Apple Gave Up User Data In 82% Of Feds' Requests - InformationWeek
IoT
IoT
Government

Apple Gave Up User Data In 82% Of Feds' Requests

Despite its high-profile challenge to the FBI's iPhone data request in the San Bernardino terrorist shootings, Apple complied with 82% of data requests from US government authorities.

Apple At 40: 12 Products That Changed Computing Forever
Apple At 40: 12 Products That Changed Computing Forever
(Click image for larger view and slideshow.)

When US government agencies came knocking on Apple's door for access to users' account information and content, the iconic computer and device maker complied with 82% of the requests during the second half of last year, according to Apple's transparency report released this week.

Apple turned over data and content from 4,411 accounts, including iTunes, iCloud, to US government officials between July 1 and Dec. 31, fulfilling 82% of US authorities' 1,015 requests to access user accounts, Apple stated in its report. In China, Apple disclosed more data account information than in the US, affecting 5,082 account holders whose information was shared with Chinese authorities largely due to phishing investigations. Apple's compliance with Chinese authorities' 32 account access requests was fulfilled only 53% of the time.

When account information is provided to authorities, it can include a user's name, address, and, in some cases, content like photos, documents, contacts, calendar information, and bookmarks held in the accounts. But Apple notes that it will carefully weigh the requests and provide information when a search warrant is provided.

(Image: Jason Doiy/iStockphoto)

(Image: Jason Doiy/iStockphoto)

In the high-profile San Bernardino terrorist case, Apple said it was willing to comply with the government's request to search Syed Farook's iPhone, but because of its encryption technology, it could not access the contents and data on the phone. The legal battle over the FBI's attempt to get Apple to build a backdoor in its iOS to provide access to the phone ultimately fell by the wayside after the FBI was able to find a third-party to break into Farook's iPhone.

Apple's transparency report also details the number of times that various countries request information about its users' devices. Most of these requests center on lost or stolen Apple devices, with authorities requesting customer contact information that is used to register an Apple device.

Apple provided Poland with data information on 56,447 devices during the second half of last year, fulfilling 55% of the 22 device requests from Polish authorities. Most of the requests came from Poland's customs and revenue authorities, Apple notes in its report.

Requests from German authorities involved 31,360 devices, in which 52% of the 11,989 requests were fulfilled. For South Korea, which filed 119 requests, Apple provided information on 27,922 devices. In fulfilling 60% of South Korea's requests, Apple noted most of them centered on stolen devices.

Create a culture where technology advances truly empower your business. Attend the Leadership Track at Interop Las Vegas, May 2-6. Register now!

In the US, Apple fulfilled 80% of the 4,000 device data requests that applied to a total of 16,112 devices.

The computer maker notes it does not take requests for users' information lightly. In its statement about the way it reviews requests for users' information from government agencies, Apple said:

When we receive information requests, we require that it be accompanied by the appropriate legal documents such as a subpoena or search warrant. We believe in being as transparent as the law allows about what information is requested from us. We carefully review any request to ensure that there's a valid legal basis for it. And we limit our response to only the data law enforcement is legally entitled to for the specific investigation.

Apple notes that 94% of requests for information center on device requests, with 6% seeking account information.

But perhaps a more noteworthy figure is the number of people overall who have been affected by the information requests from authorities from around the world. The computer maker points out that only 0.00612% of its overall customer base has been affected by government information requests.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Broadway0474
50%
50%
Broadway0474,
User Rank: Ninja
4/29/2016 | 10:46:43 PM
Re: The market is now open
impactnow, the issue is that creating those guidelines will require legistlative action, and we know what Congress is trying to do now. The opposite of helpful. So the solution you're looking for ... I don't think we'll have any time soon. You?
impactnow
50%
50%
impactnow,
User Rank: Author
4/28/2016 | 12:12:27 PM
Re: The market is now open
Broadway I don't think its Apple's fault or any other technology company.We need standards in these cases. This is not only an issue in the case of terrorism but in other crimes where evidence is housed on a technology device. It is an ethical standard that needs to be established for how we handle technology in criminal situations. If a pedophile is arrested can the police access their computer or phone for evidence or is the data private even though it might identify other victims and make the case stronger? These are all the questions we need to answer to establish standards and processes so that we don't need to go to court. It really is a terms and conditions revision to how our data is used in certain circumstances.

