WikiLeaks Reveals Apple Sends Customer Data To Government ´Thousands Of Times Every Month´
The radical transparency organization WikiLeaks, revealed through an email of Hillary Clinton´s campaign chairman John Podesta, that hi-tech company Apple gives their customer´s data information to the U.S. government "thousands of times every month." The message was sent by Apple´s vice-president of environment, policy and social initiatives, Lisa Jackson.
— WikiLeaks (@wikileaks) 26 de octubre de 2016
Apple´s Message To Podesta
Although this could be seen as something that could hurt its image, the details showed in Jackson´s email are in concordance with Apple´s transparency report in the second half of 2015, in which it was explained how the company received 4009 law enforcement requests linked to its devices, and it provided information in 80 percent of those cases.
"Thousands of times every month, we give governments information about Apple customers and devices, in response to warrants and other forms of legal process. We have a team that responds to those requests 24 hours a day. Strong encryption does not eliminate Apple's ability to give law enforcement meta-data or any of a number of other very useful categories of data," Jackson told in the email.
The message was sent as the company was preparing to speak out against the U.K. Investigatory Powers Bill that would require Apple to hold a key to encrypted smartphones and services such as iMessage and FaceTime, as reported by the International Business Times. Although it may seems as an incredible surprise, considering Apple´s stance on encryption and privacy, the email only shows Jackson reaching out Podesta to thanks Clinton for her position on the matter.
What remains a mystery in the letter is what type of data Apple can provide to the Federal Bureau of Investigation or any spy agency, giving the fat that the definition of "meta-data" varies. For instance, a subject field or even an email address could be easily described as "meta-data", so it is unknown which exact information is given.
The Entire Email
Hi John, I wanted to reach out to say thanks for the principled and nuanced stance the Secretary took last night on encryption and the tech sector. Leadership at Apple certainly noticed and I am sure that is true though out the Valley.
Please know that Apple will continue its work with law enforcement. We share law enforcement's concerns about the threat to citizens and we work closely with authorities to comply with legal requests for data that have helped solve complex crimes. Thousands of times every month, we give governments information about Apple customers and devices, in response to warrants and other forms of legal process. We have a team that responds to those requests 24 hours a day. Strong encryption does not eliminate Apple's ability to give law enforcement meta-data or any of a number of other very useful categories of data.
Tonight, Tim and Apple will be featured on "60 Minutes." We expect encryption and taxes to be covered. In previews, Tim reacts strongly to the EU tax investigation of Apple and other American companies. We will amplify encryption messaging tomorrow when we publicly release our comments on the draft UK Investigatory Powers bill.
Best wishes to you and your family and the HRC family for a peaceful and joyous holiday season and a prosperous and bright 2016.
WikiLeaks And The 2016 US Presidential Elections: Why America Seems Intent On Silencing Julian Assange
If Julian Assange really has nothing to show for, why does it seem like the U.S. is doing everything it can to silence him?
WikiLeaks Relased First Bach of Barack Obama´s Documents And His Personal Email Address
The leaked documents revealed some conversations between Obama and John Podesta before he became president.
Apple And IBM Launch Their First Education App
This incredible app could achieve one of Bill Gates´ long-term innovation requests.
Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing “undetectable assassinations” by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples’ cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
CIA’s ‘Vault 7’ WikiLeak Files Released On Twitter; Details Inside
With the number of CIA documents recently being leaked to the public, what’s the truth behind the allegations that WikiLeak was behind such posts trove of CIA documents detailing mass hacking? Could it pave the way for other top secret files from CIA to be uncovered soon? Here’s what authorities have to say
MORE IN ITECHPOST
Fitness Expert, Jolene Cherry, Explains How to Build Good Fitness Habits Using Tech
Cherry explores several different technology gizmos and gadgets to keep in mind when the initial burst of fitness motivation runs dry.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?