Feeds

Apple: We'll tell users when the Feds come looking for their data

Except in certain cases

Remote control for virtualized desktops

Apple has updated its procedures for dealing with police investigations into its users' data, and has promised to let individuals know when they are being probed – most of the time, that is.

The new guidelines state that customers will not be notified if there is a non-disclosure order with the search warrant or if "we believe in our sole discretion that such notice may pose immediate risk of serious injury or death to a member of the public or the case relates to a child endangerment matter."

Under the new terms, Apple has codified exactly how much data it stores and what it can hand over. For example, the company claims that it can't totally crack a password protected iPhone running iOS 4 or a later operating system, but it can extract user-generated active files in Apple's non-encrypted native apps.

In such circumstances, Apple says it would prefer law enforcement pop down to Cupertino personally to oversee data extraction, and warns them to bring their own FireWire-equipped hard drive (with at least twice the capacity of the phone) to collect any salvaged data. If the police send it in to Apple's HQ instead, they should include a suitably sized USB thumb drive.

Phone registration information is available to suitably subpoenaed police, although Apple says it doesn't check if this is accurate. Customer service records, iTunes information, and Apple Store purchasing history are all available to a cop with a warrant.

For users of iCloud, Apple will provide subscriber information and connection logs to police, and the company stores email logs – both ingoing and outgoing – for 60 days before deletion at its data centers in California, Nevada, and North Carolina. The contents of emails can also be read, but not if the user has deleted them.

The exceptions to this are Apple's iMessage and Face Time apps. These have end-to-end encryption, and Apple says it can't wiretap those conversations, although it can tap into basic emails.

Cupertino also says that it doesn't store geolocation data from the iPhone's GPS system or records from the Find My iPhone app. If the police have the right paperwork, Apple can deliver connection logs from the application, provided it is switched on. If the app is turned off, Apple says it can't activate it remotely to enable stealthy tracking.

Apple isn't alone in toughening up the rules on what data it will and won't allow the police to raid; Facebook, Google and Microsoft are all taking another look at their rules. Ever since Edward Snowden started leaking, the companies have faced a consumer backlash on privacy and are keen to show they are doing what they can to keep people informed. ®

Internet Security Threat Report 2014

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.