SlideShare a Scribd company logo
1 of 2
Download to read offline
Apple could face heat from police on refusing data access, 
expert says 
Apple's tight privacy strategy on devices running its iOS 8 operating system will make life more 
difficult for law enforcement, warns one retired police official. 
"It absolutely puts another hurdle in the path of law enforcement," Raymond Foster, a retired LAPD 
lieutenant, told FoxNews.com, adding that the tech giant may face pushback from law enforcement 
agencies. "Apple could ultimately, if someone decides that it's enough of a problem, face legislation 
saying 'you can't do that.'" 
In a privacy statement on its website, Apple explains that customer data such as photos, messages, 
email, contacts and call history is protected by each individual's passcode on iPhones and iPads 
running iOS 8. "Unlike our competitors, Apple cannot bypass your passcode and therefore cannot 
access this data," it says. "So it's not technically feasible for us to respond to government warrants 
for the extraction of this data from devices in their possession running iOSÂ 8." 
Foster, author of the book "Police Technology," notes that critical evidence such as a drug dealer's 
accounts or child pornography, is often held on mobile devices such as smartphones. 
Apple says that 93 percent of the requests it receives from law enforcement come in the form of a 
"device request," where officers are working on behalf of a customer to locate a stolen device. 
According to Apple, just 7 percent of the requests it receives are "account requests," where law 
enforcement is seeking customer account information. 
Less than 0.00385 percent of Apple 
customers have had data disclosed due 
to government information requests, 
according to the statement. 
However, the statement provides little 
clarity on how Apple handles national 
security requests. The Cupertino, Calif.- 
based firm notes that national security-related 
requests are not considered 
either device or account requests, and 
"are reported in a separate 
category altogether." 
Apple's iOS 8 privacy move will not impact police wiretapping efforts, according to Foster. "What 
Apple is doing in no way affects wiretaps, because the wiretap goes to the service provider," he said. 
"They are not a service provider, they are a device provider." 
Civil liberties groups have welcomed Apple's stance, which comes hot on the heels of the 
cyberattack that targeted the iCloud accounts of celebrities such as Jennifer Lawrence and Kate
Upton. Apple subsequently strengthened its iCloud security, although CEO Tim Cook blamed the 
attack on a phishing scam, as opposed to a weakness in the company's systems. 
In a letter posted on Apple's website on 
Wednesday, CEO Tim Cook outlined the 
company's desire to protect its customers' 
information. "We have never worked with any 
government agency from any country to create 
a backdoor in any of our products or services," 
he wrote. "We have also never allowed access 
to our servers. And we never will." 
Follow James Rogers on Twitter @jamesjrogers

More Related Content

Similar to Apple could face police pushback over iOS 8 privacy protections

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and securityGolden Locksmith
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Apple Legal process guidelines US
Apple Legal process guidelines USApple Legal process guidelines US
Apple Legal process guidelines USLudovic Privat
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Running head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS .docx
Running head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS             .docxRunning head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS             .docx
Running head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS .docxjeanettehully
 
Smartphone kill switch now required in California
Smartphone kill switch now required in CaliforniaSmartphone kill switch now required in California
Smartphone kill switch now required in Californiajazzybaby4843
 
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesTelcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesJohn Davis
 
Apple removes controversial child abuse detection tool from its website
Apple removes controversial child abuse detection tool from its websiteApple removes controversial child abuse detection tool from its website
Apple removes controversial child abuse detection tool from its websiteaditi agarwal
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Chelsea Porter
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption disputeHaniAbdallah4
 
Clinical Interview Role-PlayAssignment ContentTop of FormRev.docx
Clinical Interview Role-PlayAssignment ContentTop of FormRev.docxClinical Interview Role-PlayAssignment ContentTop of FormRev.docx
Clinical Interview Role-PlayAssignment ContentTop of FormRev.docxmccormicknadine86
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorLapSafe Products
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftOlivia Farrow
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxvrickens
 

Similar to Apple could face police pushback over iOS 8 privacy protections (20)

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Apple Legal process guidelines US
Apple Legal process guidelines USApple Legal process guidelines US
Apple Legal process guidelines US
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Running head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS .docx
Running head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS             .docxRunning head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS             .docx
Running head SOCIAL, ETHICAL, AND LEGAL IMPLICATIONS .docx
 
Smartphone kill switch now required in California
Smartphone kill switch now required in CaliforniaSmartphone kill switch now required in California
Smartphone kill switch now required in California
 
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure RulesTelcos and ISPs Prepare For New Data Breach Disclosure Rules
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
 
Apple removes controversial child abuse detection tool from its website
Apple removes controversial child abuse detection tool from its websiteApple removes controversial child abuse detection tool from its website
Apple removes controversial child abuse detection tool from its website
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Clinical Interview Role-PlayAssignment ContentTop of FormRev.docx
Clinical Interview Role-PlayAssignment ContentTop of FormRev.docxClinical Interview Role-PlayAssignment ContentTop of FormRev.docx
Clinical Interview Role-PlayAssignment ContentTop of FormRev.docx
 
AppleinChina
AppleinChinaAppleinChina
AppleinChina
 
09 09 2014
09 09 201409 09 2014
09 09 2014
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public Sector
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
 

Apple could face police pushback over iOS 8 privacy protections

  • 1. Apple could face heat from police on refusing data access, expert says Apple's tight privacy strategy on devices running its iOS 8 operating system will make life more difficult for law enforcement, warns one retired police official. "It absolutely puts another hurdle in the path of law enforcement," Raymond Foster, a retired LAPD lieutenant, told FoxNews.com, adding that the tech giant may face pushback from law enforcement agencies. "Apple could ultimately, if someone decides that it's enough of a problem, face legislation saying 'you can't do that.'" In a privacy statement on its website, Apple explains that customer data such as photos, messages, email, contacts and call history is protected by each individual's passcode on iPhones and iPads running iOS 8. "Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data," it says. "So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8." Foster, author of the book "Police Technology," notes that critical evidence such as a drug dealer's accounts or child pornography, is often held on mobile devices such as smartphones. Apple says that 93 percent of the requests it receives from law enforcement come in the form of a "device request," where officers are working on behalf of a customer to locate a stolen device. According to Apple, just 7 percent of the requests it receives are "account requests," where law enforcement is seeking customer account information. Less than 0.00385 percent of Apple customers have had data disclosed due to government information requests, according to the statement. However, the statement provides little clarity on how Apple handles national security requests. The Cupertino, Calif.- based firm notes that national security-related requests are not considered either device or account requests, and "are reported in a separate category altogether." Apple's iOS 8 privacy move will not impact police wiretapping efforts, according to Foster. "What Apple is doing in no way affects wiretaps, because the wiretap goes to the service provider," he said. "They are not a service provider, they are a device provider." Civil liberties groups have welcomed Apple's stance, which comes hot on the heels of the cyberattack that targeted the iCloud accounts of celebrities such as Jennifer Lawrence and Kate
  • 2. Upton. Apple subsequently strengthened its iCloud security, although CEO Tim Cook blamed the attack on a phishing scam, as opposed to a weakness in the company's systems. In a letter posted on Apple's website on Wednesday, CEO Tim Cook outlined the company's desire to protect its customers' information. "We have never worked with any government agency from any country to create a backdoor in any of our products or services," he wrote. "We have also never allowed access to our servers. And we never will." Follow James Rogers on Twitter @jamesjrogers