Exactly backwards: Apple's security statement is more a PR coup than a nightmare

Once again it is time to play: Willfully Obtuse or Really That Clueless?! Why is it always so hard to tell?

Writing for Business Insider, James Cook goes all-in on the police's side of the story on smartphone encryption. Surely in this environment of concern about government spying on citizens and the militarization of the police, there's nothing to be lost by taking the anti-privacy, pro-police side. That's just common sense. After all, if you have nothing to hide...

"POLICE: Apple Will Become The Phone Of Choice For The Pedophile'" (tip o' the antlers to ghibby!)

You mean it isn't already? (Cue Business Insider piece on how Apple's doomed because it's missing out on key markets.)

Apple's PR nightmare on the issue of warrants for iPhones just keeps getting worse.

Seriously. He wrote that. Apple published a letter in which it pledges to protect its customers information and Business Insiders Cook (and other BI punchlines) think this is a PR "nightmare" for Apple.

What do you even do with something like that? Print it out and light it on fire, just to watch it burn?

Actually, that's not a bad idea.

Speaking to the Washington Post, [chief of detectives for Chicago's police department] John J. Escalante said, "Apple will become the phone of choice for the pedophile. The average pedophile at this point is probably thinking, I've got to get an Apple phone."

That is some world-class hissy fit throwing. John Gruber said it best:

The pedophile card is pretty much the last resort for these law enforcement types who feel entitled to the content of our digital devices. Fear mongering with bogeymen and an appeal to base emotions.

Privacy is a protected right in this country. We shouldn't have to be told we're siding with the pedophiles because members of law enforcement want their jobs to be easier. It's supposed to be hard to overcome someone's right to privacy.

Previously, James Comey, the director of the FBI, said "What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law."

Is having a private conversation also placing yourself "beyond the law"?

"Really, we'd prefer it if everything everywhere were recorded and we had full access to it. Also, don't look us in the eye. We're like wolves and we consider that threatening. Thanks much. Love, Law Enforcement."

The point being, this is a PR issue rather than a tech issue at the moment: Apple's new stance on privacy and encryption has gone down poorly with law enforcement...

Who cares? Is it somehow illegal? No. Do customers like it? Yes. Does Cook mention that side of this PR "nightmare"? Hahahahaha nooooooo.

Not even a giant government data collection scandal is enough to overcome the "APPLE FAIL" glasses worn by the intrepid band of writers at Business Insider!

Really, how completely backwards could you get this?

Join the CSO newsletter!

Error: Please check your email address.

Tags tim cookMacalopeiossecurityiPhone 6 PlussmartphonesiPhonesoftwareoperating systemsiphone 6consumer electronics

More about AppleApple.FBI

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by The Macalope

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts