<node id="521791">
  <nid>521791</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1459863453</created>
  <changed>1475896877</changed>
  <title><![CDATA[FBI Offers iPhone Aid to Local Law Enforcement]]></title>
  <body><![CDATA[<p>The FBI announced that it had managed to access data on an iPhone used by the San Bernardino shooter, and now other law enforcement officials want the agency to help them unlock phones in their possession. Law enforcement’s attempts to defeat new security features have drawn criticism — especially if they keep the method to themselves. Georgia Tech's <strong>Peter Swire</strong> served on a White House intelligence review group that recommended the administration disclose most flaws to appropriate parties.</p><p><a href="http://www.sfgate.com/business/article/FBI-offers-iPhone-aid-to-local-law-enforcement-7226875.php" target="_blank">Read More</a></p><p>&nbsp;</p><p>&nbsp;</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2016-04-04T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Law enforcement agencies are asking the FBI to teach them how to unlock the iPhone, which raises new questions about public dsiclosure of a vulnerability.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Law enforcement’s attempts to defeat new security features have drawn criticism — especially if they keep the method to themselves. Georgia Tech's Peter Swire served on a White House intelligence review group that recommended the administration disclose most flaws to appropriate parties.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="232191">
            <nid>232191</nid>
            <type>image</type>
            <title><![CDATA[Professor Peter Swire]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>197584</fid>
                  <filename><![CDATA[peterswire.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/peterswire_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/peterswire_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Professor Peter Swire]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>72451</tid>
        <value><![CDATA[Peter Swire]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
