Obama Says Apple's Technology Can't Be Inaccessible To The State

President Barack Obama recently said, that smartphones, like the iPhone the FBI is trying to force Apple to help it hack, must not be allowed to be "black boxes," inaccessible to the government. The technology industry, he said, should work with the government instead of leaving the issue to Congress.

"You cannot take an absolutist view on this," Obama said at the South by Southwest Festival in Austin, Texas. "If your argument is strong encryption no matter what, and we can and should create black boxes, that I think does not strike the kind of balance we have lived with for 200, 300 years, and it’s fetishizing our phones above every other value."

Obama’s appearance at the event known as SXSW, the first by a sitting president, comes as the FBI tries to force Apple Inc. to help investigators access an iPhone used by one of the assailants in December’s deadly San Bernardino, California, terror attack. Apple has appealed a magistrate court order that it assist the government, saying to do so would undermine its encryption technology.

Rapid technological advancements "offer us enormous opportunities, but also are very disruptive and unsettling," Obama said at the festival, where he hoped to persuade tech workers to enter public service. "They empower individuals to do things that they could have never dreamed of before, but they also empower folks who are very dangerous to spread dangerous messages."

Siding with Apple are technology companies including Amazon Inc., Microsoft Corp., Facebook Inc. and Google’s parent Alphabet Inc. On Thursday, the government filed a memorandum in the case arguing that Apple would need to assign as few as six workers for as little as two weeks to hack into Syed Farook’s phone.

“This burden, which is not unreasonable, is the direct result of Apple’s deliberate marketing decision to engineer its products so that the government cannot search them, even with a warrant,” government attorneys said in the filing.

‘Sloppy and Rushed’
Obama was interviewed at the festival by the CEO and editor in chief of the Texas Tribune, Evan Smith, who told him that "it looks to the tech community, or to some in the tech community, that government is the enemy" in its dealings with Apple. South by Southwest, now 30 years old, has grown from an event to highlight local musicians and artists into one of the nation’s largest and most popular technology conferences and film-and-music festivals.

The White House has backed the FBI in its fight with Apple, but has said Obama believes it is vital to balance privacy protections against the needs of law enforcement. Obama has not weighed in on legislation being drafted by Senate Intelligence Committee Chairman Richard Burr, a North Carolina Republican, and the senior Democrat on the panel, Dianne Feinstein of California, which would require companies to comply with court orders asking for assistance accessing encrypted data.

He indicated recently that he believes leaving the matter to lawmakers may not be ideal. The result would be "sloppy and rushed and it will go through Congress in ways that have not been thought through," he said.

Apple and other tech firms have said that building backdoors into their encrypted products could put them at a disadvantage to foreign competitors. They have also warned that China or other countries could demand similar cooperation with government investigations.

Without commenting on the Apple case, Obama dismissed those arguments, saying that for centuries law enforcement agencies have been able to search private property for evidence of crimes using a warrant.

"The question we now have to ask is, if technologically it is possible to make an impenetrable device or system, where the encryption is so strong there’s no key, there’s no door at all, then how do we apprehend the child pornographer? How do we solve or disrupt a terrorist plot?" Obama said. "If in fact you can’t crack that at all, government can’t get in, then everybody’s walking around with a Swiss bank account in their pocket." Compromise is possible, he said, and the technology industry must help design it.

"I suspect the answer is going to come down to, how do we create a system that, encryption is as strong as possible, the key is secure as possible, and it is accessible by the smallest number of people possible for the subset of issues that we agree is important," he said.

Recruiting Coders
It isn’t the first time his policies have caused the White House a headache at the Austin festival. In 2014, former NSA contractor Edward Snowden gave a virtual keynote speech from Russia on privacy rights. WikiLeaks editor-in-chief Julian Assange also spoke remotely to the conference that year.

Snowden’s leaks have complicated the encryption issue, Obama said, by "elevating people’s suspicions" of government surveillance. Still, White House officials believe that engagement with the technology sector is critical, especially if the administration is to recruit talented programmers to help modernize the federal government.

“Cooperation that exists between the government and the tech sector continues beyond the issue of encryption,” Jason Goldman, the White House’s chief digital officer, said on a conference call with reporters before Obama’s appearance.

In recent years, Obama has hired officials from companies including Microsoft, Alphabet, and Twitter Inc. to help repair the broken HealthCare.gov enrollment system and the byzantine Veterans Affairs claims processing system, among other assignments. The administration hopes the president’s appearance at SXSW can help replenish the ranks of hundreds of technology specialists who put their Silicon Valley careers on hold for public service.

Obama called HealthCare.gov "an example of the big and the bloated and frustrating" in government. When the website failed in October 2013, he said, it "was a little embarrassing for me because I was the cool early adopter president. My entire campaign had been premised on having really cool technology and social media and all that."

After fixing HealthCare.gov with the assistance of private-sector technology experts, "what we realized was we could potentially build a SWAT team, a world class tech office inside of the government, that was helping across agencies," Obama said. That became the US Digital Service.

Information-Management

« Former CIA Director Calls Out The FBI Over iPhone Backdoor
North Korea Denies Cyber Attacks On South Korea »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Romanian Association for Electronic Industry & Software (ARIES)

Romanian Association for Electronic Industry & Software (ARIES)

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

National Accreditation Agency of Ukraine (NAAU)

National Accreditation Agency of Ukraine (NAAU)

NAAU is the national accreditation body for Ukraine. The directory of members provides details of organisations offering certification services for ISO 27001.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.

Efex

Efex

Efex is one of Australia’s leading Managed Technology Solutions providers. We service local companies across Australia, providing accessible, fast and straightforward IT.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.