ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

This incident involves the encryption protocol used by Apple’s iPhones, and one high-profile device that has been controversial since December of 2015: the iPhone used by the shooter of the San Bernardino, California terrorist attacks. The FBI has issued a court order to Apple, demanding that they provide or build a backdoor for iOS that will allow them to garner information from the device. Apple has refused, and has since been duking it out with the FBI in a series of court cases. This could set a precedent that’s much larger than this individual case.

On February 16th 2016, Apple’s CEO Tim Cook issued a statement calling for a public discussion of the issue at hand, and a declaration that Apple will not comply with this demand due to the larger implications of the decision. In the past, Apple has provided data that was already in their possession for help with certain FBI investigations, but this time, Apple claims that they cannot, and will not, build a vulnerability that could potentially compromise the security of their customers. As stated in the customer letter:

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

Apple’s letter continues to explain the importance of data security not only to Apple’s customers, but to any user of modern smartphones. Plus, as developers, building a backdoor or flaw directly into their software would be straight-up unethical, not to mention the dangers that could come from such an exploit falling into the wrong hands, like hackers or other criminals.

Apple isn’t alone in this endeavor, either; technology companies are lining up behind Apple in support of their fight against the FBI. With the support of Google, Microsoft, and many other Silicon Valley giants, Apple wants its message to be heard loud and clear; by purposely building backdoors into their technology, they would be betraying the trust of their consumers, and undermining the trust that we as a society have for technology in general.

This decision by Apple could have far-reaching consequences in the form of government entities being able to infringe on the privacy of consumers… that is, if the court rules in favor of the FBI. Such a ruling would put smartphone users at the mercy of legislation that forces tech developers to comply with backdoor requests on demand, which could put the entire concept of consumer privacy in jeopardy. Plus, what would happen if these backdoors fell into the hands of hackers? Nobody can guarantee that this won’t happen, and the possibility is frightening, to say the least.

Where do you stand on smartphone encryption? Do you think that Apple has made the right choice concerning this request? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Passwords Holiday Disaster Recovery Apps IT Support Browser Windows 10 Managed Service Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Managed Service Provider Data Management Government Saving Money Operating System Networking Windows Workplace Strategy Gadgets Artificial Intelligence Managed IT services Blockchain Remote Server Bandwidth WiFi Encryption Mobile Device Management App Information Virtualization Business Technology Spam Budget Employee/Employer Relationship Gmail Apple Office Information Technology Two-factor Authentication History Office 365 Analytics Wi-Fi Access Control Cybercrime Data Security Conferencing Big Data BDR Health Save Money Remote Computing Compliance Patch Management Remote Monitoring Help Desk Voice over Internet Protocol Cost Management Hacking Vendor IT Management Employer-Employee Relationship Document Management Training Hacker Customer Service Hiring/Firing Unified Threat Management Firewall Outlook Password Augmented Reality Data loss Word BYOD Computing IBM Vendor Management Website Hard Drive Project Management Mobile Office Search... Applications Managed Services Best Practice Legal Vulnerabilities Data storage Retail Alert Money Travel Virtual Reality VPN Social Engineering Sports Social User SaaS Cryptocurrency DDoS Black Market Update Cleaning Robot iPhone Chrome Education Cortana Paperless Office Content Filtering Antivirus Maintenance Router Mobile Computing Remote Workers The Internet of Things Marketing Data Breach Twitter YouTube Running Cable Windows 7 Websites Law Enforcement Free Resource Mobility End of Support Meetings Printer Laptop Storage Windows 11 How To Google Maps Monitoring Scam Healthcare Bluetooth Virtual Desktop Saving Time Experience HIPAA Distributed Denial of Service Tech Terms Office Tips Computers Private Cloud Bitcoin Employees Memory Avoiding Downtime Managed IT Digital Telephone Holidays Disaster Politics Taxes Cooperation Machine Learning Excel Settings Video Conferencing Lithium-ion battery Solid State Drive Virtual Machines Computer Repair PowerPoint Physical Security Administration Professional Services Virtual Assistant Processors Drones Presentation Chromebook Specifications IT Consultant Automobile Start Menu Downloads Managed Services Provider Computer Care Processor Customer Relationship Management How To Virtual Private Network Co-Managed IT Microchip Vulnerability Flexibility Entertainment Wireless Technology Software as a Service Data Protection Current Events eWaste Solutions Hack Identity Theft Downtime Multi-factor Authentication Notifications Unified Communications Safety Integration Images 101 Google Docs Display Wireless Headphones Workplace Television Microsoft Excel AI Telephony Trend Micro Employer Employee Relationship Music Cabling Tech Transportation Going Green Business Cards Digital Security Cameras Electronic Health Records Tablet Wasting Time G Suite Error Scams Mouse VoIP eCommerce Tracking Bookmark Modem Surveillance Staffing Term Download Botnet Piracy Videos Rental Service Micrsooft Managing Costs Web Server IP Address Business Owner HTML SSID Nanotechnology Cables SharePoint Flash Digital Payment Browsers Development Business Growth Worker Google Play Employer/Employee Relationships Upload Software License Media Telephone Systems Access Virtual Machine Social Network Screen Reader Point of Sale Reviews Time Management Optimization Public Cloud Data Analysis Google Wallet Recovery Security Cameras Teamwork Competition Trends Mobile Technology 2FA Banking Shortcuts Messenger Audit Data Storage Deep Learning Spyware Hypervisor Customer Resource management Inbound Marketing Devices Medical IT Entrepreneur Tip of the week Shopping LiFi File Sharing Fileless Malware Hosted Solution Documents SQL Server Application Gamification Company Culture Paperless Business Metrics Redundancy Be Proactive Books PCI DSS Cache Licensing Telephone System Business Intelligence Regulations Directions Electronic Payment Backup and Disaster Recovery Gig Economy Language Unified Threat Management Humor Society Workers Internet Service Provider Securty Azure Content Desktop Business Communications Accountants Workplace Strategies Reading Printing Regulations Compliance Monitors Managed IT Service Visible Light Communication CCTV Domains Electronic Medical Records Database Phone System Touchscreen Memes Windows 8 Net Neutrality Computer Malfunction Human Resources Emergency Equifax Relocation Financial Data Displays Vendor Mangement Advertising Health IT Tactics Hard Drive Disposal Risk Management Work/Life Balance IT Tech Support Samsung Uninterrupted Power Supply Webcam Public Speaking Username Google Apps Startup Smart Technology Computer Accessories Freedom of Information Telework Business Mangement Streaming Media Navigation Microsoft 365 Keyboard Addiction In Internet of Things email scam Smartwatch Communitications Tablets Procurement Network Congestion Hard Drives Mobile Security Hacks intranet Legislation Reliable Computing Google Calendar News FinTech Writing Supercomputer User Tip Wireless Evernote Shortcut Network Management CES Virus IT Assessment Supply Chain Management Value Motion Sickness Heating/Cooling Environment Social Networking Emails Supply Chain Scalability Comparison Fake News Organization Google Drive Windows XP Cyber security Proxy Server Service Level Agreement Administrator Computing Infrastructure Text Messaging Smart Devices Proactive IT Bring Your Own Device Knowledge Remote Working Corporate Profile Management Troubleshooting Device security

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?