fa-solid fa-down-left-and-up-right-to-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003cdiv class='rp-rating'\u003e\n\u003cspan class='resource-pool'\u003e\n\u003cspan class='pool-label'\u003ePublisher:\u003c/span\u003e\n\u003cspan class='pool-name'\u003e\n\u003cspan class='text'\u003e\u003ca data-publisher-id=\"30356011\" href=\"/search?publisher_ids%5B%5D=30356011\"\u003eCurated Video\u003c/a\u003e\u003c/span\u003e\n\u003c/span\u003e\n\u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-description'\u003e\n\u003cspan class='short-description'\u003eA senior FBI official says she doesn't think hiring third-parties to help the FBI hack into locked iPhones should be the solution.Amy Hess is executive assistant director of the FBI's science and technology and branch, which oversees the...\u003c/span\u003e\n\u003cspan class='full-description hide'\u003eA senior FBI official says she doesn't think hiring third-parties to help the FBI hack into locked iPhones should be the solution.Amy Hess is executive assistant director of the FBI's science and technology and branch, which oversees the use of surveillance technologies.She was asked at a House subcommittee hearing Tuesday about the Justice Department's decision to use an unidentified third-party to break into a phone used by one of the San Bernardino attackers.She says those kinds of decisions are made on a case-by-case basis, but that relying outside entities to exploit vulnerabilities isn't the solution.Meanwhile, Apple's general counsel Bruce Sewell argued that Apple believes strong encryption is the best way to maintain the safety and privacy of its users.Sewell testified on the events surrounding Apple's argument to the FBI and law enforcement officials against hacking into the cell phone of the San Bernardino attackers.Sewell said Apple has yet to discover a way in which the tech-giant can get access into a phone and then maintain that access in perpetuity.Sewell added that there is no way to allow for a 'back door' entry into a phone without 'endangering and undermining' the entire encryption infrastructure. A senior FBI official says she doesn't think hiring third-parties to help the FBI hack into locked iPhones should be the solution.Amy Hess is executive assistant director of the FBI's science and technology and branch, which oversees the use of surveillance technologies.She was asked at a House subcommittee hearing Tuesday about the Justice Department's decision to use an unidentified third-party to break into a phone used by one of the San Bernardino attackers.She says those kinds of decisions are made on a case-by-case basis, but that relying outside entities to exploit vulnerabilities isn't the solution.Meanwhile, Apple's general counsel Bruce Sewell argued that Apple believes strong encryption is the best way to maintain the safety and privacy of its users.Sewell testified on the events surrounding Apple's argument to the FBI and law enforcement officials against hacking into the cell phone of the San Bernardino attackers.Sewell said Apple has yet to discover a way in which the tech-giant can get access into a phone and then maintain that access in perpetuity.Sewell added that there is no way to allow for a 'back door' entry into a phone without 'endangering and undermining' the entire encryption infrastructure. Washington - 19 April 20161. Various of panel swearing in2. SOUNDBITE (English) Amy Hess, Executive Assistant Director, Science and Technology, Federal Bureau of Investigation:\"Since our nation's inception, we've had a reasonable expectation of privacy. This means that only with probable cause and a court order can law enforcement listen to an individual's private conversations or enter their private spaces. But when changes in technology hinder or prohibit our ability to use authorized investigative tools and follow critical leads, we may not be able to root out the child predators hiding in the shadows or violent criminals who are targeting our neighbourhoods. We may not be able to identify and stop terrorists who are using today's communication platforms to plan and execute attacks in our country. So we are in this quandary, trying to maximize security as we move into a world where increasingly information is beyond the reach of judicial authority and trying to maximize privacy in this era of rapid technological advancement. Finding the right balance is a complex endeavor and it should not be left solely to corporations or to the FBI to solve. It must be publicly debated and deliberated, the American people should decide how we want to govern ourselves in today's world.