{"id":25414,"date":"2016-03-18T14:30:54","date_gmt":"2016-03-18T03:30:54","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=25414"},"modified":"2016-03-17T13:45:23","modified_gmt":"2016-03-17T02:45:23","slug":"apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/","title":{"rendered":"Apple versus the State: finding the sweet spot in the encryption debate"},"content":{"rendered":"

\"Image<\/p>\n

Last week I gave a conference presentation examining how the public and private sectors work together, and at times clash, on issues of national security. Using <\/span>Rod Lyon\u2019s excellent schematic<\/span><\/a>, I examined how the private sector fits into the debate around how to achieve both security and liberty. To do this, I examined the issue through the lens of the current clash between the US government and Apple over encryption that\u2019s playing out through the media. The case illustrates that while both the public and private sectors are focused on the same goal of security for the \u2018citizen\u2019 or \u2018customer\u2019, different interpretations of what is meant by security can create friction. This piece will be the first in a three part series examining the case itself, some of the political messaging that\u2019s emerging as a consequence, and finally what the consequences of the case will be for national security.<\/span><\/p>\n

Good cyber security is essential for the growing digital economy. Everyone stands to benefit from less cybercrime, espionage or online disruption. If online services are delivered seamlessly in a secure and trusted environment, confidence in online marketplaces and products can be improved. A safe and supportive operating space is also conducive in the creation of new businesses and sowing the seeds of innovation, and enables us to communicate with confidence that unwanted prying eyes won\u2019t be able to read our communications. Yet for the government and the private sector, it can be tough to coordinate and prioritise such outcomes into mutually beneficial practice. That was made more problematic by the negative impact that Snowden\u2019s revelations had on the dialogue between big US tech industry companies and the US Government on matters of national security.<\/span><\/p>\n

Reflective of the difficulty of achieving what Rod calls the <\/span>sweet spot<\/span><\/a> for security and liberty is America\u2019s current <\/span>war of words<\/span><\/a> and legal proceedings relating to the encryption debate. Acting upon their interpretation of the \u2018sweet spot\u2019, Apple and a range of other high profile companies and software developers have increased the availability of encryption. While increased cyber security is a goal for both governments and private companies such as Apple, their motivations vastly differ.<\/span><\/p>\n

For Apple, the increased encryption in their software was aimed at both protecting their customers from cybercrime and unwanted attention from governments. It also served as an important selling point to a customer base who increasingly demanded privacy in the wake of the 2013 Snowden revelations. Other motivations included regaining share price in a market that was suspicious of US firms perceived to be cooperating with the US government. Apple declared its independence in particularly dramatic fashion by developing encryption for the iOS8 operating system in 2014 that let consumers set their own passcode. This meant that Apple couldn\u2019t hand the government an encryption \u2018key\u2019 because it simply didn\u2019t have one.<\/span><\/p>\n

The US government contends that more encryption plays into the hands of terrorists and criminals by offering them a degree of anonymity, and introducing challenges for evidence collection. They see that move as compromising broader national security. <\/span>Jim Lewis makes an important case<\/span><\/a> that the US government aren\u2019t looking to create \u2018backdoors\u2019 in software, but rather that law enforcement agencies want the unencrypted plaintext when access has been authorised by law.<\/span><\/p>\n

The issue is now coming to a head after Apple refused a court order to assist the FBI with unlocking an iPhone that belonged to one of the San Bernardino gunmen. <\/span>Apple CEO Tim Cook has argued<\/span><\/a> that such a move could set a \u2018dangerous\u2019 precedent and diminish the privacy that their customers have come to expect from Apple products. <\/span><\/p>\n

Critics, <\/span>of which there are many<\/span><\/a>, argue that Apple’s position does a <\/span>disservice to the victims<\/span><\/a> of the shooting and potentially makes citizens less safe by limiting the amount of relevant data that law enforcement authorities can access in difficult national security cases like this. While many in the tech community have stood behind Apple, the general public remains fiercely divided on the issue, with <\/span>recent surveys<\/span><\/a> illustrating the schism in public opinion.<\/span><\/p>\n

