Skip to main content

In 2017, Apple has seen an increase in national security requests from the government

Apple national security requests
Image used with permission by copyright holder
According to Apple’s first biannual transparency report, the Cuptertino comapny received more than 30,000 demands to access over 230,000 devices in the first-half of this year. These requests are coming in the form of National Security Letters as well as requests under the Foreign Intelligence Surveillance Act. Apple and other big companies are only reporting ranges, since the government will not only them to reveal precise numbers. “By law, this is the most precise information we are currently allowed to disclose,” Apple said in the report.

As far as the national security-related requests are concerned, this year Apple has received four times the amount in the first half of the year that it did one year ago. In the first half of 2017, from January 1 all the way to June 30, Apple received anywhere from 13,250 to 13,499 national security requests from the U.S. government. These requests had an affect on 9,000 to 9,249 people who use Apple’s devices.

“There’s not a huge track record here, but you can start to make a simple graph. The trend does seem to be upward,” Andrew Crocker, a staff attorney with the Electronic Frontier Foundation, said. The amount of government requests made to tech companies has been steadily growing since 2014. This is when the data first started to become available.

It’s not exactly made clear why Apple has seen such an increase in national security requests from the government this year.

Companies like Facebook, Yahoo or Microsoft have yet to voluntarily report their figures for this year. Google has said that they had received anywhere from 0 to 499 National Security Letters requesting data on between 1,000 and 1,499 user accounts in the first six months of 2017, more than ever before. Google is usually the go-to company when the government wants to collect data on people.

Google is also campaigning for reform under the US Electronic Communications Privacy Act (ECPA).

“Providing a pathway for such countries to obtain electronic evidence directly from service providers in other jurisdictions will remove incentives for the unilateral, extraterritorial assertion of a country’s laws, data localization proposals, aggressive expansion of government access authorities, and dangerous investigative techniques,” wrote Richard Salgado, Google’s director of Law Enforcement and Information Security.

Editors' Recommendations

Stephen Jordan
Stephen is a freelance writer and blogger, as well as an aspiring screenwriter. Working in front of a computer and digesting…
The M1 has a major security loophole that Apple can’t patch
Apple M1 processor on a mainboard.

Researchers at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) have discovered a new security vulnerability that targets Apple's popular M1 processor. The attack, dubbed PACMAN, is capable of bypassing the last line of defense against software bugs on the M1 and potentially other ARM-based processors.

PACMAN attacks pointer authentication, which is the final stop for most software vulnerabilities. Pointer authentication confirms that a program hasn't been changed in any malicious way, serving as a "safety net ... in the worst case scenario," as MIT PhD student Joseph Ravichandran put it. MIT's researchers developed PACMAN as a way to guess the pointer authentication signature, bypassing this critical security mechanism. Researchers say PACMAN exploits a hardware mechanism, so a software patch won't be able to fix it.

Read more
Apple’s iOS 15.3 update fixes critical Safari security bug
iPhone showing Home Screen with widgets resting on soft white cloth background.

Apple has just released iOS 15.3, and while this latest update doesn’t add any significant new features, it addresses at least one critical security flaw. Earlier this month, software engineer Martin Bajanik of FingerprintJS found a serious vulnerability in Safari 15, the browser included in iOS 15 and iPadOS 15, that could leak browsing history information and even credentials from online services that a person is using, such as Google, YouTube, Amazon, and sites using WordPress.

As Bajanik explains, many websites use an API called IndexedDB to request that browsers like Safari and Chrome store information in a local database on a person’s device. Under normal circumstances, a given website should only be able to request information about the databases that it created — any others should be invisible to it.

Read more
5 easy ways to dramatically increase security in Google Chrome
A MacBook with Google Chrome loaded.

If you're one of many people who use Chrome as your default web browser, then you might want to take some steps to ensure that it's extra secure. This can help you in a world where hackers are always after passwords and can easily spoof websites to look like the real thing.

Well, Google has a lot of tools built right into Chrome that can help with that protection. From Safe Browsing to encrypting passwords and more, we got you covered with five easy ways to dramatically increase security in Google Chrome.
Change your Safe Browsing settings

Read more