appledatacenterscompanytechnews100636565orig
Security

5 facts about Apple and the terrorist's iPhone

A great deal of hype and misinformation surrounds the court order requiring Apple to help law enforcement access the iPhone of the deceased San Bernardino terrorist Syed Farook. Some of the misinformation has come from Apple CEO Tim Cook. Some people are claiming that giving in to law enforcement’s demands would be a crippling blow to the privacy of U.S. citizens. Here are five facts to put those fears in perspective:

  1. The FBI wants Apple to write software that bypasses the device-wiping function that activates after 10 wrong passcodes have been entered. This is a security feature designed to protect data when a device is lost or stolen. The FBI wants to be able to enter all possible passcodes on this specific phone.
  2. The FBI wants Apple to digitally sign and install the software. If the software is not digitally signed by Apple, the iPhone won’t accept the update. This is the key element of this case; without Apple’s digital signature, that iPhone will remain locked.
  3. The software never has to leave Apple’s control and can be immediately destroyed after this one use. Apple claims that once the software is created, it is out there. But it could be “out there” only if Apple has reason not to trust itself or the people it would assign to do the work.
  4. Nothing that the FBI has asked for would weaken encryption.
  5. The case does raise the question of when a government can demand that a developer help circumvent security measures. This is a legitimate policy concern, and if the San Bernardino case sets a precedent that leads to frequent demands for such assistance, then there is a greater possibility that the software used might become more easily available.

That the FBI has to recruit Apple’s cooperation is a testament to the strength of Apple’s security measures. Apple’s resistance seems designed to position it as a champion of privacy, but the stance actually downplays the effectiveness of its privacy protections.

Ira Winkler is president of Secure Mentem and author of the book Spies Among Us. He can be contacted through his Web site, securementem.com.

IDG Insider

PREVIOUS ARTICLE

« Google preps Pixel C update with fixes for touchscreen response woes

NEXT ARTICLE

Experts contend Apple has the technical chops to comply with court order »
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

  • Mail

Recommended for You

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends

Training and certification for a cloud native world

Keri Allan looks at the latest trends and technologies

Unicorns are running free in the UK but Brexit poses a tough challenge

Trevor Clawson on the outlook for UK Tech startups

Poll

Do you think your smartphone is making you a workaholic?