TechCityMall

Get educated, inspired, and triggered in buying decisions across an array of tech-related product and service categories.

  • Home
  • Advertise Here
  • Privacy Policy
  • Contact Us
  • About Us


NG-[C:G.Prom,B:TWTW15,Wk:5015,Dim:320X50]:12:12


12/25/2015

BlackBerry CEO blasts Apple for focusing on user privacy, data protection

9:40:00 AM  NEWS  No comments

John Chen, chairman, chief executive officer and president of Sybase, Inc. talks on the floor of the New York Stock Exchange, May 20, 2010. REUTERS/Brendan McDermid (UNITED STATES - Tags: BUSINESS HEADSHOT) - RTR2E5RW 
 Security. It’s been BlackBerry’s last strength, the one thing the company could argue it did better than any other smartphone vendor in the market. BlackBerry knows this, which is why so much of its discussions of the Priv focused on how the company had hardened the basic Android OS to make it more secure at every level. Even now, BlackBerry is banking on the Priv as a secure smartphone rather than simply making a play in the me-too Android space.
That’s why it’s so baffling to see BlackBerry’s CEO, John Chen, torpedoing his company’s reputation for building secure products in a blog post he appears to have written himself. After discussing the debate between the tech industry and government officials pleading for backdoors, even if this leads to weaker encryption standards, Chen drops the following bombshell:

“In fact, one of the world’s most powerful tech companies [Apple] recently refused a lawful access request in an investigation of a known drug dealer because doing so would ‘substantially tarnish the brand’ of the company. We are indeed in a dark place when companies put their reputations above the greater good. At BlackBerry, we understand, arguably more than any other large tech company, the importance of our privacy commitment to product success and brand value: privacy and security form the crux of everything we do. However, our privacy commitment does not extend to criminals.” (emphasis original)

Chen goes on to note that BlackBerry rejects the notion that tech companies should refuse “reasonable, lawful access requests,” but claims that they should “reject attempts by federal agencies to overstep.” He claims that BlackBerry has found the proper balance between these two problems, and that the company is completely against any attempt to ban or limit the use of encryption.
In an ideal world, this is precisely the stance we want companies to take: Work with the government to catch the really bad guys, stand up against prosecutorial overreach, and advocate for the rights of your users. Ever since Edward Snowden started leaking information about how the NSA and FBI conduct mass surveillance, however, it’s been impossible to pretend we live in anything like that ideal world.
Here are some of the major problems with Chen’s position, in no particular order:

He assumes companies can challenge the government

One of the first things we learned from the Snowden leaks was just how powerless US corporations were to challenge the National Security Letters that the NSA and FBI levied against them. In 2007, Yahoo went all the way to FISC (Foreign Intelligence Surveillance Court) to challenge an order to produce user data. When it lost that case, it turned to the Court of Review, which oversees FISC decisions. It lost again. Yahoo was ordered to turn over all of the information the federal government wanted. It could not speak about the case or acknowledge having ever received an NSL.

Things have improved since then, slightly, in that companies and individuals have been granted some limited rights to acknowledge receiving an NSL. No one has suggested that they have the right to refuse to obey such orders, or that they can appeal such decisions to a meaningfully different body than the one that ruled in favor of them back in 2008.

He assumes government targets are criminals

The second problem with Chen’s argument is that it explicitly relies on the idea that there are “good users” and “criminals,” and that BlackBerry can either determine who these individuals are or simply trust the government to have done the job for them. Again, Snowden’s leaks make this a highly suspect conclusion.
We now know that the FBI has not only encouraged local police agencies to use stingrays in violation of a suspect’s 4th Amendment rights, it also told those police departments to refuse to turn over vital documents and information related to the use, capabilities, and function of that same hardware, all in the name of protecting NDAs with the Harris Corporation. We know that members of the NSA were not above spying on current and former lovers (jokingly referred to as LOVEINT within the organization).

Thanks to Snowden, we have information on how the NSA shared information with the DEA to help the latter conduct drug busts, even when it involved creating entirely new reasons for why certain vehicles were stopped (a practice referred to as “parallel construction”). Agents who engaged in this behavior were ordered not to disclose the source of their information.

Stingrays 

How stingrays work
By 2011, even the Fisa court was tired of the way the NSA was managing (or mismanaging) its databases and illegally collecting information on Americans without a warrant. The court noted in that ruling: “The court is troubled that the government’s revelations regarding N.S.A.’s acquisition of Internet transactions mark the third instance in less than three years in which the government has disclosed a substantial misrepresentation regarding the scope of a major collection program.”

The NSA and FBI have colluded with local police departments to misrepresent the nature and purpose of stingray equipment, to share evidence in ways that likely violated the 4th Amendment rights of the accused, and used their own databases of information in ways even the rubber-stamp court that approved their behaviors found troubling. Chen handwaves all of this.