\"3. Cutaway 4. SOUNDBITE (English) Rep. Diana DeGette, (D) Colorado:\"Like in the San Bernardino case, the FBI hired a third-party to help them break the code in that phone and that was what we call grey hats, people who are sort of in this murky market, what do you think of that suggestion Ms. Hess?\"SOUNDBITE (English) Amy Hess, Executive Assistant Director, Science and Technology, Federal Bureau of Investigation:\"Yes Ma'am, that certainly is one potential solution, but that takes me back to my prior answer which is these solutions are very case by case specific, they may not work in all instances, they're very dependent upon the fragility of the systems or bull and bullies we might find and also they're very time sensitive and resource intensive which may not be scalable to enable us to be successful in our investigation.\"SOUNDBITE (English) Rep. Diana DeGette, (D) Colorado:\"You think there's any ethical issue with using these third party hackers to do this?\"SOUNDBITE (English) Amy Hess, Executive Assistant Director, Science and Technology, Federal Bureau of Investigation:\"I think that certainly there are vulnerabilities that we should review to make sure that we identify the risks and benefits of being able to exploit those vulnerabilities in a greater setting.\"SOUNDBITE (English) Rep. Diana DeGette, (D) Colorado:\"I understand you're doing it because you have to in certain cases, do you think it's a good policy to follow?\"SOUNDBITE (English) Amy Hess, Executive Assistant Director, Science and Technology, Federal Bureau of Investigation:\"I do not think that that should be the solution.\" 5. Cutaway6. SOUNDBITE (English) Bruce Sewell, General Counsel for Apple, Senior Vice President of Legal and Government Affairs:\"We haven't figured out a way that we can create an access point and then create a set of locks that are reliable to protect access through that access point, that's what we struggle with. We can create an access point and we can create locks, but the problem is the keys to that lock will ultimately be available somewhere and if they're available anywhere, they can be accessed by both good guys and bad guys.\" 7. Cutaway8. SOUNDBITE (English) Bruce Sewell, General Counsel for Apple, Senior Vice President of Legal and Government Affairs:\"If you allow third-party access, you have to give the third part a portal in which to exercise that access. This is fundamentally the definition of a  back door or a swinging door as you very aptly described it. There is no way that we know of to create that vulnerability to create that access point and more particularly to maintain it. This was the issue with San Bernardino, was not just give us an access point, but maintain that access point in perpetuity so that we can get in over and over and over again. That for us, we have no way of doing that without undermining and endangering the entire encryption infrastructure. We believe that strong ubiquitous encryption is the best way that we can maintain the safety, security and privacy of all of our users.\" 9. Cutaway \u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='action-container flex justify-between'\u003e\n\u003cbutton aria-expanded='false' aria-label='Read more description' class='rp-full-description' type='button'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\n\u003cspan id='read_more'\u003eRead More\u003c/span\u003e\n\u003c/button\u003e\n\u003cdiv class='rp-report'\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='resource-details-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='resource-details-heading'\u003eResource Details\u003c/h2\u003e\n\u003cdiv class='rp-resource-details clearfix'\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eCurator Rating\u003c/dt\u003e\n\u003cdd\u003e\u003cspan class=\"star-rating\" aria-label=\"3.5 out of 5 stars\" role=\"img\"\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star-half-stroke text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-regular fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt class=\"educator-rating-title\"\u003eEducator Rating\u003c/dt\u003e\u003cdd\u003e\u003cdiv class=\"educator-rating-details\" data-path=\"/educator_ratings/rrp_data?resourceable_id=1091449\u0026amp;resourceable_type=Boclips%3A%3AVideoMetadata\"\u003e\u003cspan class=\"not-yet-rated\"\u003eNot yet Rated\u003c/span\u003e\u003c/div\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eGrade\u003c/dt\u003e\u003cdd title=\"Grade\"\u003eHigher