Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it?
The world has become less secure and less private with the advent of technology. Law enforcement agencies, such as the FBI, have sophisticated technology that would amaze J. Edgar Hoover. In response to this increasing surveillance capabilities, telecommunications providers like Apple are seeking to keep pace with technological advances of their own to protect the personal privacy of their consumers and subscribers. In the background of this factual situation, the article explores the vagaries of security in our technological world in light of the dispute between the FBI and Apple regarding the iPhone at issue is the San Bernadino shooting. The current law poses challenges for both the FBI and telecommunications providers like Apple. Moreover, legislative solutions are also difficult to envision. Ultimately, the government should be cautious about preventing software manufacturers from seeking to create impenetrable operating systems. Indeed, the prevention of development of better software and operating systems comes at the expense of the loss of privacy in financial and health records.
KeywordsApple FBI iPhone Password Privacy security
Compliance with ethical standards
Conflict of interest
I, Brian Owsley, declare that I have no conflict of interest regarding this article.
There is no funding source for this article beyond my salary at my institution.
This article does not contain any studies with human participants or animals performed by the author.
- 1.Rubin J, Queally J, Dave P. FBI unlocks San Bernardino shooter’s iPhone and ends legal battle with Apple, for now. Los Angeles Times. 2016. Available at http://www.latimes.com/local/lanow/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html.
- 2.Benner K, Lichtblau E. U.S. says it has unlocked iPhone without apple. N.Y. Times. 2016. Available at http://www.nytimes.com/2016/03/29/technology/apple-iphone-fbi-justice-department-case.html?_r=0.
- 3.Edwards J. FBI paid more than $1.3 million to break into San Bernardino iPhone. Reuters. 2016. Available at http://www.reuters.com/article/us-apple-encryption-fbi-idUSKCN0XI2IB.
- 4.Reisinger D. FBI got useful information off San Bernardino iPhone. Fortune 2016. Available at http://fortune.com/2016/04/20/fbi-san-bernardino-iphone/.
- 5.Dave P. Apple wants the FBI to reveal how it hacked the San Bernardino killer’s iPhone. Los Angeles Times 2016. Available at http://www.latimes.com/business/technology/la-fi-tn-apple-next-steps-20160330-story.html.
- 6.Schwartz A, Knake R. Government’s role in vulnerability disclosure. Harvard Kennedy School. 2016. Available at http://belfercenter.ksg.harvard.edu/files/vulnerability-disclosure-web-final3.pdf.
- 7.Welna D. The next encryption battleground: congress. NPR 2016. Available at http://www.npr.org/sections/alltechconsidered/2016/04/14/474113249/the-next-encryption-battleground-congress?utm_campaign=storyshare&utm_source=twitter.com&utm_medium=social.
- 8.McCarthy K. Europe to push new laws to access encrypted apps data. The Register 2017. www.theregister.co.uk/2017/03/30/ec_push_encryption_backdoors/.
- 9.Holpuch A. Lavabit loses contempt of court appeal over Edward Snowden encryption keys. The Guardian. 2014. Available at https://www.theguardian.com/technology/2014/apr/16/lavabit-court-ruling-edward-snowden-encryption.
- 10.Ackerman S. Lavabit email service abruptly shut down citing government interference. The Guardian. 2013. Available at https://www.theguardian.com/technology/2013/aug/08/lavabit-email-shut-down-edward-snowden.
- 11.Rosenblatt S. Lavabit chief predicts ‘long fight’ with feds (Q&A). CNET. 2013. Available at https://www.cnet.com/news/lavabit-chief-predicts-long-fight-with-feds-q-a/.
- 12.Statt N. 1 billion Apple devices are in active use around the world. The Verge 2016. Available at www.theverge.com/2016/1/26/10835748/apple-devices-active-1-billion-iphone-ipad-ios.
- 13.Costello S. How many iPhones have been sold worldwide? Lifewire. 2017. Available at www.lifewire.com/how-many-iphones-have-been-sold-1999500.
- 14.Reisinger D. iPhones in use in the US rise to 94M, new study suggests. CNET. 2015. Available at www.cnet.com/news/nearly-100m-iphones-in-use-in-the-us-new-study-shows.
- 15.Associated Press. Chinese government suspected of hacking into FDIC computers. NBC News 2016. Available at http://www.nbcnews.com/tech/security/chinese-government-suspected-hacking-fdic-computers-n609206.
- 16.Nakashima E. Chinese hack of federal personal files included security-clearance database. The Washington Post 2015. Available at https://www.washingtonpost.com/world/national-security/chinese-hack-of-government-network-compromises-security-clearance-files/2015/06/12/9f91f146-1135-11e5-9726-49d6fa26a8c6_story.html.
- 17.Davis JH. Hacking of government computers exposed 21.5 million people. The New York Times. 2015. Available at http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html?_r=0.
- 18.Press Release, Department of Justice. U.S. charges five Chinese military hackers for cyber espionage against U.S. corporations and a labor organization for commercial advantage. 2014. Available at https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor.
