Apple responds to China’s claim iPhone is a ‘national security threat’

Apple's rebuttal against claims iPhone is a national security threat

 Apple's Beijing store. Credit: Liam Tung

Apple's Beijing store. Credit: Liam Tung

Apple has issued a cautious rebuttal to claims in a Chinese state media report that the iPhone is a national security threat due to a feature that keeps tabs on frequently visited locations.

In a statement posted to its China website on Saturday, Apple went to lengths to explain to its Chinese customers that the “Frequent Locations” feature in iOS 7 is not a security threat and that, unlike its rivals, Apple “does not depend on collecting large amounts of personal data about our customers”. 

“Apple does not track users’ locations – Apple has never done so and has no plans to ever do so,” the company said in its English translated statement.

Apple was responding to a CCTV report last Friday that criticised the iPhone being a potential “national security threat” due Frequent Locations collecting data about users' movements. A researcher was quoted as saying that if accessed, the data “could reveal an entire country’s economic situation and even state secrets”.

Given the importance of the Chinese market to Apple, the company chose its words carefully, saying that “we appreciate” the CCTV report.

Frequent Locations, which Apple introduced in iOS 7 to provide services like predictive traffic routing, keeps track of where the device has been as well as how often and when a user visited a place. According to Apple’s support page, data from the feature is “kept solely on your device and won't be sent to Apple without your consent.” Users can opt-in to send Apple data to improve Maps but by default the feature is off.

The security concerns raised in the report are not the first time Apple has been questioned over Frequent Locations. As IDG’s CITE World reported around the time of iOS 7’s launch, because the feature's data is stored on the device it could put enterprise organisations at risk if an attacker gained control of the device.

The other big worry among consumers at the time of its release — shortly after Edward Snowden leaked details of the National Security Agency’s PRISM surveillance program — was that any data sent to Apple’s servers could end up in the hands of the government.

The same fears about US technology and cloud services have been played out through multiple Chinese state media reports over the past few months accusing nearly every major US tech vendor of cooperating with US surveillance efforts.

Apple attempted to address all these issues in the statement, saying that Frequent Locations are only stored on a customer’s iOS device and are not backed up on iTunes or iCloud.

“Apple does not obtain or know a user’s Frequent Locations and this feature can always be turned “Off" via our privacy settings,” it said.

Addressing concerns over malicious attackers gaining access to the device, it also said it encrypts the cache on the device, which can only been seen once the user’s passcode has been entered.

“As we have stated before, Apple has never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will. It’s something we feel very strongly about,” it added.

US tech companies are already grappling with the fallout from Snoweden’s leaks in China, with IBM on the receiving end of a recently dropped lawsuit from US investors that attempted to link its falling server sales in China to alleged cooperation with US surveillance efforts. Cisco CEO John Chambers also fears for US tech companies abroad in light of Snowden’s leaks, while Microsoft has seen Windows 8 banned from Chinese government PCs.

‘Greater China’, encompassing China, Taiwan and Hong Kong, is Apple’s third largest market with revenues of $9.2 billion in the second quarter 2014 across the region counting for 20 percent of its global sales. With 13 percent year on year growth for that quarter, it’s also Apple’s second fastest growing region, accelerating at a much faster clip than its two biggest markets, the US and Europe. 

Follow Liam Tung on Twitter 

This article is brought to you by Enex TestLab, content directors for CSO Australia.

Join the CSO newsletter!

Error: Please check your email address.

Tags traffic routingsecurity threatNational Security Agency's PRISMciscoChinaiPhonedata collectionApple dataAppleios 7securityEdward Snowden

More about AppleCiscoCSOEnex TestLabIBM AustraliaIDGMicrosoftNational Security Agency

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Liam Tung

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place