He assumes there’s still a tightrope to walk

Chen’s entire position is based on the idea that a company can walk a fine line between protecting users and aiding the government. There is no objective evidence to suggest this is the case. The lawmakers and elected officials that have protested the growing use of encryption claim to want to use this power solely to find the worst criminals and baddest of the bad guys, but the ways these technologies have been used to date imply something different.

We’ve seen all of this before. The idea that encryption can be both back-doored (or front-doored) and secured is ludicrous, and the government knew as much during the Clipper chip fiasco of 25 years ago. The reason Apple, Google, and other companies have taken drastic action to lock down user devices, even against themselves, is precisely because these companies do not trust the government to confine itself to reasonable requests. And the NSA obligingly demonstrated that it wasn’t interested in anything approaching “reasonable” when it hacked into Google’s international fiber connections so it could monitor the company’s unencrypted traffic.

It's the smiley face that kills me.

It’s the smiley face that kills me.
The NSA already had the legal authority to demand information from Google on any user. Google had no authority to block that demand. Yet even this wasn’t sufficient for the NSA, which went behind the company’s back to seize additional data. Former NSA head Keith Alexander made absolutely no effort to hide the fact that he thought his organization should be sucking up every bit of information that ever wandered online.
Chen’s heart is in the right place, but it’s apparently stuck in pre-9/11 thinking. And given the stance he’s taken on these topics, and the reality of US law, he’s just destroyed any actual expectation that BlackBerry will protect user data. It’ll be interesting to see how this plays out with the Priv, because Google’s Android 6.0 Marshmallow requires full disk encryption by default. If BlackBerry enables the functionality on Priv devices that upgrade to Android 6.0, it’ll say something about where the company’s priorities lie. If it doesn’t… well, that sends a message, too.
Once upon a time, security was the thing BlackBerry was known for above all else. Based on Chen’s most recent remarks, I’d be looking for another vendor. Apple and Google understand the risks far better than BlackBerry.

Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home
Related Posts Widget

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Social Profiles

TwitterFacebookGoogle PlusLinkedInRSS FeedEmail
  • Popular
  • Tags
  • Blog Archives
  • Accessories
  • GAMING
  • LAPTOP
  • NEWS
  • REVIEW
  • SCIENCE
  • SELF-EDUCATION
  • Software
  • Tutorials





Namecheap.com
  • How to Turn Any Display Into a Touch Screen
    Touch screens are becoming a more popular feature on...
  • Learn Coding For Free With These 10 Sites
    Programming, or coding, is a vital skill that...
  • Samsung Invents A Screen On The Back Of Trucks To Show The Road Ahead
    Welcome to 2015. You are living in a world where a...
  • PhoneRescue Free Download
    PhoneRescue Free Download Latest Version for Windows. It is...
  • New iOS 9.2.1 update un-bricks iPhones, fixes ‘Error 53′
    ...


NG-[C:G.Vide,B:Allbrand,Wk:5015,Dim:160X600]:Televisions


Ads

Become Expert In Laptop Motherboard Repair!

American Trained Expert Takes You Step By Step Through Repairing Laptop Mb. Diagnosing Faults,troubleshooting Motherboard Power Problems, Upgrading, Component Level Repair, Removing Ics.

