Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

The decision in question refers to the encryption protocol used on Apple’s iPhones, and one device in particular: the iPhone used by the shooter in the San Bernardino, California terrorist attacks of December 2015. The FBI has issued a court order to Apple, asking them to provide and/or build a backdoor for iOS, in an attempt to garner information from the device used in those attacks. This request, and Apple’s vehement refusal, could set a precedent into motion that’s much larger than the case itself.

On February 16th 2016, Apple’s CEO Tim Cook issued a statement calling for a public discussion of the issue at hand, and a declaration that Apple will not comply with this demand due to the larger implications of the decision. Though Apple has conceded data that is in their possession in the past, they will not build something that they don’t currently have, and would potentially compromise the security of their customers. As stated in the customer letter:

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The letter continues to explain how important data security is for consumers of Apple products and such, claiming that creating a product that’s intentionally trying to undermine their own products would be both counter-productive and risky to all users of the iOS operating system. Even if this backdoor is asked for with only good intentions, there’s always the risk that the exploit could fall into the wrong hands.

More importantly, however, this denial by Apple could lead to legislation being passed which makes such a demand legal. If this happens, it would give the government extraordinary power over the users of smartphones. It would allow the government to request tech developers to provide backdoors on demand, which could, in turn, open up countless possibilities for espionage. However, what if these backdoors fell into the hands of hackers and others who might want a peek at any user’s sensitive information? That possibility is truly frightening.

What are your thoughts on smartphone encryption? Is Apple right to deny the FBI this request? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Miscellaneous Holiday Automation Artificial Intelligence Facebook Information Gadgets Training Compliance Cloud Computing Covid-19 Remote Work Server Outsourced IT Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Managed Services Mobile Office Data Security Employer-Employee Relationship Tip of the week Chrome Voice over Internet Protocol Budget Mobile Device Management Apple Networking Gmail App WiFi BYOD Computing Physical Security Applications Information Technology Access Control Office 365 Hacker Avoiding Downtime Conferencing Marketing Managed IT Services How To BDR HIPAA Router Risk Management Virtual Private Network Health Help Desk Analytics Office Tips Computers Augmented Reality Retail Storage 2FA Website Healthcare Password Bring Your Own Device Operating System Big Data Social Display Printer Paperless Office Infrastructure Monitoring Customer Service Document Management Windows 11 Managed IT Service Remote Workers Telephone Scam Data loss Excel Firewall Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Solutions Cybercrime VPN Employees Meetings YouTube Integration Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Customer Relationship Management Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Hacking Outlook Video Conferencing Presentation Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Wireless Technology Maintenance Downloads Antivirus Supply Chain Sports iPhone Mouse Licensing Word Administration Vulnerabilities Entertainment Images 101 Safety Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Data Privacy Content Filtering IT Management Network Congestion Specifications Security Cameras Application IT Maintenance Trend Micro Google Drive User Error Microchip Business Intelligence Internet Exlporer Software as a Service Fraud Knowledge Username Shortcuts Managing Costs IBM Point of Sale eCommerce Black Friday SSID 5G Ransmoware Google Docs Vendors Unified Communications Database Surveillance Virtual Assistant Experience Bitcoin Network Management Be Proactive Tech Support IT Technicians Virtual Machine Running Cable Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Workforce Threats Tactics Development Hotspot Transportation Competition Windows 8 Workplace Strategies Websites Mirgation Hypervisor Laptop Nanotechnology Optimization PowerPoint Drones Shopping Meta SharePoint Amazon Addiction Electronic Medical Records Language Employer/Employee Relationships Navigation User Management PCI DSS Chatbots Halloween Screen Reader Writing Distributed Denial of Service Lenovo Gig Economy Outsource IT Environment Service Level Agreement Internet Service Provider Media Virtual Reality Computing Infrastructure Teamwork Evernote Hacks Server Management Regulations Compliance Private Cloud Identity Scary Stories IP Address Identity Theft Smart Tech Memes Fun Superfish Bookmark Small Businesses Displays Deep Learning Download Net Neutrality Twitter Alerts SQL Server Recovery Financial Data Error History Education Connectivity IT Social Engineering Break Fix Hard Drives Browsers Smartwatch Outsourcing Upload Procurement Remote Computing Azure Domains Multi-Factor Security Tech Mobile Computing Social Network Telework Workplace Cyber security Tablet IoT Communitications Dark Web Search Refrigeration CES Hiring/Firing Best Practice Trends Supply Chain Management Paperless Alert Public Speaking Lithium-ion battery Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Co-managed IT File Sharing Regulations Buisness Technology Care IT solutions Star Wars IT Assessment How To Microsoft Excel Entrepreneur Legal Data Analysis Business Growth Gamification Flexibility Business Communications Notifications Staff Value Legislation Organization Scams Travel Social Networking Hybrid Work Google Maps Smart Devices Cortana Undo Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working Human Resources Wearable Technology Memory Comparison Google Play Health IT Cables Unified Threat Management Motherboard Data Breach Downtime Hosted Solution Assessment Electronic Health Records Permissions Unified Threat Management Directions Videos Typing Google Apps Wasting Time

Blog Archive