Former CIA Director Calls Out The FBI Over iPhone Backdoor

The FBI’s demand that Apple create a custom version of iOS that would allow them to hack into the iPhone of one of the San Bernardino terrorists has Americans firmly divided into two camps.

According to a recent poll conducted by NBC and The Wall Street Journal, 42% of respondents said Apple should cooperate with the FBI while 47% of those polled sided with Apple. 11% of respondents, meanwhile, indicated that they weren’t sure which party to side with.

While this is to be expected given the contentious nature of the issue, it’s interesting to note that former US Government security officials haven’t been so quick to reflexively side with the FBI. For instance, former CIA chief James Woolsey recently explained in an interview on CNBC that the FBI in this case isn’t just interested in accessing information on this particular iPhone. On the contrary, Woolsey articulated that the FBI is looking for the ability to effectively dictate what type of mobile OS Apple is able to release for the iPhone.

“The last time I looked into the language on this with some care, it did seem to me as if the FBI was trying to get a right essentially to effectively decide what kind of an operating system Apple was going to have, and that they were not just trying to get into one phone,” Woolsey said. “They were trying to change some important aspect of Apple’s operating system… The agency should not have the right to restructure Apple’s iOS in perpetuity.”

This is a point Apple has been trying to drive home over the past few weeks; if the FBI is successful in this case, what’s to stop them from demanding Apple to create all sorts of modified versions of iOS in the future.

As Apple noted in its motion to vacate brief filed a few weeks back:
If Apple can be forced to write code in this case to bypass security features and create new accessibility, what is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone’s user? Nothing.

Woolsey’s comments on the issue aren’t too far off from what former NSA and CIA head Michael Hayden had to say on the matter a few weeks back.
“I think [FBI Director] Jim Comey is wrong, Woolsey said in an interview last month. “Jim’s logic is based on the belief that he remains the main body. That you should accommodate your movements to him, which is the main body. And I’m telling you, with regard to the cyber domain, he’s not. You are.”

BGR: http://bit.ly/1pOcJac

« Is Apple Right To Resist The FBI?
Obama Says Apple's Technology Can't Be Inaccessible To The State »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.

CoNetrix

CoNetrix

CoNetrix is a full service computer networking, software development, and security and compliance firm built on the principles of integrity, innovation, and initiative.