FacebookTwitterGoogle+RedditEmail

Are Apple and Google Really on Your Side Against the NSA?

by

In the past couple of days both Google[i] and Apple[ii] have announced that they’re enabling default encryption on their mobile devices so that only the user possessing a device’s password can access its local files. The public relations team at Apple makes the following claim:

“Apple cannot bypass your passcode and therefore cannot access this data… So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8″

The marketing drones at Google issued a similar talking point:

“For over three years Android has offered encryption, and keys are not stored off of the device, so they cannot be shared with law enforcement… As part of our next Android release, encryption will be enabled by default out of the box, so you won’t even have to think about turning it on.”

Quite a sales pitch? Cleverly disguised as a news report no less. Though it’s not stated outright the tacit message is: open your wallet for the latest gadget and you’ll be safe from Big Brother. Sadly, to a large degree this perception of warrant protection is the product of Security Theater aimed at rubes and shareholders. The anti-surveillance narrative being dispensed neglects the myriad of ways in which such device-level encryption can be overcome. A list of such techniques has been enumerated by John Young, the architect who maintains the Cryptome leak site[iii]. Young asks readers why he should trust hi-tech’s sales pitch and subsequently presents a series of barbed responses. For example:

Because they can’t covertly send your device updated software [malware] that would change all these promises, for a targeted individual, or on a mass basis?

Because this first release of their encryption software has no security bugs, so you will never need to upgrade it to retain your privacy?

Because the US export control bureaucracy would never try to stop Apple from selling secure mass market proprietary encryption products across the border?

Because the countries that wouldn’t let Blackberry sell phones that communicate securely with your own corporate servers, will of course let Apple sell whatever high security non-tappable devices it wants to?

Because they want to help the terrorists win?

Because it’s always better to wiretap people after you convince them that they are perfectly secure, so they’ll spill all their best secrets?

Another thing to keep in mind is that local device encryption is just that. Local. As Bruce Schneier points out this tactic does little to protect user data that’s stored in the cloud[iv]. When push comes to shove executives will still be able to hand over anything that resides on corporate servers.

Marketing spokesmen are eager to create the impression that companies are siding with users in the struggle against mass surveillance (never mind the prolific corporate data mining[v]). Especially after business leaders denied participating in the NSA’s PRISM program. Yet the appearance of standing up to government surveillance is often a clever ploy to sell you stuff, a branding mechanism. It’s important to recognize that Internet companies, especially billion dollar hi-tech multinationals like Yahoo[vi] and Cisco[vii], exist to generate revenue and have clearly demonstrated the tendency to choose profits over human rights when it’s expedient.

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

End Note


[i] Craig Timberg, “Newest Androids will join iPhones in offering default encryption, blocking police,” Washington Post, September 18, 2014.

[ii] Craig Timberg, “Apple will no longer unlock most iPhones, iPads for police, even with search warrants,” Washington Post, September 18, 2014.

[iii] John Young, “Apple Wiretap Disbelief,” Cryptome, September 19, 2014.

[iv] Bruce Schneier, “iOS 8 Security,” Schneier on Security, September 19, 2014.

[v] Bill Blunden, “The NSA’s Corporate Collaborators,” Counterpunch, May 9-11, 2014.

[vi] Bill Blunden, “Corporate Executives Couldn’t Care Less About Civil Liberties,” Counterpunch, September 15, 2014.

[vii] Cindy Cohn and Rainey Reitman, “Court Lets Cisco Systems Off the Hook for Helping China Detain, Torture Religious Minorities,Electronic Frontier Foundation, September 19, 2014.

 

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:
July 26, 2016
Andrew Levine
Pillory Hillary Now
Kshama Sawant
A Call to Action: Walk Out from the Democratic National Convention!
Russell Mokhiber
The Rabble Rise Together Against Bernie, Barney, Elizabeth and Hillary
Jeffrey St. Clair
Don’t Cry For Me, DNC: Notes From the Democratic Convention
Angie Beeman
Why Doesn’t Middle America Trust Hillary? She Thinks She’s Better Than Us and We Know It
Paul Street
An Update on the Hate…
Fran Shor
Beyond Trump vs Clinton
Ellen Brown
Japan’s “Helicopter Money” Play: Road to Hyperinflation or Cure for Debt Deflation?
Richard W. Behan
The Banana Republic of America: Democracy Be Damned
Binoy Kampmark
Undermining Bernie Sanders: the DNC Campaign, WikiLeaks and Russia
Arun Gupta
Trickledown Revenge: the Racial Politics of Donald Trump
Sen. Bernard Sanders
What This Election is About: Speech to DNC Convention
David Swanson
DNC Now Less Popular Than Atheism
Linn Washington Jr.
‘Clintonville’ Reflects True Horror of Poverty in US
Deepak Tripathi
Britain in the Doldrums After the Brexit Vote
Louisa Willcox
Grizzly Threats: Arbitrary Lines on Political Maps
Robert J. Gould
Proactive Philanthropy: Don’t Wait, Reach Out!
Victor Grossman
Horror and Sorrow in Germany
Nyla Ali Khan
Regionalism, Ethnicity, and Trifurcation: All in the Name of National Integration
Andrew Feinberg
The Good TPP
400 US Academics
Letter to US Government Officials Concerning Recent Events in Turkey
July 25, 2016
Sharmini Peries - Michael Hudson
As the Election Turns: Trump the Anti-Neocon, Hillary the New Darling of the Neocons
Ted Rall
Hillary’s Strategy: Snub Liberal Democrats, Move Right to Nab Anti-Trump Republicans
William K. Black
Doubling Down on Wall Street: Hillary and Tim Kaine
Russell Mokhiber
Bernie Delegates Take on Bernie Sanders
Quincy Saul
Resurgent Mexico
Andy Thayer
Letter to a Bernie Activist
Patrick Cockburn
Erdogan is Strengthened by the Failed Coup, But Turkey is the Loser
Robert Fisk
The Hypocrisies of Terror Talk
Lee Hall
Purloined Platitudes and Bipartisan Bunk: An Adjunct’s View
Binoy Kampmark
The Futility of Collective Punishment: Russia, Doping and WADA
Nozomi Hayase
Cryptography as Democratic Weapon Against Demagoguery
Cesar Chelala
The Real Donald Trump
Julian Vigo
The UK’s Propaganda Machinery and State Surveillance of Muslim Children
Denis Conroy
Australia: Election Time Blues for Clones
Marjorie Cohn
Killing With Robots Increases Militarization of Police
David Swanson
RNC War Party, DNC War Makers
Eugene Schulman
The US Role in the Israeli-Palestine Conflict
Nauman Sadiq
Imran Khan’s Faustian Bargain
Peter Breschard
Kaine the Weepy Executioner
Weekend Edition
July 22, 2016
Friday - Sunday
Jeffrey St. Clair
Good as Goldman: Hillary and Wall Street
Joseph E. Lowndes
From Silent Majority to White-Hot Rage: Observations from Cleveland
Paul Street
Political Correctness: Handle with Care
Richard Moser
Actions Express Priorities: 40 Years of Failed Lesser Evil Voting
Eric Draitser
Hillary and Tim Kaine: a Match Made on Wall Street
FacebookTwitterGoogle+RedditEmail