Apple Uses Surveillance To Detect Child Abuse

Apple has announced a new system for checking photos for abuse pictures to be carried out on a country-by-country basis. This process will be included in iPhones that will automatically scan devices to identify if they contain media featuring child sexual abuse. This initiative is part of a range of child protection features to be launched later this year in the US, which will be implemented through updates to iOS 15 and iPad OS and which will compare the images on users' devices to a database of known abuse images

Apple said it would implement to use the  new system to screens photos for such images before they are uploaded from iPhones in the United States to its iCloud storage. Child safety groups praised Apple as it joined Facebook Inc, Microsoft Corp, Alphabet Inc's Google in taking such measures.

Detection of child abuse image uploads sufficient to guard against false positiveswill trigger a human review of and report of the user to law enforcement, Apple said. It said the system is designed to reduce false positives to one in one trillion. Child safety groups praised Apple as it joined Facebook, Microsoft, Alphabet and Google in taking such measures. 

Apple's photo check on the iPhone itself raised concerns that the company is probing into users' devices in ways that could be exploited by governments. Many other technology companies check photos after they are uploaded to servers.

Apple's iPhones, iPads, and Macs will now also integrate the new system that checks images uploaded to iCloud in the US for known child sexual abuse images. That feature will use a cryptographic process that takes place partly on the device and partly on Apple's servers to detect those images and report them to the National Center for Missing and Exploited Children, or NCMEC, and ultimately US law enforcement.

 Apple has announced that it would make plans to expand the service based on the laws of each country where it operates.

The company said nuances in its system, such as "safety vouchers" passed from the iPhone to Apple's servers that do not contain useful data, will protect Apple from government pressure to identify material other than child abuse images. Apple will also implement a human review process that acts as a backstop against government abuse. The company will not pass reports from its photo checking system to law enforcement if the review finds no child abuse imagery.

Regulators are increasingly demanding that tech companies do more to take down illegal content. For the past few years, law enforcement and politicians have wielded the scourge of child abuse material to decry strong encryption, in the way they had previously cited the need to curb terrorism.

A few resulting laws, including in Britain, could be used to force tech companies to act against their users in secret.Facebook's WhatsApp, the world's largest fully encrypted messaging service, is also under pressure from governments that want to see what people are saying, and it fears that will now increase. WhatsApp chief Will Cathcart tweeted against Apple's plans for the new architecture.

"We've had personal computers for decades, and there has never been a mandate to scan the private content of all desktops, laptops or phones globally for unlawful content," he wrote. "It's not how technology built in free countries works.... This is an Apple built and operated surveillance system that could very easily be used to scan private content for anything they or a government decides it wants to control. Countries where iPhones are sold will have different definitions on what is acceptable”, he said.

Apple's experts argued that they were not really going into people's phones because data sent on its devices must clear multiple hurdles. For example, banned material is flagged by watchdog groups, and the identifiers are bundled into Apple's operating systems worldwide, making them harder to manipulate.

Critics suspect more complex motives in Apple's approach. They say the great technical lengths Apple has gone to to check images on a user's device, despite that process's privacy protections, only really make sense in cases where the images are encrypted before they leave a user's phone or computer and server-side detection becomes impossible.

In that case, Apple might easily extend the detection system to photos on users' devices that aren't ever uploaded to iCloud, a kind of on-device image scanning that would represent a new form of invasion into users' offline storage.

Reuters:      Wired:         Livemint:      NDTV:     Independent:   Yahoo:    

You Might Also Read: 

British Law To Protect Online Users:

 

 

« Pakistan’s New Cyber Security Policy
Alarming Surge In Malicious Apps »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Kennedys

Kennedys

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.