What is the functional difference between ordering Apple to break its encryption, and ordering Apple to bypass its security so the FBI can break the encryption?
Editor's note · Context
Conyers seeks clarity on the FBI's demands from Apple regarding encryption.
Share & report
More from John Conyers
Mr. Chairman, I yield myself such time as I may consume. Mr. Chairman, I am very pleased to be here to support--well, I don't think it is going to be support. It is really more in opposition to this so-called Sunshine for Regulations and…
Madam Speaker, how much time remains on each side? The SPEAKER pro tempore. The gentleman from Michigan has 11\1/2\ minutes remaining and the gentlewoman from Georgia has 10\1/2\ minutes remaining.
Mr. Chairman, I yield 3 minutes to the gentlewoman from Texas (Ms. Jackson Lee), the ranking member of the Crime, Terrorism, Homeland Security, and Investigations Subcommittee of the Judiciary Committee.
Madam Speaker, I yield 1\1/2\ minutes to the gentleman from New York (Mr. Nadler), a senior member of the Judiciary Committee.





