CLICK BELOW TO REDISCOVER HUMANITY

Homeland Security & The Apple Debacle – Privacy vs. Security

appleWe are law-abiding, when we are not! We also cherish our personal privacy but not the privacy of others. And, we are all worried about the threats to homeland security posed by both domestic and foreign terrorists, but we aren’t sure what to do about it.

We want security, and we want freedom. This being said, the fight between Apple and the government over cell phone privacy is finally taking shape as a monumental court case that may determine our future security and our future freedom.

The crux of the issue is the recent advances by Apple and other manufacturers of cell phones to make their products more ‘secure.’ Until now, all cell phones could be ‘cracked,’ and the information store on them, including texts, contacts, pictures and calls, could be accessed both by Apple and by anyone else.

Android phones were the same way, and in fact the operating system could also be modified.

In the past year, all this has changed. An Apple phone now locks out everyone after 10 tries with the wrong password. Apple claims even Apple cannot break the encryption.

Google is going in the same direction with the Android based phones. Both types of phones do not encrypt calls and texts. The Apple claim is its customers demand safe and secure phones and that privacy is a ‘right.’

The government chooses to differ. But, first, let’s go over how an encrypted cell phone can be used for nefarious purposes. This is not by any means a complete list, but it is enlightening. In no particular order, consider the following:

Phones as Triggers for Bombs & Other Devices

We see this all the time on NCIS and other crime shows all over television. Properly hooked up to just about any device, a phone, when called or when the alarm feature goes off, can send an electrical signal to another device to trigger just about anything.

It was the device of choice for setting off a bomb as part of the Madrid commuter train bombings in 2004. At least one of the bombs and perhaps others used a mobile phone (Mitsubishi Trium) as a timer, requiring a SIM card to activate the alarm and thereby detonate.

Read more at Women’s Voices Magazine

 

📩 STAY ON TOP OF THE LATEST ◀︎ CLICK HERE ▶︎ TO ENJOY @BC360° TODAY DELIVERED TONIGHT 📩

Dr. Robert Schmid
Dr. Robert Schmidhttp://www.cybersecuretech.com/matrix/
DR. ROBERT Schmid is the Founder of CyberSecure Technologies. His expertise on Internet security includes 9/11 related recovery issues, anti-terrorism issues, corporate and personal internet security. He has a Ph.D. and MBA from New York University, and his initial foray into the world of security was with the CIA.

3 COMMENTS

  1. is it my imagination – or is your article cut short ?

    As for which side am I on – the side of MY privacy. the government and corporations demonstrate over and over that they CANNOT be trusted. they really can’t. it isn’t going to change.

    .. and when talking about tech don’t forget apps like what’s app, it isn’t just the OS.

    BTW – google says they are secure – but their model is a bit different to Apple’s – they can get at your messages if the govt asks …. they have to – because their business model depends on it.

    and BTW – lets say the govt forces apple to give them a back door – are they going to enforce the NON US providers to give them back doors aswell ? how will that go down exactly?

    and there’s so much more … look forward to part two

    • You’re absolutely right. The article is cut short and the rest can be accessed through the link to Women’s Voices Magazine.

      As for my point of view on privacy issues, as a general rule I support personal privacy as much as reasonably possible. I do, however, believe that in a functioning democracy based on laws we have all participated in making, the courts can and should address privacy issues. No defendant in a legal case should be denied their freedom because of the abstract right to privacy.

      I also believe that as an individual, the only way my rights can be protected and enforced are through our ccommon government. Corporations have no vested interest in our privacy despite what Apple and others may say. There interest is profit, they are controlled by the top 1%, and if it made them more money they would throw away the privacy of all of us in the 99%

      As a journalist on tech issues, I try to report what I see and how it can be interperted.

▼ EXCLUSIVE FREE ONLINE EVENTS ▼

▼ ESSENTIAL READING ▼