833-847-3280
Schedule a Call

Technology CEOs and the Apple Critical Data Unlock

Unlike many technology CEOs, I have NOT been on the fence regarding the request by the federal government for Apple to unlock its phone for them to access critical data regarding the atrocious crimes committed by the Jihadists in California. I have always felt that it’s the technology industry’s responsibility to protect data as much as possible in order to protect privacy and grow their companies and it is not their job to give up that data in order to assist the US Government with investigations. The reason to me is clear, if these companies compromise their relationships with customers in this way, the fiscal price they will pay will be dear, companies will die, jobs will go away and the whole tech industry will suffer.

But that doesn’t mean that the Government shouldn’t be able to hack their technology to protect this nation, after all, I am a Green Beret… and a patriot.

And now that they have, they tell the whole world about it… and now that hack is useless and I ask the question, “WHY?”

Modern warfare, or the ever changing terms for it i.e. unconventional warfare, asymmetric warfare etc, requires that we identify and leverage every advantage we can find. When our government agencies act like petulant kids and whine cause Apple or anyone else won’t give them a “back door” or free data, it bother me. There is no doubt that the data on that phone was valuable and should have been in the FBI’s possession. But instead of whining and going the easy way (and then bowing up and going to court when they didn’t get their way), what the FBI should have done is man up and use Apple’s refusal as a license to do what they should have done in the first place:

Hack the f#$% out of them…

And then shut the hell up about it.

I have said over and over, it is the Government’s role to protect us, but how do you protect a public, when you constantly advertise your successes so that a mobile, amorphous and now informed enemy does not use compromised platforms and just moves on to use technology that is ever more challenging. From IEDs, to the use of Social Media and now hacking cell phones, we have basically told the bad guys “hey man, don’t use this anymore, we are watching”. It’s frustrating and I am absolutely positive that ISIS, Al Qaeda, child molesters and more are checking the OS on their I phone and moving onto different platforms to use, systems that we now have to hack all over again. Not to mention the lives that have been lost because some military commander, politician or government official couldn’t help but brag about how we “kicked some ass”.

We have some of the best minds, largest computers, covert organizations and endless resources (as long as we keep spending our kid’s money) to identify the technologies being used and hack them. I don’t care how many brainiacs that Steve Jobs had working at Apple, they are human and they make mistakes. As I have said over and over again, where there are human beings there are flaws and Apple, Google, Microsoft, you name your technology, are no different. These technologies can be penetrated and hacked.

We didn’t ask for the keys to the Enigma code from the Nazis during WWII, don’t ask for the keys now, make your damn own and lock em up. And allow American businesses to do what they are best at, innovate, create value and dominate this industry and leave them alone.

BTAR

Latest Posts

A transparent image used for creating empty spaces in columns
Let’s be honest about something that doesn’t get said often enough in polite compliance conversations: the healthcare industry has been getting away with inadequate data security for a very long time. Patients hand over their most sensitive personal information every time they walk through a…
A transparent image used for creating empty spaces in columns
Most small business owners think about a data breach the same way they think about a house fire. They know it happens to people. They know it would be bad. They assume it probably won’t happen to them, and even if it did, their insurance…
A transparent image used for creating empty spaces in columns
When organizations invest in penetration testing, they’re often unsure what to expect from the process. A recent online discussion raised an important question: “Is our pen test provider’s approach normal, or are we getting shortchanged?” It’s a fair concern. Unlike compliance audits, penetration tests don’t…
A transparent image used for creating empty spaces in columns
If you work in healthcare or support organizations that handle patient data, you’ve probably heard that HIPAA is changing in 2026. The short version is that this is the most significant overhaul to the Security Rule since it was first introduced in 2003, and the…
A transparent image used for creating empty spaces in columns
There’s a post making rounds in the pen testing community that’s sparking strong reactions. Someone without an OSCP, in a country where it costs as much as a car, decided they weren’t going to wait for permission to start pen testing. They grabbed the certifications…
A transparent image used for creating empty spaces in columns
You’re planning next year’s security budget, and a question comes up: should we stick with the same penetration testing provider we’ve been using, or switch to a new one? Some organizations rotate testers annually. Others work with the same provider for years. Both approaches have…
contact

Our Team

This field is for validation purposes and should be left unchanged.
Name(Required)
On Load
Where? .serviceMM
What? Mega Menu: Services