About Me

Unknown
View my complete profile

Contact Form

Name

Email *

Message *



NG-[C:G.Comp,B:Allbrand,Wk:5015,Dim:336X280]:Tablets


Archive

  • ►  2016 (72)
    • ►  November (5)
    • ►  October (1)
    • ►  September (6)
    • ►  July (17)
    • ►  May (1)
    • ►  April (1)
    • ►  March (6)
    • ►  February (24)
    • ►  January (11)
  • ▼  2015 (266)
    • ▼  December (256)
      • Why we can’t plug Southern California’s massive me...
      • Strangling Superfish: Microsoft will block ad-inje...
      • The Tech Stories That Surprised, Shocked, and Amus...
      • CES 2016 Preview: Smart Home Gadgets
      • Report: Samsung Pay Coming to Lower-Cost Phones
      • Phablets, iDevices Popular This Christmas
      • Updated Google Glass pops up on FCC’s website
      • Samsung TVs Will Control Your Smart Home
      • Privacy-as-a-Service Scatters Data in Disappearing...
      • BMW to Unveil AirTouch 3D Gesture Control System a...
      • Ashley Madison Adds 4 Million Users Since Hack
      • Mass Effect Andromeda Loses Senior Development Dir...
      • Comcast begins rolling out DOCSIS 3.1-based gigabi...
      • Save Big on a Samsung Galaxy Prevail Smartphone
      • Samsung Unveils New Bio-Processor For Fitness Wear...
      • MIT, Adobe aim to end ‘code rot’ by letting softwa...
      • Disney's VertiGo Robot Can Climb Walls
      • For VR to succeed, it needs evangelists. Will it g...
      • A new thought experiment shows how we could get in...
      • Rise of the Tomb Raider Coming to PC in January
      • Hyundai, others stumble with Apple CarPlay, Androi...
      • Tech That Should Excite (and Worry) You in 2016
      • North Korea’s Linux-based Red Star OS is as oppres...
      • Handy Android Alarm Feature Disappears
      • Who Put This Huge Database of U.S. Voting Records ...
      • The ArcaBoard is an extremely impractical $20,000 ...
      • Santa's Sleigh Was Full of Fitbits
      • Sorry, Zuck Is Not Sharing His Facebook Billions W...
      • Security Team Reportedly Collects $1M iOS 9 Bug Bo...
      • No 'Force Awakens' DLC for Star Wars Battlefront
      • Judge Throws Out 'iMessage Purgatory' Case
      • What Is 4K (Ultra HD)?
      • Yahoo to Issue Alerts About State-Sponsored Attacks
      • Hyatt Hit With Malware on Payment Processing Systems
      • How Businesses Can Make Sense of the Big Data Market
      • Comcast Launches First DOCSIS 3.1 Network
      • 2016 HR Tech Forecast: Data Analytics, Wearables, ...
      • Samsung Launches Galaxy A9 in China: Giant Screen,...
      • How to Put Your To-Do List Into Google Calendar
      • Exploit Logs You Into Linux Systems After Hitting ...
      • Get a Free 32-Inch TV When You Buy a Galaxy Phone ...
      • Apple's Tim Cook Defends Encryption, Makes Privacy...
      • 2.5% of U.S. Employees Work from Home
      • Facebook Now Supports Apple Live Photos
      • Rumor: Google, Ford Teaming Up on Self-Driving Cars
      • Report: Get Free Spotify Premium... Inside a Tesla...
      • Don't Buy a Microsoft Surface, Buy This Instead
      • A Closer Look at Microsoft's HoloLens
      • The ArcaBoard: $20K, Six Hours of Charging, Six Mi...
      • Android 6.0.1 Ruined My Google Nexus 6P
      • How ISPs Are Failing Americans
      • YouTube: T-Mobile Is Throttling Video Traffic
      • Report: Google Eyeing AI-Infused Messaging App
      • Watch LeBron James Train (in Virtual Reality)
      • Electronic Arts' Servers Briefly Go Offline
      • Sony Helping Out With PlayStation Vita Port of The...
      • Yikes: The 12 Biggest Tech Fails of 2015
      • Smart Home: Living Room
      • 3 Big Car Tech Trends From 2015
      • The state of gaming in 2016: Here’s what to expect
      • TechCityMall explains: What is DirectX 12?
      • Qualcomm may have inked exclusive deal to put Snap...
      • How to Get Superfast Mouse, Touchpad Speeds in Win...
      • Try the knowledge-based Wolfram Language for free ...
      • The 10 most technically impressive games of 2015
      • How to Turn Any Display Into a Touch Screen
      • Martin Shkreli, so-called ‘Pharma Bro,’ arrested b...
      • Apple and Samsung Top Rescuecom's Latest Laptop Re...
      • Customer, FCC complaints signal huge problems with...
      • BlackBerry CEO blasts Apple for focusing on user p...
      • What is blockchain, and can IBM, Intel, and big ba...
      • Lenovo Y700 (17 Inch) Review
      • Closest habitable planet may be just 14 light year...
      • How to Snap Windows in Chrome OS
      • Curiosity uncovers mysterious minerals in Martian ...
      • How We Test Tablets
      • Microsoft Issues Ban on Insecure Adware
      • Sorting through wireless music’s dizzying array of...
      • Man sues Bethesda over Fallout 4 addiction
      • How to Fetch Any File on a Remote Computer with On...
      • Science fiction handwaving just got real with the ...
      • How to Control Which OneDrive Files Are Available ...
      • NASA postpones next Mars mission for at least two ...
      • Out of the Box Tips: Set Up Your New Laptop Like a...
      • Samsung, GlobalFoundries to fab next-gen AMD GPUs,...
      • How to Create Table Templates in Microsoft Word
      • How to Activate Windows 10's God Mode
      • Why stars explode, creating the universe as we kno...
      • Laptop and Tablet Warranties: What They Cover
      • Google developing AI-based messaging service: Report
      • Latest Windows 10 update erases Word customization...
      • How to Install Windows 10 Apps to an SD Card or US...
      • The Lunar Reconnaissance Orbiter snapped this amaz...
      • SpaceX Falcon 9 rocket launch now scheduled for th...
      • ESA schedules James Webb Space Telescope for Octob...
      • Sony plans to boost battery performance 40 percent...
      • What are prime numbers, and why are they so vital ...
      • Exploring the ‘Death Star’ space gun America never...
      • Every iPad Pro Keyboard Shortcut You'll Ever Need
      • AMD finally unveils an open-source answer to Nvidi...
    • ►  November (10)
NG-[C:G.Prom,B:Allbrand,Wk:4915,Dim:300X250]:Home_Page

 
Copyright © 2025 TechCityMall | Powered by Blogger
Design by Robin Khay | Blogger Theme by