Obama Says Apple's Technology Can't Be Inaccessible To The State

President Barack Obama recently said, that smartphones, like the iPhone the FBI is trying to force Apple to help it hack, must not be allowed to be "black boxes," inaccessible to the government. The technology industry, he said, should work with the government instead of leaving the issue to Congress.

"You cannot take an absolutist view on this," Obama said at the South by Southwest Festival in Austin, Texas. "If your argument is strong encryption no matter what, and we can and should create black boxes, that I think does not strike the kind of balance we have lived with for 200, 300 years, and it’s fetishizing our phones above every other value."

Obama’s appearance at the event known as SXSW, the first by a sitting president, comes as the FBI tries to force Apple Inc. to help investigators access an iPhone used by one of the assailants in December’s deadly San Bernardino, California, terror attack. Apple has appealed a magistrate court order that it assist the government, saying to do so would undermine its encryption technology.

Rapid technological advancements "offer us enormous opportunities, but also are very disruptive and unsettling," Obama said at the festival, where he hoped to persuade tech workers to enter public service. "They empower individuals to do things that they could have never dreamed of before, but they also empower folks who are very dangerous to spread dangerous messages."

Siding with Apple are technology companies including Amazon Inc., Microsoft Corp., Facebook Inc. and Google’s parent Alphabet Inc. On Thursday, the government filed a memorandum in the case arguing that Apple would need to assign as few as six workers for as little as two weeks to hack into Syed Farook’s phone.

“This burden, which is not unreasonable, is the direct result of Apple’s deliberate marketing decision to engineer its products so that the government cannot search them, even with a warrant,” government attorneys said in the filing.

‘Sloppy and Rushed’
Obama was interviewed at the festival by the CEO and editor in chief of the Texas Tribune, Evan Smith, who told him that "it looks to the tech community, or to some in the tech community, that government is the enemy" in its dealings with Apple. South by Southwest, now 30 years old, has grown from an event to highlight local musicians and artists into one of the nation’s largest and most popular technology conferences and film-and-music festivals.

The White House has backed the FBI in its fight with Apple, but has said Obama believes it is vital to balance privacy protections against the needs of law enforcement. Obama has not weighed in on legislation being drafted by Senate Intelligence Committee Chairman Richard Burr, a North Carolina Republican, and the senior Democrat on the panel, Dianne Feinstein of California, which would require companies to comply with court orders asking for assistance accessing encrypted data.

He indicated recently that he believes leaving the matter to lawmakers may not be ideal. The result would be "sloppy and rushed and it will go through Congress in ways that have not been thought through," he said.

Apple and other tech firms have said that building backdoors into their encrypted products could put them at a disadvantage to foreign competitors. They have also warned that China or other countries could demand similar cooperation with government investigations.

Without commenting on the Apple case, Obama dismissed those arguments, saying that for centuries law enforcement agencies have been able to search private property for evidence of crimes using a warrant.

"The question we now have to ask is, if technologically it is possible to make an impenetrable device or system, where the encryption is so strong there’s no key, there’s no door at all, then how do we apprehend the child pornographer? How do we solve or disrupt a terrorist plot?" Obama said. "If in fact you can’t crack that at all, government can’t get in, then everybody’s walking around with a Swiss bank account in their pocket." Compromise is possible, he said, and the technology industry must help design it.

"I suspect the answer is going to come down to, how do we create a system that, encryption is as strong as possible, the key is secure as possible, and it is accessible by the smallest number of people possible for the subset of issues that we agree is important," he said.

Recruiting Coders
It isn’t the first time his policies have caused the White House a headache at the Austin festival. In 2014, former NSA contractor Edward Snowden gave a virtual keynote speech from Russia on privacy rights. WikiLeaks editor-in-chief Julian Assange also spoke remotely to the conference that year.

Snowden’s leaks have complicated the encryption issue, Obama said, by "elevating people’s suspicions" of government surveillance. Still, White House officials believe that engagement with the technology sector is critical, especially if the administration is to recruit talented programmers to help modernize the federal government.

“Cooperation that exists between the government and the tech sector continues beyond the issue of encryption,” Jason Goldman, the White House’s chief digital officer, said on a conference call with reporters before Obama’s appearance.

In recent years, Obama has hired officials from companies including Microsoft, Alphabet, and Twitter Inc. to help repair the broken HealthCare.gov enrollment system and the byzantine Veterans Affairs claims processing system, among other assignments. The administration hopes the president’s appearance at SXSW can help replenish the ranks of hundreds of technology specialists who put their Silicon Valley careers on hold for public service.

Obama called HealthCare.gov "an example of the big and the bloated and frustrating" in government. When the website failed in October 2013, he said, it "was a little embarrassing for me because I was the cool early adopter president. My entire campaign had been premised on having really cool technology and social media and all that."

After fixing HealthCare.gov with the assistance of private-sector technology experts, "what we realized was we could potentially build a SWAT team, a world class tech office inside of the government, that was helping across agencies," Obama said. That became the US Digital Service.

Information-Management

« Former CIA Director Calls Out The FBI Over iPhone Backdoor
North Korea Denies Cyber Attacks On South Korea »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.