Ed\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSubjects\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=1\u0026amp;subject_ids%5B%5D=1216220\"\u003eAll Subjects\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eMedia Type\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=2\u0026amp;type_ids%5B%5D=4543650\"\u003eNews Clips\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSource:\u003c/dt\u003e\n\u003cdd\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eDate\u003c/dt\u003e\n\u003cdd\u003e2016\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003ci aria-hidden='true' class='fai fa-solid fa-language'\u003e\u003c/i\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eAudiences\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?audience_ids%5B%5D=371079\u0026amp;grade_ids%5B%5D=259\u0026amp;search_tab_id=1\"\u003eFor Teacher Use\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\u003cdd class=\"text-muted\"\u003e\u003ci class=\"fa-solid fa-lock mr5\"\u003e\u003c/i\u003e2 more...\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='concepts-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='concepts-heading'\u003eConcepts\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list concepts' data-identifier='Boclips::VideoDecorator' data-type='concepts'\u003eprivacy, minutes\u003c/div\u003e\n\u003cdiv class='concepts-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='additional-tags-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='additional-tags-heading'\u003eAdditional Tags\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list keyterms' data-identifier='Boclips::VideoDecorator' data-type='keyterms'\u003ehacking, phone, vulnerabilities, political issues, identify, apce-nyc, party, issue, ability, government surveillance, create, government and politics, security, technology issues, follow, maintain, lock, people, give, back, today, case, access point, world, find, make, locks, truth, access, solution, intelligence agencies, san bernardino\u003c/div\u003e\n\u003cdiv class='keyterms-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='educator-ratings-heading' class='rp-info-section'\u003e\n\u003ch2 class='title sr-only' id='educator-ratings-heading'\u003eEducator Ratings\u003c/h2\u003e\n\u003cdiv id=\"educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"all-educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"educator-rating-form-root\"\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-resource'\u003e\n\u003cdiv aria-label='Show resource details' class='rp-show-info' role='button' tabindex='0'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\nShow resource details\n\u003c/div\u003e\n\u003cdiv aria-label='Video player' class='player' id='player-wrapper' role='region'\u003e\n\u003cdiv class='relative container mx-auto' id='lp-boclips-visitor-thumbnail'\u003e\n\u003ca class=\"block\" data-html=\"true\" data-placement=\"bottom\" data-trigger=\"click\" data-content=\"\u003cdiv class=\u0026quot;text-center py-2\u0026quot;\u003e\u003ca class=\u0026quot;bold\u0026quot; href=\u0026quot;/auth/users/sign_in\u0026quot;\u003eSign in\u003c/a\u003e or \u003ca class=\u0026quot;bold text-danger\u0026quot; data-posthog-event=\u0026quot;Signup: LP Signup Activity\u0026quot; data-posthog-location=\u0026quot;body_link_boclips\u0026quot; data-remote=\u0026quot;true\u0026quot; href=\u0026quot;/subscription/new\u0026quot;\u003eJoin Now\u003c/a\u003e\u003c/div\u003e\" data-title=\"Get Full Access\" data-container=\"body\" rel=\"popover\" tabindex=\"0\" aria-label=\"Play video: FBI, Apple Square Off Over Encryption at Hearing\" href=\"/subscription/new\"\u003e\u003cimg class=\"resource-img img-thumbnail img-responsive z-10 lp-boclips-thumbnail w-full h-full lozad\" alt=\"FBI, Apple Square Off Over Encryption at Hearing\" title=\"FBI, Apple Square Off Over Encryption at Hearing\" onError=\"handleImageNotLoadedError(this)\" data-default-image=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" data-src=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" width=\"315\" height=\"220\" src=\"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs\" /\u003e\n\u003cspan aria-hidden='true' class='flex justify-center items-center bg-white rounded-full w-16 h-16 absolute top-1/2 left-1/2 -mt-8 -ml-8 cursor-pointer z-0 border-2 border-primary drop-shadow-md lp-boclips-thumbnail-playBtn'\u003e\n\u003ci class='fa-solid fa-play text-primary text-3xl ml-1 drop-shadow-xl'\u003e\u003c/i\u003e\n\u003c/span\u003e\n\u003c/a\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n"}