Former CIA Director Calls Out The FBI Over iPhone Backdoor

The FBI’s demand that Apple create a custom version of iOS that would allow them to hack into the iPhone of one of the San Bernardino terrorists has Americans firmly divided into two camps.

According to a recent poll conducted by NBC and The Wall Street Journal, 42% of respondents said Apple should cooperate with the FBI while 47% of those polled sided with Apple. 11% of respondents, meanwhile, indicated that they weren’t sure which party to side with.

While this is to be expected given the contentious nature of the issue, it’s interesting to note that former US Government security officials haven’t been so quick to reflexively side with the FBI. For instance, former CIA chief James Woolsey recently explained in an interview on CNBC that the FBI in this case isn’t just interested in accessing information on this particular iPhone. On the contrary, Woolsey articulated that the FBI is looking for the ability to effectively dictate what type of mobile OS Apple is able to release for the iPhone.

“The last time I looked into the language on this with some care, it did seem to me as if the FBI was trying to get a right essentially to effectively decide what kind of an operating system Apple was going to have, and that they were not just trying to get into one phone,” Woolsey said. “They were trying to change some important aspect of Apple’s operating system… The agency should not have the right to restructure Apple’s iOS in perpetuity.”

This is a point Apple has been trying to drive home over the past few weeks; if the FBI is successful in this case, what’s to stop them from demanding Apple to create all sorts of modified versions of iOS in the future.

As Apple noted in its motion to vacate brief filed a few weeks back:
If Apple can be forced to write code in this case to bypass security features and create new accessibility, what is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone’s user? Nothing.

Woolsey’s comments on the issue aren’t too far off from what former NSA and CIA head Michael Hayden had to say on the matter a few weeks back.
“I think [FBI Director] Jim Comey is wrong, Woolsey said in an interview last month. “Jim’s logic is based on the belief that he remains the main body. That you should accommodate your movements to him, which is the main body. And I’m telling you, with regard to the cyber domain, he’s not. You are.”

BGR: http://bit.ly/1pOcJac

« Is Apple Right To Resist The FBI?
Obama Says Apple's Technology Can't Be Inaccessible To The State »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.