FacebookTwitterGoogle+RedditEmail

Are Apple and Google Really on Your Side Against the NSA?

by

In the past couple of days both Google[i] and Apple[ii] have announced that they’re enabling default encryption on their mobile devices so that only the user possessing a device’s password can access its local files. The public relations team at Apple makes the following claim:

“Apple cannot bypass your passcode and therefore cannot access this data… So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8″

The marketing drones at Google issued a similar talking point:

“For over three years Android has offered encryption, and keys are not stored off of the device, so they cannot be shared with law enforcement… As part of our next Android release, encryption will be enabled by default out of the box, so you won’t even have to think about turning it on.”

Quite a sales pitch? Cleverly disguised as a news report no less. Though it’s not stated outright the tacit message is: open your wallet for the latest gadget and you’ll be safe from Big Brother. Sadly, to a large degree this perception of warrant protection is the product of Security Theater aimed at rubes and shareholders. The anti-surveillance narrative being dispensed neglects the myriad of ways in which such device-level encryption can be overcome. A list of such techniques has been enumerated by John Young, the architect who maintains the Cryptome leak site[iii]. Young asks readers why he should trust hi-tech’s sales pitch and subsequently presents a series of barbed responses. For example:

Because they can’t covertly send your device updated software [malware] that would change all these promises, for a targeted individual, or on a mass basis?

Because this first release of their encryption software has no security bugs, so you will never need to upgrade it to retain your privacy?

Because the US export control bureaucracy would never try to stop Apple from selling secure mass market proprietary encryption products across the border?

Because the countries that wouldn’t let Blackberry sell phones that communicate securely with your own corporate servers, will of course let Apple sell whatever high security non-tappable devices it wants to?

Because they want to help the terrorists win?

Because it’s always better to wiretap people after you convince them that they are perfectly secure, so they’ll spill all their best secrets?

Another thing to keep in mind is that local device encryption is just that. Local. As Bruce Schneier points out this tactic does little to protect user data that’s stored in the cloud[iv]. When push comes to shove executives will still be able to hand over anything that resides on corporate servers.

Marketing spokesmen are eager to create the impression that companies are siding with users in the struggle against mass surveillance (never mind the prolific corporate data mining[v]). Especially after business leaders denied participating in the NSA’s PRISM program. Yet the appearance of standing up to government surveillance is often a clever ploy to sell you stuff, a branding mechanism. It’s important to recognize that Internet companies, especially billion dollar hi-tech multinationals like Yahoo[vi] and Cisco[vii], exist to generate revenue and have clearly demonstrated the tendency to choose profits over human rights when it’s expedient.

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

End Note


[i] Craig Timberg, “Newest Androids will join iPhones in offering default encryption, blocking police,” Washington Post, September 18, 2014.

[ii] Craig Timberg, “Apple will no longer unlock most iPhones, iPads for police, even with search warrants,” Washington Post, September 18, 2014.

[iii] John Young, “Apple Wiretap Disbelief,” Cryptome, September 19, 2014.

[iv] Bruce Schneier, “iOS 8 Security,” Schneier on Security, September 19, 2014.

[v] Bill Blunden, “The NSA’s Corporate Collaborators,” Counterpunch, May 9-11, 2014.

[vi] Bill Blunden, “Corporate Executives Couldn’t Care Less About Civil Liberties,” Counterpunch, September 15, 2014.

[vii] Cindy Cohn and Rainey Reitman, “Court Lets Cisco Systems Off the Hook for Helping China Detain, Torture Religious Minorities,Electronic Frontier Foundation, September 19, 2014.

 

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

More articles by:

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

Weekend Edition
January 20, 2017
Friday - Sunday
Paul Street
Divide and Rule: Class, Hate, and the 2016 Election
Andrew Levine
When Was America Great?
Jeffrey St. Clair
Roaming Charges: This Ain’t a Dream No More, It’s the Real Thing
Yoav Litvin
Making Israel Greater Again: Justice for Palestinians in the Age of Trump
Linda Pentz Gunter
Nuclear Fiddling While the Planet Burns
Ruth Fowler
Standing With Standing Rock: Of Pipelines and Protests
David Green
Why Trump Won: the 50 Percenters Have Spoken
Dave Lindorff
Imagining a Sanders Presidency Beginning on Jan. 20
Pete Dolack
Eight People Own as Much as Half the World
Roger Harris
Too Many People in the World: Names Named
Steve Horn
Under Tillerson, Exxon Maintained Ties with Saudi Arabia, Despite Dismal Human Rights Record
John Berger
The Nature of Mass Demonstrations
Stephen Zielinski
It’s the End of the World as We Know It
David Swanson
Six Things We Should Do Better As Everything Gets Worse
Alci Rengifo
Trump Rex: Ancient Rome’s Shadow Over the Oval Office
Brian Cloughley
What Money Can Buy: the Quiet British-Israeli Scandal
Mel Gurtov
Donald Trump’s Lies And Team Trump’s Headaches
Kent Paterson
Mexico’s Great Winter of Discontent
Norman Solomon
Trump, the Democrats and the Logan Act
David Macaray
Attention, Feminists
Yves Engler
Demanding More From Our Media
James A Haught
Religious Madness in Ulster
Dean Baker
The Economics of the Affordable Care Act
Patrick Bond
Tripping Up Trumpism Through Global Boycott Divestment Sanctions
Robert Fisk
How a Trump Presidency Could Have Been Avoided
Robert Fantina
Trump: What Changes and What Remains the Same
David Rosen
Globalization vs. Empire: Can Trump Contain the Growing Split?
Elliot Sperber
Dystopia
Dan Bacher
New CA Carbon Trading Legislation Answers Big Oil’s Call to Continue Business As Usual
Wayne Clark
A Reset Button for Political America
Chris Welzenbach
“The Death Ship:” An Allegory for Today’s World
Uri Avnery
Being There
Peter Lee
The Deep State and the Sex Tape: Martin Luther King, J. Edgar Hoover, and Thurgood Marshall
Patrick Hiller
Guns Against Grizzlies at Schools or Peace Education as Resistance?
Randy Shields
The Devil’s Real Estate Dictionary
Ron Jacobs
Singing the Body Electric Across Time
Ann Garrison
Fifty-five Years After Lumumba’s Assassination, Congolese See No Relief
Christopher Brauchli
Swing Low Alabama
Dr. Juan Gómez-Quiñones
La Realidad: the Realities of Anti-Mexicanism
Jon Hochschartner
The Five Least Animal-Friendly Senate Democrats
Pauline Murphy
Fighting Fascism: the Irish at the Battle of Cordoba
Susan Block
#GoBonobos in 2017: Happy Year of the Cock!
Louis Proyect
Is Our Future That of “Sense8” or “Mr. Robot”?
Charles R. Larson
Review: Robert Coover’s “Huck out West”
David Yearsley
Manchester-by-the-Sea and the Present Catastrophe
FacebookTwitterGoogle+RedditEmail