<html><head></head><body><div style="color:#000; background-color:#fff; font-family:lucida console, sans-serif;font-size:13px"><div id="yui_3_16_0_1_1453482723204_10521">During a recent debate, there were several questions about emails and privacy and terrorism. The candidates all said something like, "We have to work with Silicon Valley to find ways to monitor terrorists while protecting privacy."</div><div id="yui_3_16_0_1_1453482723204_10522"><br></div><div dir="ltr" id="yui_3_16_0_1_1453482723204_10523">IMHO, the ideal solution is not possible. If a cell-phone has encryption software, and the manufacturer does not know the key and does not provide a "back-door", privacy is reasonably assured. <br></div><div id="yui_3_16_0_1_1453482723204_10569" dir="ltr"><br></div><div id="yui_3_16_0_1_1453482723204_10570" dir="ltr">If the phone has a known way to "pick the lock", then any agency with appropriate resources can open the door. Obviously agencies outside the US won't even consider getting a court order.<br></div><div id="yui_3_16_0_1_1453482723204_10524"><br></div><div id="yui_3_16_0_1_1453482723204_10640">Phone companies have always kept records of what number called what number. <br></div><div id="yui_3_16_0_1_1453482723204_10686"><br></div><div>What am I missing?<br></div></div></body></html>