Backdoor Access To Apple User Data Condemned

US lawmakers and human rights advocates have united in making a strong condemnation what is being called the British government's "dangerous" and "shortsighted" request to be able to access encrypted data stored by Apple users worldwide in its cloud service. 

The order has been served by the Home Office under the Investigatory Powers Act, which compels firms to provide information to law enforcement agencies. Under the law, the demand by the Home Office cannot be made public.

Senator Ron Wyden and Congressman Andy Biggs have written to the  newly appointed US National Intelligence Director, Tulsi Gabbard, saying the demand threatens the privacy and security of the US. They urge her to give the British an ultimatum: "Back down from this dangerous attack on US cybersecurity, or face serious consequences."

International human rights organisations including Human Rights Watch (HRW) have condemned a recent order by the United Kingdom government demanding Apple provide access to encrypted user data.The order, reportedly issued by the UK Home Office in January 2025, targets Apple's Advanced Data Protection feature, which employs end-to-end encryption to secure cloud-stored data. 

"The United Kingdom government's order to Apple to allow access to encrypted cloud data harms the privacy rights of users in the UK and worldwide," Amnesty International and Human Rights Watch have said.

This uses end-to-end encryption, where only the account holder can access the data stored. Apple itself cannot see it. It is an opt-in service, and not all users choose to activate it.Apple said that that it views Privacy as a "Fundamental Human Right”, which is on their Website.

Senator Wyden and Congressman Biggs say agreeing to the request would "undermine Americans' privacy rights and expose them to espionage by China, Russia and other adversaries". They state that Apple does not make different versions of its encryption software for each country it operates in and, therefore, Apple customers in the UK will use the same software as Americans.

The UK government has that it does not want to start combing through everybody's data, but it would want to access it if there were a risk to national security and so it would focus on an individual, rather than using it for mass surveillance. British authorities would still have to follow a legal process, have a good reason and request permission for a specific account in order to access data - just as they do now with unencrypted data.

Apple has previously said it would pull encryption services like ADP from the UK market rather than comply with such government demands, telling Parliament it would "never build a back door" in its products.

WhatsApp, owned by Meta, has also said that  it would choose being blocked over weakening message security.
But even withdrawing the product from the UK might not be enough to ensure compliance, the Investigatory Powers Act applies worldwide to any tech firm with a UK market, even if they are not based there.

This change by the UK government has upset privacy campaigners, with Privacy International calling it an "unprecedented attack" on the private data of individuals. however,  the US government itself has also previously asked Apple to break its encryption as part of criminal investigations.

Washington Post   |   BBC   |   BBC   |   Andrew Biggs   |   Tribune India   

Image:  Şeyma D

You Might Also Read: 

Telegram Disables Features Used For Illegal Activity:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« Ukraine Warns Of Growing Russian Use Of AI In Cyberwar Operations
TikTok Returns To US App Stores »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.