Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

This incident involves the encryption protocol used by Apple’s iPhones, and one high-profile device that has been controversial since December of 2015: the iPhone used by the shooter of the San Bernardino, California terrorist attacks. The FBI has issued a court order to Apple, demanding that they provide or build a backdoor for iOS that will allow them to garner information from the device. Apple has refused, and has since been duking it out with the FBI in a series of court cases. This could set a precedent that’s much larger than this individual case.

On February 16th 2016, Apple’s CEO Tim Cook issued a statement calling for a public discussion of the issue at hand, and a declaration that Apple will not comply with this demand due to the larger implications of the decision. In the past, Apple has provided data that was already in their possession for help with certain FBI investigations, but this time, Apple claims that they cannot, and will not, build a vulnerability that could potentially compromise the security of their customers. As stated in the customer letter:

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

Apple’s letter continues to explain the importance of data security not only to Apple’s customers, but to any user of modern smartphones. Plus, as developers, building a backdoor or flaw directly into their software would be straight-up unethical, not to mention the dangers that could come from such an exploit falling into the wrong hands, like hackers or other criminals.

Apple isn’t alone in this endeavor, either; technology companies are lining up behind Apple in support of their fight against the FBI. With the support of Google, Microsoft, and many other Silicon Valley giants, Apple wants its message to be heard loud and clear; by purposely building backdoors into their technology, they would be betraying the trust of their consumers, and undermining the trust that we as a society have for technology in general.

This decision by Apple could have far-reaching consequences in the form of government entities being able to infringe on the privacy of consumers… that is, if the court rules in favor of the FBI. Such a ruling would put smartphone users at the mercy of legislation that forces tech developers to comply with backdoor requests on demand, which could put the entire concept of consumer privacy in jeopardy. Plus, what would happen if these backdoors fell into the hands of hackers? Nobody can guarantee that this won’t happen, and the possibility is frightening, to say the least.

Where do you stand on smartphone encryption? Do you think that Apple has made the right choice concerning this request? Let us know in the comments.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 08 May 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Internet Best Practices Technology Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Google Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Communication Hacking WiFi Facebook Operating System Microsoft Office Office The Internet of Things Backup Social Media Apps Business Continuity Bandwidth Disaster Recovery Experience Employer-Employee Relationship Two-factor Authentication History Small Business Mobile Device Management Money Network Phishing App Managed Service Provider Outlook Mobile Computing Big Data communications Safety Smartphones Unified Threat Management Quick Tips Wireless Technology Android Apple Firewall Best Practice Content Filtering Alert Cybercrime Website Networking Data storage Data Windows Education Google Docs Cleaning Holiday Hacker Processors Monitors Black Market YouTube Office Tips LiFi Staffing Application BYOD Downtime Customer Service Streaming Media Help Desk Displays Passwords Micrsooft Visible Light Communication Disaster Router Data Management Office 365 End of Support Business Growth Robot Advertising Recovery Analytics Saving Money Society Sports Spam Lithium-ion battery intranet Writing Google Wallet Information Technology Running Cable Windows 8 Internet of Things Windows XP IT Services Social Networking Hosted Solution Artificial Intelligence Documents Public Speaking IP Address Virtualization Tech Support Compliance Retail Drones Government Social Augmented Reality Keyboard Printer Browser Virtual Desktop Search Wireless User Managed IT services Unified Communications Securty Hard Drives Remote Computing Shortcut Document Management Encryption SaaS DDoS VoIP Bluetooth Law Enforcement Word Heating/Cooling Cortana Automation Proactive IT Memory Network Congestion Business Management Save Money Deep Learning Music Competition BDR Entrepreneur Cryptocurrency Laptop Presentation Domains IBM Vendor Management
QR-Code