i3 - March/April 2016 - 2

From the CEO
UNLOCKING THE FUTURE

hen we first heard that the U.S. government
had gotten a court order forcing Apple to unlock an
iPhone used by domestic terrorists, we had the same
reaction as many Americans. We wanted every tool
possible to be used against terrorism and couldn't
figure out why the FBI and Apple couldn't quietly
reach a deal.

It's about whether
our customers using
products connected
to the Internet can
expect privacy when
information is collected
about their goings
and comings, what
is happening in their
homes and even their
most intimate biological
details.

But as often happens, initial news reports were
wrong. It turns out that Apple had been cooperating with the FBI and giving the government access
to all information from the phone available in the
cloud. However, the government had not explored
technical alternatives to requiring Apple to unlock
the phone. More, the government had made basic
mistakes such as unilaterally changing the password
on the phone, which eliminated the possibility of
accessing online backups. The government also had
several criminal cases where it had asked Apple to
help unlock phones, but had not sought legal action
against Apple. Indeed, it appeared the FBI had
waited for a case which would evoke public sympathy to require Apple to act.
As the public debate became a lead story other
factors emerged. It wasn't simply about opening
a backdoor; it was about forcing Apple to create software it did not have. More, once created,
that software jeopardized the privacy of Apple
software customers. In fact, the consensus of the
security world was that if the FBI could force
Apple to create software to defeat the device shutdown after 10 unsuccessful password tries, then
that same software would be obtained and used
by bad actors to hack security on other encrypted
products and systems.
Your association, CTA, engaged on the issue. We
joined the tech community and supported Apple's
position publicly, through an opinion piece, as well
as by supporting an amicus brief in the case. More,
we supported bi-partisan calls for Congress to dis-

cuss these issues and establish clear policies, rather
than a court's relying on an act more than a century
old.
The stakes are big. It's not just about Apple and
its customers or even about smartphone and tablet
makers and the privacy their customers rely upon.
It's about whether our customers using products
connected to the Internet can expect privacy when
information is collected about their goings and comings, what is happening in their homes and even
their most intimate biological details.
The Internet of Things is in its infancy and will
transform the human condition. But this transformation relies on the collection of data that will
improve how people live, work and play. It will
affect our health. It will affect our lifestyle. It will
affect our well-being and the decisions we make.
But if people are not confident that their data is
secure, then our potential customers will be less
interested in our products, investors and retailers
will be less likely to take a risk on these products
and many useful products which could change the
human condition will not be invented, introduced
or made available to those whose lives could be
improved.
Certainly there is a lot at stake. We have to fight
terrorism. Indeed, the tech industry can offer a lot
through facial recognition, voice analysis, facial
micro cues and behavioral analysis to predict and
identify terrorists. But giving our government, other
governments and bad guys the ability to break the
security on devices is a dangerous precedent. It is
one we must resist if we are going to encourage the
Internet of Things to grow and provide the data and
analysis to make us healthier, safer, energy efficient,
and improve our lives in unlimited ways.
This is not about Apple. It is about our future
innovation path and we need a national discussion
on why privacy and security are complimentary not
antagonistic.

Gary Shapiro, president and CEO

2

MAY/JUNE 2016

I T I S I N N O VAT I O N


https://www.kickstarter.com/ https://www.indiegogo.com/#/picks_for_you https://www.rockethub.com/ https://www.kickstarter.com/

i3 - March/April 2016

Table of Contents for the Digital Edition of i3 - March/April 2016

Contents
i3 - March/April 2016 - Cover1
i3 - March/April 2016 - Cover2
i3 - March/April 2016 - Contents
i3 - March/April 2016 - 2
i3 - March/April 2016 - 3
i3 - March/April 2016 - 4
i3 - March/April 2016 - 5
i3 - March/April 2016 - 6
i3 - March/April 2016 - 7
i3 - March/April 2016 - 8
i3 - March/April 2016 - 9
i3 - March/April 2016 - 10
i3 - March/April 2016 - 11
i3 - March/April 2016 - 12
i3 - March/April 2016 - 13
i3 - March/April 2016 - 14
i3 - March/April 2016 - 15
i3 - March/April 2016 - 16
i3 - March/April 2016 - 17
i3 - March/April 2016 - 18
i3 - March/April 2016 - 19
i3 - March/April 2016 - 20
i3 - March/April 2016 - 21
i3 - March/April 2016 - 22
i3 - March/April 2016 - 23
i3 - March/April 2016 - 24
i3 - March/April 2016 - 25
i3 - March/April 2016 - 26
i3 - March/April 2016 - 27
i3 - March/April 2016 - 28
i3 - March/April 2016 - 29
i3 - March/April 2016 - 30
i3 - March/April 2016 - 31
i3 - March/April 2016 - 32
i3 - March/April 2016 - 33
i3 - March/April 2016 - 34
i3 - March/April 2016 - 35
i3 - March/April 2016 - 36
i3 - March/April 2016 - 37
i3 - March/April 2016 - 38
i3 - March/April 2016 - 39
i3 - March/April 2016 - 40
i3 - March/April 2016 - 41
i3 - March/April 2016 - 42
i3 - March/April 2016 - 43
i3 - March/April 2016 - 44
i3 - March/April 2016 - 45
i3 - March/April 2016 - 46
i3 - March/April 2016 - 47
i3 - March/April 2016 - 48
i3 - March/April 2016 - Cover3
i3 - March/April 2016 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210304
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com