Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form
Image of padlock against computer code

FBI vs. Apple: Fight for your right to bear encrypted devices

Posted on March 17, 2016March 17, 2016 By Davey Winder

The FBI is being disingenuous in demanding a backdoor from Apple says IT Security Thing; former counter terrorism head agrees

Writing an Op-Ed piece for IT Pro back when the whole San Bernardino iPhone affair kicked off, Davey Winder asked what if it was “less to do with if it is possible to comply with the FBI request, and more to do with forcing the removal of security functionality without having to bother with that democratic process nonsense?” The suggestion being that the FBI, and by implication the US government, were using the All Writs Act (from 1789) along with a relatively lowly magistrate judge, to bypass political and democratic processes. “Why bother with debates and votes to try and change the law when you can just haul something out of the dusty statute books,” Winder wrote, concluding “now that is where the real backdoor in this whole thing comes in…”

Richard Clarke, national security advisor and head of counter-terrorism to both US Presidents Clinton and Bush, has since gone on the record to agree with Winder and numerous other IT security experts, in suggesting that if the FBI wanted to get at the iPhone data they would have sent it to the NSA. “If I were in the job now, I would have simply told the FBI to call Fort Meade, the headquarters of the National Security Agency,” Clarke said. The “NSA would have solved this problem for them. They’re not as interested in solving the problem as they are in getting a legal precedent.”

Click here to read complete article

Encryption Tags:Apple, Encryption, FBI, iPhone, News, Privacy

Post navigation

Previous Post: Budget 2016: What about cybersecurity spending?
Next Post: Cyber-security ethics: the ex-hacker employment conundrum

Related Articles

Ingenious Hackers Used iPhone 13 To Steal Samsung Galaxy Crypto Key—Here’s How To Stop Them Analysis
LastPass Password Vaults Stolen By Hackers—Change Your Master Password Now Breach
New Gmail Encrypted Email Feature Confirmed By Google, Will You Get It? Announcements
Is Elon Musk Bringing Encrypted Messages To The $8 Twitter Blue Party? Analysis
Microsoft Tells Windows 10 BitLocker Users: Turn It Off And On Again Encryption
word cloud of crypto terms Quantum-powered random numbers could provide key to better cryptography Encryption

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government Hackers Hacking Health healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Twitter Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2025 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy