Former CIA Director Calls Out The FBI Over iPhone Backdoor

The FBI’s demand that Apple create a custom version of iOS that would allow them to hack into the iPhone of one of the San Bernardino terrorists has Americans firmly divided into two camps.

According to a recent poll conducted by NBC and The Wall Street Journal, 42% of respondents said Apple should cooperate with the FBI while 47% of those polled sided with Apple. 11% of respondents, meanwhile, indicated that they weren’t sure which party to side with.

While this is to be expected given the contentious nature of the issue, it’s interesting to note that former US Government security officials haven’t been so quick to reflexively side with the FBI. For instance, former CIA chief James Woolsey recently explained in an interview on CNBC that the FBI in this case isn’t just interested in accessing information on this particular iPhone. On the contrary, Woolsey articulated that the FBI is looking for the ability to effectively dictate what type of mobile OS Apple is able to release for the iPhone.

“The last time I looked into the language on this with some care, it did seem to me as if the FBI was trying to get a right essentially to effectively decide what kind of an operating system Apple was going to have, and that they were not just trying to get into one phone,” Woolsey said. “They were trying to change some important aspect of Apple’s operating system… The agency should not have the right to restructure Apple’s iOS in perpetuity.”

This is a point Apple has been trying to drive home over the past few weeks; if the FBI is successful in this case, what’s to stop them from demanding Apple to create all sorts of modified versions of iOS in the future.

As Apple noted in its motion to vacate brief filed a few weeks back:
If Apple can be forced to write code in this case to bypass security features and create new accessibility, what is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone’s user? Nothing.

Woolsey’s comments on the issue aren’t too far off from what former NSA and CIA head Michael Hayden had to say on the matter a few weeks back.
“I think [FBI Director] Jim Comey is wrong, Woolsey said in an interview last month. “Jim’s logic is based on the belief that he remains the main body. That you should accommodate your movements to him, which is the main body. And I’m telling you, with regard to the cyber domain, he’s not. You are.”

BGR: http://bit.ly/1pOcJac

« Is Apple Right To Resist The FBI?
Obama Says Apple's Technology Can't Be Inaccessible To The State »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Ivolv Cybersecurity

Ivolv Cybersecurity

Ivolv is here to assist your organization in building effective protection and resilience against cyber attacks.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.

Foresights

Foresights

Foresights is a Nordic company utilizing advanced intelligence tradecraft and extensive cyber security capabilities to deliver services and advisory tailored to our client’s critical requirements.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.