- 19.Sanger DE, Perlroth N. Iranian hackers attack state dept. via social media accounts. The New York Times. 2015. Available at http://www.nytimes.com/2015/11/25/world/middleeast/iran-hackers-cyberespionage-state-department-social-media.html.
- 20.Gorman S. Iran-based cyberspies targeting U.S. officials, report alleges. The Wall Street Journal. 2014. Available at http://www.wsj.com/articles/iran-based-cyberspies-targeting-u-s-officials-report-alleges-1401335072.
- 21.Perez E, Prokupecz S. How the U.S. thinks Russians hacked the White House. CNN. 2015. Available at http://edition.cnn.com/2015/04/07/politics/how-russians-hacked-the-wh/index.html.
- 22.Sanger DE, Schmitt E. Spy agency consensus grows that Russia hacked D.N.C. The New York Times. 2016. Available at http://www.nytimes.com/2016/07/27/us/politics/spy-agency-consensus-grows-that-russia-hacked-dnc.html.
- 23.Wheelwright G. Entire US political system ‘under attack’ by Russian hacking, experts warn. The Guardian 2016. Available at https://www.theguardian.com/technology/2016/oct/14/hillary-clinton-email-hack-russia-cybersecurity.
- 24.Wofford B. How to hack an election in 7 minutes. Politico 2016. Available at http://www.politico.com/magazine/story/2016/08/2016-elections-russia-hack-how-to-hack-an-election-in-seven-minutes-214144.
- 25.Davis, JH. U.S. seeks to protect voting system from cyberattacks. The New York Times. 2016. Available at http://www.nytimes.com/2016/08/04/us/politics/us-seeks-to-protect-voting-system-against-cyberattacks.html.
- 26.Pagliery J. Cellebrite is the FBI’s go-to hacker. CNN. 2016. Available at http://money.cnn.com/2016/03/31/technology/cellebrite-fbi-phone/index.html.
- 27.Risen T. North Korea linked with hacks stealing from banks. US News & World Report 2016. Available at http://www.usnews.com/news/articles/2016-05-27/north-korea-linked-with-hacks-stealing-from-banks.
- 28.Pagliery J. China hacked the FDIC – and US officials covered it up, report says. CNN 2016. Available at http://money.cnn.com/2016/07/13/technology/china-fdic-hack/
- 29.Nakashima E. Chinese breach data of 4 million federal workers. Washington Post 2015. Available at https://www.washingtonpost.com/world/national-security/chinese-hackers-breach-federal-governments-personnel-office/2015/06/04/889c0e52-0af7-11e5-95fd-d580f1c5d44e_story.html.
- 30.Kharpal A. Is China still hacking US? This cyber firm says yes. CNBC. 2015. Available at http://www.cnbc.com/2015/10/19/china-hacking-us-companies-for-secrets-despite-cyber-pact-.html.
- 31.Bertrand N. Here’s what happened to your target data that was hacked. Business Insider 2014. Available at http://www.businessinsider.com/heres-what-happened-to-your-target-data-that-was-hacked-2014-10.
- 32.Banjo S. Home depot hackers exposed 53 million email addresses. The Wall Street Journal 2014. Available at http://www.wsj.com/articles/home-depot-hackers-used-password-stolen-from-vendor-1415309282.
- 33.Brenner R. The new front on fraud? Your credit card. CBS News. 2014. Available at http://www.cbsnews.com/news/the-new-front-on-fraud-your-credit-card/.
- 34.Riley C, Pagliery J. Target will pay hack victims $10 million. CNN. 2015. Available at http://money.cnn.com/2015/03/19/technology/security/target-data-hack-settlement/.
- 35.Musil S. Home depot offers $19M to settle customers’ hacking lawsuit. CNET 2016. Available at https://www.cnet.com/news/home-depot-offers-19m-to-settle-customers-hacking-lawsuit/.
- 36.Ross B, Ferran L. Cyber ‘smear’: hackers publish olympians’ medical records. ABC News 2016. Available at http://abcnews.go.com/International/anti-doping-agency-russian-hackers-published-athletes-medical/story?id=42063565.
- 37.Phippen JW. The hack on U.S. olympians’ medical records. The Atlantic. 2016. Available at http://www.theatlantic.com/news/archive/2016/09/fancy-bears-russian-olympic-hack/499829/.
- 38.Storm D. Hacker selling 655,000 patient records from 3 hacked healthcare organizations. Computerworld 2016. Available at http://www.computerworld.com/article/3088907/security/hacker-selling-655-000-patient-records-from-3-hacked-healthcare-organizations.html.
- 39.Mathews AW. Anthem: hacked database included 78.8 million people. The Wall Street Journal. 2015. Available at http://www.wsj.com/articles/anthem-hacked-database-included-78-8-million-people-1424807364.
- 40.Groden C. This big U.S. health insurer just got hacked. Fortune. 2015. Available at http://fortune.com/2015/09/10/hack-health-insurer-bluecross/.
- 41.Stone J. One in three americans had their health records breached in 2015, as hackers follow the money from retail to medical data. International Business Times 2016. Available at http://www.ibtimes.com/one-three-americans-had-their-health-records-breached-2015-hackers-follow-money-2281011.