247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

The Apple vs FBI saga rumbles on

by Josef Kafka

Last week saw round three of Apple vs the FBI, as the pair moved their battle from the courts to the inner sanctums of Washington DC. Arguments on both sides still rage over the privacy issues surrounding government law enforcement demands that Apple help them hack the iPhones of terrorists, criminals and other suspicious types. The argument has changed slightly since the FBI hired an Israeli company that claimed it could crack Apple's products without the Cupertino firm's help. However, the FBI is still pursuing Apple for more assistance. 

The ongoing arguments in Washington, at a Congressional hearing (http://www.nytimes.com/2016/04/20/technology/fbi-iphone-apple-house-encryption-hearing.html?_r=0), are helping to stoke the debate around encryption and cybersecurity, with more device makers, and software and service developers adding encryption to their products. In response, the US government is considering a bill that will force technology companies to decrypt customer data if asked by a court. Given the current situation, that will push those companies to release unbreakable products, so they cannot decrypt any information, as Apple insisted was the case with newer iPhone devices. 

Further north in Canada, BlackBerry has been quizzed this week by the press after it turned out that encrypted messages were read as part of a criminal investigation. The company denies its encryption has been broken, but BlackBerry CEO John Chen said that the company complies with reasonable lawful access requests for customer data. This highlights the thin line between believing a product is secure (and BlackBerry is still used by many government workers due to its encryption features) and finding out that messages can still be accessed. 

Security increasing for apps and services

Even if many users don't really notice, encryption is rapidly spreading across websites, smartphones and online services. Google's own Blogger.com popular blogging service recently enabled "https://" connections, joining banks, email, online stores and many more in providing an encrypted link between the user and server. This makes it harder for hackers and spies to monitor what we do online and will be increasingly common over any type of online connection. Even our own site now creates a secure connection by default, to highlight how much we value customer privacy, security and discretion.

Most individuals are more concerned about being hacked, or having their data stolen than they are about government snooping, and are increasing their efforts to protect themselves. Use of VPN services is rising fast, allowing users to create a secure tunnel through all the public networks that our data travels over to reach the server securely. 

Security is also a strong selling point for many types of products. Skype rival Viber recently announced that its online communications, calling and messaging app now creates secure connections, with end-to-end encryption for its online phone calls and chats. However, just adding some security may not be enough for some. People are still concerned about being able to check the validity of the other person. Some communication services like WhatsApp allow users to digitally confirm who they are talking to. So, beware of security hype and check that any products you plan to install are truly secure before signing up. 

The cost of convenience vs security

Much of this security goes on without us really noticing, and in some cases, like smartphone fingerprint recognition, actually speeds up and improves the user experience. However, if governments really start to crack down on consumer technology security, with some more extreme politicians around the world planning to ban encrypted products, being secure will require jail-breaking devices, adding nominally illegal apps to add encryption and so on. Many people will find that deeply inconvenient and simply risk being exposed to criminals and fraud, for which they can thank their government! 

All of this activity takes place against a background of major telecommunication and IT companies continuing to supply governments with customer information on a case by case basis, usually based on a warrant. Bulk data collection still takes place in the background by government intelligence agencies, but that outcry seems to be being replaced by the encryption issue. 

Governments and security services will position their arguments carefully; do you want your data secure and easy to access compared to the small risk of a criminal case where you are the victim, and the suspect cannot be charged because the police cannot access incriminating data as evidence? Or, there is the even smaller risk of being caught up either at home or abroad in a terrorist bombing campaign, because security services couldn't intercept their messages. 

Whoever ends up on the wrong side of that argument will be used by police and governments as valid reasons for encryption being weakened or removed from technology products. It will be a fierce argument settled in courts on the deepest of technicalities, but for now in the current climate, everyone should ensure their data is protected because being secure is the only option, protecting users from criminals and thieves, which far outweighs the other risks.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu