. 24/7 Space News .
CYBER WARS
Apple-FBI case has wide implications
By Rob Lever
Washington (AFP) Feb 28, 2016


Apple and the US government are squaring off in an epic legal battle with wide-ranging implications for how technology firms must work with law enforcement.

The iPhone maker is being asked to provide "reasonable assistance" to the investigation of the last year's deadly San Bernardino attacks by disabling security preventing the FBI from accessing the encrypted handset of one of the shooters.

The highly charged case has created a sharp divide among those who say that users of devices like smartphones should be able to keep information private through encryption, and others who claim legitimate law enforcement investigations should take precedence when courts approve.

Apple is challenging the California court order, saying the type of cooperation sought would undermine basic principles of data security and open new vulnerabilities for all its users.

The government is asking for the creation of software that doesn't exist, an abuse of the law and violation of the company's constitutional rights, Apple says.

It adds that creating a weaker "government OS" would undermine the encryption Apple and others have been introducing, and ultimately leak out to hackers and foreign governments.

"Apple wants to maintain the trust relationship with its customers, they feel deeply and firmly this is something that has to exist, and that no government should have access to this data," said John Dickson of the Texas-based Denim Group, which manages security and encryption for its customers.

"I anticipate there will be a technical response form Apple, so that it will be nearly impossible for them to be compelled to do anything."

Julian Sanchez of the libertarian Cato Institute says in a blog post the case is "a fight over the future of high-tech surveillance, the trust infrastructure undergirding the global software ecosystem, and how far technology companies and software developers can be conscripted as unwilling suppliers of hacking tools for governments."

- Life, death and encryption -

Some say Apple's position is based on a core principle about security of its users' data.

"Lack of privacy can be a matter of life and death or imprisonment," said Jon Hanour, chief executive of California startup USMobile, which makes an application for encrypted mobile messaging.

"Apostasy results in a death in Saudi Arabia. Homosexual acts send people to prison in Pakistan. And in many countries, adultery is punishable by lashing and stoning."

But critics say Apple is simply providing an easy way for criminals and others to operate in the shadows.

Allowing Apple to refuse would "thwart the public interest in a full and complete investigation of a horrific act of terrorism," the Justice Department argued in its court motion.

New York County District Attorney Cy Vance, who has complained that encrypted phones have frustrated many investigations, said Apple and other makers of encryption should not be able to help skirt law enforcement.

"Apple and Google have created the first warrant-proof consumer products in American history, and the result is that crimes are going unsolved and victims are being left beyond the protection of the law," he said in a statement.

Apple argues that being forced to comply would set a dangerous precedent allowing broad access to law enforcement.

"Once the floodgates open, they cannot be closed, and the device security that Apple has worked so tirelessly to achieve will be unwound," Apple argued.

But James Lewis, a former US official who is now a senior fellow at the Center for Strategic and International Studies, said there is nothing unusual about the case.

"The court decided this was a reasonable request," Lewis told AFP.

"The privacy people say it will set a precedent and it will be the end of life on this planet, and it's not true."

Computer forensics researcher Jonathan Zdziarski said complying would be more complex than it appears.

In a blog post, he notes that Apple would need to develop a tool to produce "reproducible, predictable results," which "must be forensically sound and not change anything on the target."

Additionally, he said that Apple "must be prepared to defend their tool and methodology in court... What FBI has requested will inevitably force Apple's methods out into the open."

- The China question -

Apple backers say weakening encryption will work against American interests by compromising security for users living under repressive regimes.

"Authoritarian regimes around the world are salivating at the prospect of the FBI winning this order," Nate Cardozo of the Electronic Frontier Foundation told PBS.

"If Apple creates the master key that the FBI has demanded that they created, governments around the world are going to be demanding the same access."

But Apple's critics say the company may already assist the Chinese government with modifications of the iPhone for that market and cloud computing center hosted in China.

Stewart Baker, a former Homeland Security official who is now in law practice in Washington, said Apple's lack of transparency in China raises questions.

"Maybe you can explain why a secret encryption system that everyone suspects of having a real back door is good enough for Apple's customers in China?" Baker says in a blog post.

- Snowden impact -

Some analysts say the conflict stems from revelations about widespread government surveillance by former intelligence contractor Edward Snowden.

"The Snowden disclosures revealed that many government agencies conduct extensive surveillance on citizens, which arguably not only undermine our privacy but compromise our entire information security infrastructure," says Rahul Telang, professor of information systems at Carnegie Mellon University.

Telang said it is a difficult issue to resolve but that he sees the privacy argument as likely to win.

"Now that we know about government snooping, there is a trust issue," he said. "Once we give you backdoor access, where will it stop?"

rl/ch

APPLE INC.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Pentagon boosts spending to fight cyber attacks
Washington (AFP) Feb 25, 2016
The Pentagon plans to spend an additional $900 million in the coming year to boost cyber defense measures, Defense Secretary Ashton Carter said Thursday. US officials are still reeling from last year's revelation that personal data from some 20 million federal employees, contractors and others had been hacked in a massive breach at the Office of Personnel Management. The military worries ... read more


CYBER WARS
NASA releases strange 'music' heard by 1969 astronauts

NASA chooses ASU to design and operate special satellite

Chinese scientists invent leak detection system for moon exploration

Aldrin recounts successes and challenges of historic space journey

CYBER WARS
Jarosite in the Noctis Labyrinthus Region of Mars

Trace Gas Orbiter and Schiaparelli are joined

Footprints of a martian flood

Russia plans return to Mars, Moon despite money woes

CYBER WARS
Orion Simulations Help Engineers Evaluate Mission Operations for Crew

NASA Space Program Now Requires Russian Language

India plans to launch 60 space missions in 5 years

Alpha Centauri: Our First Target for Interstellar Probes

CYBER WARS
China's moon lander Chang'e-3 enters 28th lunar day

Staying Alive on Tiangong 2

China Conducts Final Tests on Most Powerful Homegrown Rocket

Last Launch for Long March 2F/G

CYBER WARS
Scott Kelly returns to earth, but science for NASA's journey to Mars continues

Orbital ATK Completes OA-4 Cargo Delivery Mission to ISS for NASA

Send your computer code into space with astronaut Tim Peake

Black Mold Found in Cargo Prepared for ISS, Resupply Mission Delayed

CYBER WARS
SpaceX postpones rocket launch again

Russian rocket engines ban could leave US space program in limbo

SpaceX warns of failure in Wednesday's rocket landing

Launcher and satellite preparations continue for Ariane 5's mission with EUTELSAT 65 West A

CYBER WARS
Imaging technique may help discover Earth-like planets

Longest-Lasting Stellar Eclipse Discovered

Astronomers take images of an exoplanet changing over time

First detection of super-earth atmosphere

CYBER WARS
Romania orders Lockheed Martin radar systems

Russian Space Intelligence Center to Receive New Radars

Chinese firm abandons acquisition over US scrutiny

Marines order more simulated training systems









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.