Skip to main content

FBI forcing Apple to weaken iOS security could endanger lives, warns UN


The legal tussle between Apple and the FBI over a locked iPhone, and the security weakening measures the security services want the iOS maker to take to help it extract data on the device, has now attracted comment from the UN’s commissioner for human rights.
Representatives for both sides of the Apple vs FBI argument were called to Congress earlier this week to give testimony in a hearing entitled “The Encryption Tightrope: Balancing Americans’ Security and Privacy” — which has led to some bizarre claims from the pro-unlocking camp as they seek to justify forcing Apple to create a less secure version of iOS.
Weighing into the debate today on Apple’s side of the argument, with a robust public statement in support of encryption, the UN’s Zeid Ra’ad Al Hussein argues that privacy is a pre-requisite for security, and calls for clear red lines to protect personal data in the digital age.
The outcome of the Apple vs FBI case could have negative ramifications for the humans rights of people across the world if the FBI prevails in forcing Apple to weaken the security of iOS, he writes, warning that such a step could be “a gift to authoritarian regimes”.
“In order to address a security-related issue related to encryption in one case, the authorities risk unlocking a Pandora’s Box that could have extremely damaging implications for the human rights of many millions of people, including their physical and financial security,” says Al Hussein.
“I recognize this case is far from reaching a conclusion in the US courts, and urge all concerned to look not just at the merits of the case itself but also at its potential wider impact.”
The commissioner argues the case boils down to determining “where a key red line necessary to safeguard all of us from criminals and repression should be set” — countering the notion it is merely about unlocking one iPhone used in a terrorist incident, as the US government has tried to suggest.
“There are many ways to investigate whether or not these killers had accomplices besides forcing Apple to create software to undermine the security features of their own phones,” he writes of the San Bernardino terrorists, one of whom used the phone in question as a work device. “This is not just about one case and one IT company in one country. It will have tremendous ramifications for the future of individuals’ security in a digital world which is increasingly inextricably meshed with the actual world we live in.
It is neither fanciful nor an exaggeration to say that, without encryption tools, lives may be endangered.
“A successful case against Apple in the US will set a precedent that may make it impossible for Apple or any other major international IT company to safeguard their clients’ privacy anywhere in the world. It is potentially a gift to authoritarian regimes, as well as to criminal hackers. There have already been a number of concerted efforts by authorities in other States to force IT and communications companies such as Google and Blackberry to expose their customers to mass surveillance.”
The commissioner goes on to flag up the widespread global use of encryption tools — such as by political dissidents, journalists and human rights defenders — arguing that encryption and anonymity are vital “enablers of both freedom of expression and opinion, and the right to privacy”.
“It is neither fanciful nor an exaggeration to say that, without encryption tools, lives may be endangered. In the worst cases, a Government’s ability to break into its citizens’ phones may lead to the persecution of individuals who are simply exercising their fundamental human rights,” he continues, adding: “There is, unfortunately, no shortage of security forces around the world who will take advantage of the ability to break into people’s phones if they can.
“And there is no shortage of criminals intent on committing economic crimes by accessing other people’s data. Personal contacts and calendars, financial information and health data, and many other rightfully private information need to be protected from criminals, hackers and unscrupulous governments who may use them against people for the wrong reasons. In an age when we store so much of our personal and professional lives on our smart phones and other devices, how is it going to be possible to protect that information without fail-safe encryption systems?”
Al Hussein concludes that the core of the issue is a question of proportionality, arguing that the security services’ hope to gain extra information about one “dreadful crime” must be weighed against the risk of “enabling a multitude of other crimes all across the world”.
“The debate around encryption is too focused on one side of the security coin, in particular its potential use for criminal purposes in times of terrorism. The other side of the security coin, is that weakening encryption protections may bring even bigger dangers to national and international security,” he adds.

Comments

Popular posts from this blog

Top 20 WordPress Interview Questions and Answers

Top 40 WordPress Interview Questions and Answers  for freshers and experienced are below are below : 1. What is WordPress? WordPress is an online, open source website creation tool written in PHP. But in non-geek speak, it's probably the easiest and most powerful blogging and website content management system (or CMS) in existence today. 2. Different between WordPress.com vs WordPress.org? WordPress.com (fully hosted) Focus on your beautiful content, and let us handle the rest. WordPress.org (self-hosted) Get your hands dirty, and host your website yourself. refer official URL: https://en.support.wordpress.com/com-vs-org/ for more details. 3. Use of WordPress? WordPress is a free and open-source blogging tool and a content management system (CMS) based on PHP and MySQL. Features include a plugin architecture and a template system. WordPress was used by more than 23.3% of the top 10 million websites as of January 2015 4. feature of WordPress? Here are some of the featu...

IT Where

#Responsive_Webdesign  start from #7500, #hosting_Service  Start from #3300 Per Year #get   #your   #special  offers at  Itwhere Pondy #Digital_Marketing  , #SEO , #Product_Branding  at Itwhere Pondy Email:info@itwheretech.co. in M:+91 9092734853 www.itwheretech.co.in

Phoenix OS is (another) Android-as-a-desktop

Google Android may have been developed as a smartphone operating system (and later ported to tablets, TVs, watches, and other platforms), but over the past few years we’ve seen a number of attempts to turn it into a desktop operating system. One of the most successful has been  Remix OS , which gives Android a taskbar, start menu, and an excellent window management system. The Remix OS team has also generated a lot of buzz over the past year, and this week the operating system gained a lot of new alpha testers thanks to a  downloadable version of Remix OS  that you can run on many recent desktop or notebook computers. But Remix OS isn’t the only game in town.  Phoenix OS  is another Android-as-desktop operating system, and while it’s still pretty rough around the edges, there are a few features that could make it a better option for some testers. Some background I first discovered Phoenix OS from  a post in the Remix OS Google Group , altho...

How Education Will Be Smarter, Less Intrusive, And Able To Respond To How You Feel

Impatience characterizes the technology sector’s approach to education. Disruption is taking place in all other sectors of society — so, why not education? I know too well, whether at Pearson or in the classroom, the challenges and frustration of developing and using digital tools that improve outcomes for students. But I’m optimistic. We are on the verge of a tide of smarter innovation that, if allowed to spread, will turbocharge the learning experience for students. Here are four areas worth watching: 1. Using technology to learn from learners Every great digital product constantly evolves by learning from its users, adding capabilities, and improving its performance. If it’s true for your Facebook feed, then why not education? The potential is there, as the OECD’s recent report on  Students, Computers and Learning  (OECD) incidentally showed how clickstream and tracking navigation in digital readers can be used to see how students process online text and...

Google Announces Android Wear Update With WiFi Support, Always-On Apps, And More

It has been a while since Android Wear got any substantial updates, but today Google is announcing a big one. A new version of Wear will be rolling out over the coming weeks that includes a number of previously rumored features (like WiFi support) and some all new stuff (like always-on apps). Most Wear devices use the always-on ambient mode for the watch face by default, the Moto 360 being a notable exception. The new Android Wear version allows apps to operate in ambient mode too, so they remain active when the watch goes to sleep. That makes it easier to take a quick glance at the app instead of waking the device up and opening the app all over again. The watch will still only go into full-color mode when necessary. WiFi support is also coming in the update, which means your watch can be useful even if your phone isn't connected. Watches with WiFi support will be able to connect to WiFi and still get messages and notifications from your phone, provided it has an interne...