Send Any Potentially Incriminating Evidence to Outsiders
Tech giant Apple is facing a torrent of criticism after announcing plans to install software on its new iPhones and iPads that will scan for child pornography and then report offenders to law enforcement.
Security analysts say the move opens up a dangerous gateway to facilitate corporate abuse and government overreach to violate people’s civil liberties, including their privacy rights.
“We want to help protect children from predators who use communication tools to recruit and exploit them, and limit the spread of Child Sexual Abuse Material (CSAM),” Apple announced on its website on Thursday.
The new features will be rolled out later this year in iPhones, iPads, Apple Watches and Apple desktop computers.
In addition to giving parents more oversight of their children’s electronic devices, Apple will be able to analyze image attachments to determine if a photo is sexually explicit.
Waiting to see what actually does get rolled out.
It’s just the beginning. They will continue to do this stuff under the guise for the better good until we wake up one day and we have no privacy or freedom. Vaccine passports, scanning phones, gun and ammo restrictions/taxes,cameras on every corner, GPS trackers in cars. We keep letting them chip away at it until it’s gone.
Y’all knew they have been skimming your phones for years, now their not hiding it any more.
I only have a cheap track phone and only have call, text, pictures and video.
OMG. Get rid of them.
I want my flip phone back…
Sounds like its high time for a Jitterbug phone.
So other than the obvious abuse of privacy I have a professional concern. I use my phone to document insurance claims on damage to houses and such. No fuss no muss right? Not so much. I also do Crime Scene and Trauma clean up and am required to photographically document it as well. There was a lady out in CA who did similar and was very discrete and worked for a lot of Hollywood’s biggest to clean up after parties and such. The problem was that her phone provider “owned” her pictures and sold them to the tabloids. She lost her business, livelihood, name and trust of the community. I have a Sony 3.0 Mpixel camera with a chip that I run back and forth and download for crime scene pics to an air gaped laptop. Not fun but I get to charge stupid money to send pics via CD to the insurance company.
A bunch of people on an open social media site complaining about lack of privacy.
The US government owns all the frequencies.
Wireless carriers only lease them.
Anything sent wirelessly goes through the NSA.
All we can do is hope to stay off the radar.
That ship sailed looooong ago.
Let’s say “hello” to NSA officer who is reading this post right now
Oh come on,
Just because I went through a background check to get in the Army, a more in-depth one to get my secret clearance; buy guns, ammo, tannerite etc… online with credit cards through a wireless network…
Oh wait. Yeah. They probably know me.
Yep, can see it now, receive cute picture of 18 months old grandson/daughter in diaper only…next day police on your doorstep to search your home and all your digital belongings.
After reading about this new “feature” a couple days ago I went into my phone to delete a photo of my son that I had sent to my wife for her to see after he took a fall on his mountain bike and cut his chin awhile ago. Don’t want Apple reporting me for child abuse. I did not delete all the cute pictures of him running around in a diaper so guess I should still be waiting for the SWAT team to execute their no knock warrant:/
Though I agree with others here. The NSA has been collecting records of everything we send over the airwaves and internet for a long time. Our constitutional rights to privacy and due process were officially stolen from us after 9/11 and have been being violated since long before that day.
With the backlog of clearances, the investigator doesn’t really have time to look at your individual purchases unless some derogatory material was turned up from another source, a developed reference, for example…otherwise your purchases are probably not a matter of interest to the adjudicator of your clearance who is the end user of the investigative product.
There are three basic levels of security clearance – Top Secret, Secret, and Confidential. The vast majority of security clearances are issued at the Secret level. Each of these clearances ties to an investigative tier. There are currently five tiers of investigations, but under the Trusted Workforce 2.0 model, the number of tiers will soon be reduced to 3, with the elimination of the Top Secret and Secret clearance reinvestigation tiers.
It’s widely noted that the Secret security clearance investigation consists largely of automated checks. A Tier 3 investigation, formerly known as a National Agency Check with Law and Credit (NACLC), consists of the following:
- National Agency Check (NAC) – this check is a part of all background investigations and queries OPM’s Suitability/Security Index (SII) and DoD’s Defense Central Index of Investigations (DCII) files for any previous investigations. The NAC also consists of a review of FBI fingerprint/criminal history or involvement in FBI investigations, and any other federal agency checks that may be required depending on the applicant’s position.
- For males, selective service registration is checked. For all, military service records are checked for those who indicate any military service.
- Checks of employment history within scope verifying dates of employment, whether there were any issues, the circumstances of leaving, and eligibility for rehire.
- Checks of residence history within scope for any known issues, payment history, and if you are in or left in good standing.
- Checks of all educational institutes that you attended within scope or the most recent verifying dates of attendance, degrees earned, and any disciplinary actions.
- Checks of local law enforcement agencies for every place you lived, worked, or went to school within scope to see if you were cited, charged, arrested, or convicted for any traffic or criminal offense.
- A credit check is run and reviewed for financial history regarding collections, charge-offs, excessive debt to income ratio, liens, bankruptcies and civil court judgments. Also noted are names, social security numbers, and addresses used for creditors.
- Certain special positions may require additional coverage/questions (e.g., law enforcement positions).
- A triggered enhanced subject interview (TESI) may be necessary when issues or discrepancies from the other checks are present and need further information or clarification.
Most of these checks can be done using automated systems, which is why the cost of a Secret investigation is significantly lower than that of a Top Secret clearance. While the investigation scope is smaller, the criteria are the same – the same issues that would prevent an individual from getting a Secret clearance would prevent them from getting a Top Secret clearance
The crime is what they say the crime is, and tomorrow it may change.
What Apple does is tantamount to “you have no expectation of privacy” warning, i.e., somehow they expect you would sign your 4A rights away by accepting ownership of an iPhone. This is not possible though.
The problem, beyond the obvious, is that this is how it continues down that path of eventual, total, oversight. Who doesn’t agree that pedophiles should be found and brought to justice? Therefore, most will say “ok Apple, you go…thank you.” But now someone (or more likely AI) has to interpret images, which will be a subjective interpretation, and determine if they should trigger an alert. With people like Chipman out there who believes we should be guilty until proven innocent and arrest people BEFORE they commit crimes, it can only get worse. Unless, people show Apple, and others who attempt the same privacy violations, that we won’t tolerate it. Vote with our dollars and not buy their products.
Simple fixes to this: Don’t have an iPhone; don’t have child pornography. Really not that difficult.
Your phone will be scanned and searched whether you have child porn or not.
Then see the suggestion before the comma. Still not that difficult.
My phone, not an apple, is several states away from me at the moment, as I type on it.