Page Loader Logo
Loading...
833-847-3280
Schedule a Call
Partner With Us

Technology CEOs and the Apple Critical Data Unlock

Unlike many technology CEOs, I have NOT been on the fence regarding the request by the federal government for Apple to unlock its phone for them to access critical data regarding the atrocious crimes committed by the Jihadists in California. I have always felt that it’s the technology industry’s responsibility to protect data as much as possible in order to protect privacy and grow their companies and it is not their job to give up that data in order to assist the US Government with investigations. The reason to me is clear, if these companies compromise their relationships with customers in this way, the fiscal price they will pay will be dear, companies will die, jobs will go away and the whole tech industry will suffer.

But that doesn’t mean that the Government shouldn’t be able to hack their technology to protect this nation, after all, I am a Green Beret… and a patriot.

And now that they have, they tell the whole world about it… and now that hack is useless and I ask the question, “WHY?”

Modern warfare, or the ever changing terms for it i.e. unconventional warfare, asymmetric warfare etc, requires that we identify and leverage every advantage we can find. When our government agencies act like petulant kids and whine cause Apple or anyone else won’t give them a “back door” or free data, it bother me. There is no doubt that the data on that phone was valuable and should have been in the FBI’s possession. But instead of whining and going the easy way (and then bowing up and going to court when they didn’t get their way), what the FBI should have done is man up and use Apple’s refusal as a license to do what they should have done in the first place:

Hack the f#$% out of them…

And then shut the hell up about it.

I have said over and over, it is the Government’s role to protect us, but how do you protect a public, when you constantly advertise your successes so that a mobile, amorphous and now informed enemy does not use compromised platforms and just moves on to use technology that is ever more challenging. From IEDs, to the use of Social Media and now hacking cell phones, we have basically told the bad guys “hey man, don’t use this anymore, we are watching”. It’s frustrating and I am absolutely positive that ISIS, Al Qaeda, child molesters and more are checking the OS on their I phone and moving onto different platforms to use, systems that we now have to hack all over again. Not to mention the lives that have been lost because some military commander, politician or government official couldn’t help but brag about how we “kicked some ass”.

We have some of the best minds, largest computers, covert organizations and endless resources (as long as we keep spending our kid’s money) to identify the technologies being used and hack them. I don’t care how many brainiacs that Steve Jobs had working at Apple, they are human and they make mistakes. As I have said over and over again, where there are human beings there are flaws and Apple, Google, Microsoft, you name your technology, are no different. These technologies can be penetrated and hacked.

We didn’t ask for the keys to the Enigma code from the Nazis during WWII, don’t ask for the keys now, make your damn own and lock em up. And allow American businesses to do what they are best at, innovate, create value and dominate this industry and leave them alone.

BTAR

Latest Posts

A transparent image used for creating empty spaces in columns
Welcome to today’s briefing on a crucial topic in the realm of cybersecurity: internal network penetration testing. Now, I know that the term might sound a bit intimidating but fear not. By the end of this discussion, you’ll have a solid understanding of what it…
A transparent image used for creating empty spaces in columns
 In the world of cybersecurity, there’s a misconception that a clean pen testing report means something was missed or the test wasn’t thorough enough. But here’s the truth: receiving a clean report from your penetration test is not only a positive outcome—it’s a testament…
A transparent image used for creating empty spaces in columns
Hey there, folks! Let’s get one thing straight: when MainNerve talks about penetration testing, we’re diving deep into the world of cybersecurity. But hey, we know what people think when we say “penetration testing.” So, buckle up because we’re about to compare pen testing to…
A transparent image used for creating empty spaces in columns
 In the fast-paced world of managed IT services, we know that time is money. Your clients rely on you to keep their systems secure, and you need partners who can deliver top-notch services without slowing you down. If you’re a Managed Service Provider (MSP)…
A transparent image used for creating empty spaces in columns
The primary purpose of performing a penetration test is to simulate real-world attacks on a computer system, network, or application. This is done by skilled cybersecurity professionals, who are tasked with identifying vulnerabilities and weaknesses that malicious actors could exploit. Their role is crucial in…
A transparent image used for creating empty spaces in columns
 If your business relies on older technology, you’ll want to listen up. We’re highlighting a critical weakness in many organizations’ defenses: legacy systems. What Are Legacy Systems? Legacy systems are outdated technologies that are no longer supported with updates or patches from their creators.…
contact

Our Team

Name(Required)
This field is for validation purposes and should be left unchanged.
quick links to

Our Services

On Load
Where? .serviceMM
What? Mega Menu: Services
201 E Pikes Peak Ave Suite 2025
Colorado Springs, CO 80903