 Today, it is already happening without the public being aware of it. There are times when the government can access phone records calls etc. in cases of national security. It is part of our existing laws the technology just needs to be addressed.Dealing with these issues as one offs will only create a backlog in the courts.

 
Broadway0474
50%
50%
Broadway0474,
User Rank: Ninja
4/27/2016 | 7:01:47 PM
Re: The market is now open
Impactnow, is that apple's fault or the fault of the people willing to pay for those services? I don't think Apple is blameless here but I also think they are trying to take a stand for the right reasons. It's maybe a losing stand...
impactnow
50%
50%
impactnow,
User Rank: Author
4/27/2016 | 1:42:23 PM
The market is now open
The sad reality of this entire situation is that Apple has now created an entire market for hackers who want to get rich very quickly . There will be a next time when the device needs to be accessed for national security now we are creating a whole army of hackers who can do this for less then admirable reasons .
vnewman2
50%
50%
vnewman2,
User Rank: Ninja
4/27/2016 | 7:33:31 AM
Re: Difference
@Broadway. I think that's the case. I believe people are getting upset because they think the content on the device itself is being released. But according to this report, that's not really the case, unless it's in the cloud, then it sounds like they actually are so....
Broadway0474
50%
50%
Broadway0474,
User Rank: Ninja
4/26/2016 | 6:11:34 PM
Re: Difference
Vnewman, just so we're clear: that distinction makes it not so bad that Apple has been giving up the data?
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
4/25/2016 | 2:17:52 PM
Re: Difference

@vnewman2   Absolutely.  I am glad you made sense out of it - it was too mind numbing for me !  : )    Thanks, I am in complete agreement.

 

One would think Apple would catch this and it just goes to show Marketing does just that -  Market.  

But understanding what they are actually Marketing leaves much room for improvement.

vnewman2
100%
0%
vnewman2,
User Rank: Ninja
4/25/2016 | 12:53:37 PM
Re: Difference
@Technocrati - So it seems it includes information like "the Device's" IMEI number and the last date and time it connected to iTunes or iCloud.  So I feel like the proper language to use would be "Information about the Device" and not "Device Information" which misleads everyone into assuming they are giving up information ON the device.
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
4/21/2016 | 6:15:58 PM
Re: Difference

@vnewman2   Good point.   I was having a real issue with the vagueness of the term "Device requests".   What does that entail actually ?

jries921
50%
50%
jries921,
User Rank: Ninja
4/21/2016 | 1:26:53 PM
That's actually as it should be
If I were the head of a company with custody of other people's data, I would only allow those data to be divulged to the authorities upon receipt of a valid search warrant or other applicable court order (reserving the right to appeal if my lawyers have serious doubts as to said order's legality), or with the written permission of the owner of those data.  No exceptions.  My position would be the same with regard to confidential data on customers or employees.  In those cases, the company is the steward of the data, not their owner and should act accordingly.
Page 1 / 2   >   >>
Commentary
The Staying Power of Legacy Systems
Mary E. Shacklett, Mary E. Shacklett,  4/15/2019
Commentary
Q&A: Red Hat's Robert Kratky Discusses Essentials of Docs
Joao-Pierre S. Ruth, Senior Writer,  4/15/2019
Commentary
How Cloud Shifts Security Balance of Power to the Good Guys
Guest Commentary, Guest Commentary,  4/11/2019
White Papers
Register for InformationWeek Newsletters
2018 State of the Cloud
2018 State of the Cloud
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Video
Current Issue
A New World of IT Management in 2019
This IT Trend Report highlights how several years of developments in technology and business strategies have led to a subsequent wave of changes in the role of an IT organization, how CIOs and other IT leaders approach management, in addition to the jobs of many IT professionals up and down the org chart.
Slideshows
Flash Poll