Former CIA Director Calls Out The FBI Over iPhone Backdoor

The FBI’s demand that Apple create a custom version of iOS that would allow them to hack into the iPhone of one of the San Bernardino terrorists has Americans firmly divided into two camps.

According to a recent poll conducted by NBC and The Wall Street Journal, 42% of respondents said Apple should cooperate with the FBI while 47% of those polled sided with Apple. 11% of respondents, meanwhile, indicated that they weren’t sure which party to side with.

While this is to be expected given the contentious nature of the issue, it’s interesting to note that former US Government security officials haven’t been so quick to reflexively side with the FBI. For instance, former CIA chief James Woolsey recently explained in an interview on CNBC that the FBI in this case isn’t just interested in accessing information on this particular iPhone. On the contrary, Woolsey articulated that the FBI is looking for the ability to effectively dictate what type of mobile OS Apple is able to release for the iPhone.

“The last time I looked into the language on this with some care, it did seem to me as if the FBI was trying to get a right essentially to effectively decide what kind of an operating system Apple was going to have, and that they were not just trying to get into one phone,” Woolsey said. “They were trying to change some important aspect of Apple’s operating system… The agency should not have the right to restructure Apple’s iOS in perpetuity.”

This is a point Apple has been trying to drive home over the past few weeks; if the FBI is successful in this case, what’s to stop them from demanding Apple to create all sorts of modified versions of iOS in the future.

As Apple noted in its motion to vacate brief filed a few weeks back:
If Apple can be forced to write code in this case to bypass security features and create new accessibility, what is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone’s user? Nothing.

Woolsey’s comments on the issue aren’t too far off from what former NSA and CIA head Michael Hayden had to say on the matter a few weeks back.
“I think [FBI Director] Jim Comey is wrong, Woolsey said in an interview last month. “Jim’s logic is based on the belief that he remains the main body. That you should accommodate your movements to him, which is the main body. And I’m telling you, with regard to the cyber domain, he’s not. You are.”

BGR: http://bit.ly/1pOcJac

« Is Apple Right To Resist The FBI?
Obama Says Apple's Technology Can't Be Inaccessible To The State »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.