Police Magazine Logo
MenuMENU
SearchSEARCH

Apple's Double Standard

No American company should be allowed to foil the lawful work of American police in the name of privacy.

November 1, 2018
Apple's Double Standard

Editor David Griffith (Photo: Kelly Bracken)

4 min to read


Apple has a long history of preventing digital forensic investigators from legally collecting evidence stored on its mobile devices, all in the name of protecting the data of its customers from hackers. This puts Apple in direct conflict with American law enforcement. But thanks to some new forensic technology, there was an uneasy peace between police, the FBI, and the Cupertino, CA-based company. Then last month, the war commenced again when Apple updated its software and blocked an exploit used by forensic examiners.

A little background. The most common way that digital forensics experts use to break into a password-protected device is called a "brute force attack." Basically, you connect the device to a computer and it starts cycling through password combinations until the lock is picked. Apple shut down that exploit a few years back. Now, if you start typing in the wrong passwords into an iPhone, you can very quickly "brick" it and make the data unrecoverable.

Ad Loading...

Apple's password encryption tech was at the crux of a fight between the FBI and the company back in 2015. The FBI asked Apple to help it break into the phone of deceased San Bernardino Massacre terrorist Syed Farook and Apple refused. The whole thing got really heated. Then, suddenly, the FBI dropped its lawsuit. What happened is the FBI paid an undisclosed Israeli expert to crack the Farook phone. Soon after that, two companies—Cellebrite and Grayshift—were offering iPhone cracking tech to law enforcement agencies. But now Apple has reportedly shut down this exploit, once again blocking American investigators from accessing data on iPhones and iPads, even under warrant or subpoena. (Neither Grayshift nor Cellebrite has publicly responded to these reports.)

It's stunning how much effort Apple puts into frustrating American investigators. It's also stunningly hypocritical when you consider how the company recently bent over for the Chinese.

This year Apple agreed to comply with Chinese law and transferred all of the iCloud data for its Chinese customers to a Chinese company with servers in China, Guizhou-Cloud Big Data (GCBD). This transfer reportedly includes the encryption keys that give the holder access to all that personal data. Even if GCBD isn't at least partially owned by the Chinese Communist Party—which it probably is—you can bet that no one at this company is going to refuse a request to supply the Ministry of State Security with all that Apple customer data.

So why did Apple make their Chinese customers' data available to the secret police on demand? It had no choice. It was either that or stop operating in China. And the Chinese Communist Party has Apple by the shorthairs. The company cherishes its share of the Chinese phone market, even though that market share is rapidly declining as domestic Chinese companies undercut Apple's prices. But what it really cherishes is access to Foxconn's massive production facility in Shenzhen. Almost every iPhone that Apple sells worldwide is assembled in that factory. The low-cost labor of people working and living at that facility is the primary driver of Apple's profit margins. If the Chinese government were to shut Apple out of Foxconn or even reduce Apple's access to it, then things would get really tense in Cupertino. For the record, Apple denies its Chinese cloud partner could compromise the privacy of its Chinese customers. Which is utter nonsense.

In contrast, Apple prides itself on protecting the privacy of its American customers, even to the point of foiling law enforcement investigations. Which is dangerous for public safety. Blocking the password limit exploit last month was not at all necessary to make the iPhone more secure from hackers. All it did was make it harder for American police to pursue their cases against murderers, human traffickers, drug dealers, child pornographers, and other heinous criminals.

Ad Loading...

The good news is that cyber forensics experts will soon come up with a new exploit that will allow them to access evidence from iPhones. The bad news is Apple will surely shut that one down, too. That's the way this game is played. And it stinks. No American company, even one with a trillion dollars in market value, should be allowed to foil the lawful investigations of American police operating under warrant or subpoena. This is especially true when that company plays by totally different rules in an oppressive Communist country, just to protect its bottom line.

Subscribe to our newsletter

More Technology

Man working in front of multiple computer screens.
TechnologyApril 22, 2026

Motorola Solutions Now Part of the Cyber Threat Alliance

Motorola Solutions is now part of the Cyber Threat Alliance, the first formally organized nonprofit group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries.

Read More →
Bar chart showing what police departments spend budget on for security.
TechnologyApril 22, 2026

Genetec 2026 State of Physical Security Report Reveals Public Safety Priorities & Challenges

Survey results from Genetec’s 2026 State of Physical Security Report highlight the demand for integrated systems that improve response times and reduce investigative workload. Nearly nine in 10 respondents said they use security data to help keep officers safe.

Read More →
Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
Ad Loading...
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →
Rooftop view off a drone detection devise with two small rubber antennas with an view overlooking a large domed event venue.
TechnologyApril 9, 2026

D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology

D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.

Read More →
Ad Loading...
Graphic showing four priorities for secure enterprise cloud adoption and a logo for Genetec.
TechnologyApril 2, 2026

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.

Read More →
police car geotab thumbnail for services whitepaper
SponsoredApril 1, 2026

A police department’s guide to fleet management and vehicle health

Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.

Read More →
An automated license plate reader mounted on rear trunk of a car.
TechnologyMarch 26, 2026

Public Safety Surveillance Technology: Built on Compliance and Trust

ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.

Read More →
Ad Loading...
Promotional graphic for Patrolfinder featuring a police chief’s headshot inside a circular frame alongside a police SUV in the background. The headline reads: “Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture.”
SponsoredMarch 17, 2026

Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture

Patrol work hasn’t changed—but the expectations on officers have. See how one police chief helped officers get the right information at the right time, improve patrol visibility, and strengthen trust without adding complexity or surveillance. This real-world story shows how patrol-driven technology can make the job safer, smarter, and more effective—starting on day one.

Read More →