Apple’s refusal to provide technical tools to unlock the San Bernardino iPhone is based only on a “marketing strategy” rather than a legal rationale, said the U.S. Department of Justice. Wrong, and not just for the Constitutional reasons just stated by Ted Olson on This Week. The argument that all of the hundreds of expert commentators on this largest of all tech privacy issues have not been talking about until now is that information security in the service of privacy is also the law, an area of the law regulated in the U.S. by a host of federal and state regulators jumping all over each other to protect individual privacy. And if some of those regulators stood up for the principles to which they adhere when otherwise regulating the private sector, not only could the resolution of this issue be substantially influenced, but the U.S. could lead the world in the protection of privacy at a point both in its international relations and its political history when it could use that principled leadership.
Unlock FTC Standards?
Unlock Global Restraints on Surveillance?
These are of course complex issues that will require a lot more analysis as the facts and law relating to this case become more clear. I thought it might be worth raising them now, though, particularly since the guy who after winning South Carolina last night has been pronounced the unstoppable nominee of his party for the office of President of the U.S. simply told everybody to boycott Apple for raising legal objections, period. So maybe the jurisdiction of regulators over the privacy and security practices of the private sector could protect consumers a bit against Government overreach. After all, that is what Privacy Shield is about, in part, so the FTC is already arguably in the business of restraining government surveillance. Moreover, in reconciling privacy and government surveillance law, the U.S. would truly be leading the world; consider, for example, by contrast, the disconnected parallel universes of aggressive surveillance law and aggressive data protection law that appear to coexist in France now.
Lots more to follow. What do you think?
Is information security just Penelope weaving Laertes’ burial shroud in the day and undoing her own work by night (this time as forced labor)?
My great partner Ron Raider, working with my great partners Burleigh Singleton and Shayne O’Reilly, gave me the core insight of this post, but they bear no responsibility for the extreme lengths to which I might just push that insight.