Jonathan Zdziarski, a forensic scientist and researcher who has worked extensively with law enforcement and intelligence agencies, has spent quite a bit of time looking at the capabilities and services available in iOS for data acquisition and found that some of the services have no real reason to be on these devices and that several have the ability to bypass the iOS backup encryption. One of the services in iOS, called mobile file_relay, can be accessed remotely or through a USB connection can be used to bypass the backup encryption. If the device has not been rebooted since the last time the user entered the PIN, all of the data encrypted via data protection can be accessed, whether by an attacker or law enforcement, Zdziarski said. Update: 07/21 22:15 GMT by U L : Slides.
The 76 new pages of data, covering 2005 through 2013, show that CBP retains massive amounts of data on us when we travel internationally. My own PNRs include not just every mailing address, e-mail, and phone number I've ever used; some of them also contain: The IP address that I used to buy the ticket, my credit card number (in full), the language I used, and notes on my phone calls to airlines, even for something as minor as a seat change.
At issue is a 1977 rule that limits the total whole-body radiation dose to any member of the public from the normal operation of the uranium fuel cycle—fuel processing, reactors, storage, reprocessing or disposal—to 0.25 millisieverts per year. (This rule, known as 40 CFR part 190, is different from other EPA regulations that restrict radionuclides in drinking water and that limit public exposure during emergencies. Those are also due for revision.) "We have not made any decisions or determined any specifics on how to move forward with any of these issues. We do, however, believe the regulation uses outdated science, and we are thinking about how to bring the regulation more in line with current thinking," said Brian Littleton, a chemical engineer with EPA's Office of Radiation and Indoor Air."