5 facts about Apple and the terrorist’s iPhone

The truth behind the hype and misunderstandings surrounding the case

apple data centers company tech news

A great deal of hype and misinformation surrounds the court order requiring Apple to help law enforcement access the iPhone of the deceased San Bernardino terrorist Syed Farook. Some of the misinformation has come from Apple CEO Tim Cook. Some people are claiming that giving in to law enforcement’s demands would be a crippling blow to the privacy of U.S. citizens. Here are five facts to put those fears in perspective:

  1. The FBI wants Apple to write software that bypasses the device-wiping function that activates after 10 wrong passcodes have been entered. This is a security feature designed to protect data when a device is lost or stolen. The FBI wants to be able to enter all possible passcodes on this specific phone.
  2. The FBI wants Apple to digitally sign and install the software. If the software is not digitally signed by Apple, the iPhone won’t accept the update. This is the key element of this case; without Apple’s digital signature, that iPhone will remain locked.
  3. The software never has to leave Apple’s control and can be immediately destroyed after this one use. Apple claims that once the software is created, it is out there. But it could be “out there” only if Apple has reason not to trust itself or the people it would assign to do the work.
  4. Nothing that the FBI has asked for would weaken encryption.
  5. The case does raise the question of when a government can demand that a developer help circumvent security measures. This is a legitimate policy concern, and if the San Bernardino case sets a precedent that leads to frequent demands for such assistance, then there is a greater possibility that the software used might become more easily available.

That the FBI has to recruit Apple’s cooperation is a testament to the strength of Apple’s security measures. Apple’s resistance seems designed to position it as a champion of privacy, but the stance actually downplays the effectiveness of its privacy protections.

[ ALSO: Apple to challenge court's backdoor ruling, failure could set dangerous legal precedent  ]

Ira Winkler is president of Secure Mentem and author of the book Spies Among Us. He can be contacted through his Web site, securementem.com.

This story, "5 facts about Apple and the terrorist’s iPhone" was originally published by Computerworld.

Copyright © 2016 IDG Communications, Inc.

22 cybersecurity myths organizations need to stop believing in 2022