The thing about encryption is that it has <\/span>so many valid uses<\/span><\/a>, functioning as the essential enabler of an increasingly digital world. It allows people to establish their identity reliably, and keeps transactions out of criminals\u2019 reach. Even the <\/span>FBI\u2019s Director James Comey recognises this<\/span><\/a>, stating, \u2018I love encryption, I love privacy\u2026 when I hear corporations saying we will take you to a world where no one can look at your stuff, part of me thinks that\u2019s great. I don\u2019t want anyone looking at my stuff\u2019.<\/span><\/p>\n

The outcome from the current Apple case will have wide reaching impacts for security and privacy, not just in America but in markets across the world\u2014including here in Australia. It\u2019s imperative, regardless of the outcome, that we maintain conversation between the private and public sectors. This is a time when increased dialogue and trust building is needed, not less. Despite differing motivations, we should remember that both the public and private sectors are working to achieve the same goal, a safe and secure society and online environment. However, finding that mutually agreeable sweet spot could be made difficult by the outcomes of this case.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

Last week I gave a conference presentation examining how the public and private sectors work together, and at times clash, on issues of national security. Using Rod Lyon\u2019s excellent schematic, I examined how the private …<\/p>\n","protected":false},"author":49,"featured_media":25415,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1570,127],"class_list":["post-25414","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-encryption","tag-terrorism"],"acf":[],"yoast_head":"\nApple versus the State: finding the sweet spot in the encryption debate | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple versus the State: finding the sweet spot in the encryption debate | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Last week I gave a conference presentation examining how the public and private sectors work together, and at times clash, on issues of national security. Using Rod Lyon\u2019s excellent schematic, I examined how the private ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-18T03:30:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-17T02:45:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/15051866795_4e210bffde_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tobias Feakin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tobias Feakin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/15051866795_4e210bffde_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/15051866795_4e210bffde_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Image courtesy of Flickr user Maurizio Pesce\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/\",\"name\":\"Apple versus the State: finding the sweet spot in the encryption debate | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#primaryimage\"},\"datePublished\":\"2016-03-18T03:30:54+00:00\",\"dateModified\":\"2016-03-17T02:45:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple versus the State: finding the sweet spot in the encryption debate\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\",\"name\":\"Tobias Feakin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"caption\":\"Tobias Feakin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple versus the State: finding the sweet spot in the encryption debate | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/","og_locale":"en_US","og_type":"article","og_title":"Apple versus the State: finding the sweet spot in the encryption debate | The Strategist","og_description":"Last week I gave a conference presentation examining how the public and private sectors work together, and at times clash, on issues of national security. Using Rod Lyon\u2019s excellent schematic, I examined how the private ...","og_url":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-03-18T03:30:54+00:00","article_modified_time":"2016-03-17T02:45:23+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/15051866795_4e210bffde_z.jpg","type":"image\/jpeg"}],"author":"Tobias Feakin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tobias Feakin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/15051866795_4e210bffde_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/15051866795_4e210bffde_z.jpg","width":640,"height":427,"caption":"Image courtesy of Flickr user Maurizio Pesce"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/","url":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/","name":"Apple versus the State: finding the sweet spot in the encryption debate | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#primaryimage"},"datePublished":"2016-03-18T03:30:54+00:00","dateModified":"2016-03-17T02:45:23+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/apple-versus-the-state-finding-the-sweet-spot-in-the-encryption-debate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Apple versus the State: finding the sweet spot in the encryption debate"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd","name":"Tobias Feakin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","caption":"Tobias Feakin"},"url":"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25414"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=25414"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25414\/revisions"}],"predecessor-version":[{"id":25416,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25414\/revisions\/25416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/25415"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=25414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=25414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=25414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}