{"id":3328,"date":"2016-09-18T07:14:08","date_gmt":"2016-09-18T11:14:08","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3328"},"modified":"2016-09-18T07:14:08","modified_gmt":"2016-09-18T11:14:08","slug":"how-did-fbi-hack-terrorists-iphone-news-groups-sue-to-find-out","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/18\/how-did-fbi-hack-terrorists-iphone-news-groups-sue-to-find-out\/","title":{"rendered":"How did FBI hack terrorist&#8217;s iPhone? News groups sue to find out"},"content":{"rendered":"<p>When the government was able to unlock the San Bernardino shooter&#8217;s iPhone, they backed off of their\u00a0demands that Apple assist with the breaking into the device. \u00a0They did not,\u00a0however, provide Apple with details into <em>how<\/em> they were able to unlock the iPhone. \u00a0In my opinion, and apparently the opinion of\u00a0the\u00a0Associated Press, Gannett Satellite Information Network (\u201dUSA TODAY\u201d), and Vice Media, this is a disservice to the millions of taxpayers that use iOS devices. \u00a0These organizations are suing the FBI for not disclosing how they were able to break into the phone. \u00a0This leaves potentially millions of iOS devices exposed to the vulnerability that allowed the FBI to obtain access to a locked iPhone.<\/p>\n<p>The\u00a0NIST Cybersecurity Framework, a government published\u00a0set of standards, encourages information sharing about vulnerabilities and threats between private and public organizations. \u00a0I am a strong advocate of this principal because as\u00a0companies\u00a0work together to share information to protect against cyber threats, the benefits of increased security extends beyond the walls of the organization that identified the cyber threat. \u00a0It also helps us to collectively solve for vulnerabilities that are identified and shared.<\/p>\n<p>In this case, however the FBI appears to be withholding information about the vulnerability for their own benefit. \u00a0If they publicly share the method in which they were able to unlock the device (or even privately with Apple), the folks in Cupertino will almost certainly\u00a0address the security flaw immediately.<\/p>\n<p>There is a fine balance between strong security and enabling our law enforcement to investigate, however I am not in favor of providing back doors to law enforcement and withholding security flaws that leave millions exposed.<\/p>\n<p>Article links:<\/p>\n<p>https:\/\/www.cnet.com\/news\/fbi-sued-over-apple-iphone-hack-by-vice-ap-gannett\/<\/p>\n<p>https:\/\/www.documentcloud.org\/documents\/3109606-16-Cv-1850-Dkt-No-1-Complaint.html<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When the government was able to unlock the San Bernardino shooter&#8217;s iPhone, they backed off of their\u00a0demands that Apple assist with the breaking into the device. \u00a0They did not,\u00a0however, provide Apple with details into how they were able to unlock the iPhone. \u00a0In my opinion, and apparently the opinion of\u00a0the\u00a0Associated Press, Gannett Satellite Information Network [&hellip;]<\/p>\n","protected":false},"author":11274,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715345],"tags":[],"class_list":{"0":"post-3328","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-04-enterprise-architecture","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11274"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3328"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3328\/revisions"}],"predecessor-version":[{"id":3329,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3328\/revisions\/3329"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}