Health and Technology

, Volume 7, Issue 4, pp 369–376 | Cite as

Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it?

  • Brian L. OwsleyEmail author
Original Paper
Part of the following topical collections:
  1. Privacy and Security of Medical Information


The world has become less secure and less private with the advent of technology. Law enforcement agencies, such as the FBI, have sophisticated technology that would amaze J. Edgar Hoover. In response to this increasing surveillance capabilities, telecommunications providers like Apple are seeking to keep pace with technological advances of their own to protect the personal privacy of their consumers and subscribers. In the background of this factual situation, the article explores the vagaries of security in our technological world in light of the dispute between the FBI and Apple regarding the iPhone at issue is the San Bernadino shooting. The current law poses challenges for both the FBI and telecommunications providers like Apple. Moreover, legislative solutions are also difficult to envision. Ultimately, the government should be cautious about preventing software manufacturers from seeking to create impenetrable operating systems. Indeed, the prevention of development of better software and operating systems comes at the expense of the loss of privacy in financial and health records.


Apple FBI iPhone Password Privacy security 


Compliance with ethical standards

Conflict of interest

I, Brian Owsley, declare that I have no conflict of interest regarding this article.


There is no funding source for this article beyond my salary at my institution.

Ethical approval

This article does not contain any studies with human participants or animals performed by the author.


  1. 1.
    Rubin J, Queally J, Dave P. FBI unlocks San Bernardino shooter’s iPhone and ends legal battle with Apple, for now. Los Angeles Times. 2016. Available at
  2. 2.
    Benner K, Lichtblau E. U.S. says it has unlocked iPhone without apple. N.Y. Times. 2016. Available at
  3. 3.
    Edwards J. FBI paid more than $1.3 million to break into San Bernardino iPhone. Reuters. 2016. Available at
  4. 4.
    Reisinger D. FBI got useful information off San Bernardino iPhone. Fortune 2016. Available at
  5. 5.
    Dave P. Apple wants the FBI to reveal how it hacked the San Bernardino killer’s iPhone. Los Angeles Times 2016. Available at
  6. 6.
    Schwartz A, Knake R. Government’s role in vulnerability disclosure. Harvard Kennedy School. 2016. Available at
  7. 7.
  8. 8.
    McCarthy K. Europe to push new laws to access encrypted apps data. The Register 2017.
  9. 9.
    Holpuch A. Lavabit loses contempt of court appeal over Edward Snowden encryption keys. The Guardian. 2014. Available at
  10. 10.
    Ackerman S. Lavabit email service abruptly shut down citing government interference. The Guardian. 2013. Available at
  11. 11.
    Rosenblatt S. Lavabit chief predicts ‘long fight’ with feds (Q&A). CNET. 2013. Available at
  12. 12.
    Statt N. 1 billion Apple devices are in active use around the world. The Verge 2016. Available at
  13. 13.
    Costello S. How many iPhones have been sold worldwide? Lifewire. 2017. Available at
  14. 14.
    Reisinger D. iPhones in use in the US rise to 94M, new study suggests. CNET. 2015. Available at
  15. 15.
    Associated Press. Chinese government suspected of hacking into FDIC computers. NBC News 2016. Available at
  16. 16.
    Nakashima E. Chinese hack of federal personal files included security-clearance database. The Washington Post 2015. Available at
  17. 17.
    Davis JH. Hacking of government computers exposed 21.5 million people. The New York Times. 2015. Available at
  18. 18.
    Press Release, Department of Justice. U.S. charges five Chinese military hackers for cyber espionage against U.S. corporations and a labor organization for commercial advantage. 2014. Available at
  19. 19.
    Sanger DE, Perlroth N. Iranian hackers attack state dept. via social media accounts. The New York Times. 2015. Available at
  20. 20.
    Gorman S. Iran-based cyberspies targeting U.S. officials, report alleges. The Wall Street Journal. 2014. Available at
  21. 21.
    Perez E, Prokupecz S. How the U.S. thinks Russians hacked the White House. CNN. 2015. Available at
  22. 22.
    Sanger DE, Schmitt E. Spy agency consensus grows that Russia hacked D.N.C. The New York Times. 2016. Available at
  23. 23.
    Wheelwright G. Entire US political system ‘under attack’ by Russian hacking, experts warn. The Guardian 2016. Available at
  24. 24.
  25. 25.
    Davis, JH. U.S. seeks to protect voting system from cyberattacks. The New York Times. 2016. Available at
  26. 26.
    Pagliery J. Cellebrite is the FBI’s go-to hacker. CNN. 2016. Available at
  27. 27.
    Risen T. North Korea linked with hacks stealing from banks. US News & World Report 2016. Available at
  28. 28.
    Pagliery J. China hacked the FDIC – and US officials covered it up, report says. CNN 2016. Available at
  29. 29.
  30. 30.
    Kharpal A. Is China still hacking US? This cyber firm says yes. CNBC. 2015. Available at
  31. 31.
    Bertrand N. Here’s what happened to your target data that was hacked. Business Insider 2014. Available at
  32. 32.
    Banjo S. Home depot hackers exposed 53 million email addresses. The Wall Street Journal 2014. Available at
  33. 33.
    Brenner R. The new front on fraud? Your credit card. CBS News. 2014. Available at
  34. 34.
    Riley C, Pagliery J. Target will pay hack victims $10 million. CNN. 2015. Available at
  35. 35.
    Musil S. Home depot offers $19M to settle customers’ hacking lawsuit. CNET 2016. Available at
  36. 36.
    Ross B, Ferran L. Cyber ‘smear’: hackers publish olympians’ medical records. ABC News 2016. Available at
  37. 37.
    Phippen JW. The hack on U.S. olympians’ medical records. The Atlantic. 2016. Available at
  38. 38.
    Storm D. Hacker selling 655,000 patient records from 3 hacked healthcare organizations. Computerworld 2016. Available at
  39. 39.
    Mathews AW. Anthem: hacked database included 78.8 million people. The Wall Street Journal. 2015. Available at
  40. 40.
    Groden C. This big U.S. health insurer just got hacked. Fortune. 2015. Available at
  41. 41.
    Stone J. One in three americans had their health records breached in 2015, as hackers follow the money from retail to medical data. International Business Times 2016. Available at

Copyright information

© IUPESM and Springer-Verlag Berlin Heidelberg 2017

Authors and Affiliations

  1. 1.UNT Dallas College of LawDallasUSA

Personalised recommendations