Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner.

Donald MacLeod: Difficult dilemma at the core of Apple’s face-off with the FBI

Apple iPhone (PA Archive)
Apple iPhone (PA Archive)

The Feds are demanding that  Apple design and plant a worm in their users’ encrypted software, which will give them unfettered access to any account.

In particular it will enable them to access the locked i-Phone of the mass killer and suspected terrorist Syed Farook who, along with his wife, went on the rampage in San Bernardino, California killing 14 and injuring 22 before being shot dead by the police.

Apple’s head honcho, Tim Cook, has said “no way, Jose” to the FBI’s unprecedented request and promised to fight a court order which compelled them to comply.

He said that any such decision to hack their own users’ accounts would “undermine decades of security advancement” and make Apple look rotten to the core.

He added it would be the equivalent of giving the FBI a master key – a key that many strongly believe would be used and abused by all manner of agencies, not just the FBI, and organised criminal gangs.

On that he really has a point because, as anyone with a computer that has been hit with spam and viruses will tell you, once a door is installed, it’s not long before some git tries to break in!

However, the FBI, equally, has a point – and a very serious one at that.

Apple, or any other technology company, should not be putting the privacy of terrorists ahead of public safety. The security services  have a duty to protect citizens from harm and should not be thwarted in their aims to do that.

Many people will say Apple should just do what the FBI want and open this murderer’s phone.

If only it was that simple.

Apple, in order to stay one step ahead of its competitors, re-engineered their mobile devices in 2014, making it virtually impossible to unlock an individual’s phone due to it being randomly encrypted.

So to now ask them to do just that on this killer’s phone would be quite a challenge – though not one that they couldn’t solve.

But that’s not all the FBI want, nor indeed our UK Goverment, which is quietly watching the
proceedings of this mega case with glee.

They want access to every single i-Phone, i-Pad and computer, and in an age when an individual’s personal details and life story – from credit card details to passport numbers, even alarm codes – are now stored on them that is an intrusive step that goes far too far.

If it’s on a case-by-case basis, and there is incontrovertible evidence and proof to back claims that an individual or individuals pose a risk to National Security then it goes without saying they should be given assistance to do their job.

If not then no!

They should definitely not be given carte blanche to spy, snoop and tap anyone and everyone when they see fit.

Because as the massive leaks from Julian Assange and Edward Snowden have clearly illustrated –as well as the news that a 15-year- old Scottish lad has been arrested for hacking into the FBI – these very security agencies are the worst at keeping their and indeed our information safe and secure.

They are at the very core of the problem and they could do no better than maybe asking Apple to help them make their systems become safer and more secure instead of attacking them for doing just that for their law-abiding customers.

If they did both Apple and the FBI might blossom.


READ MORE

Donald MacLeod: Nowadays we’ll sue at the drop of a hat… or the slip of a foot