<div dir="ltr"><font face="arial, helvetica, sans-serif">I honestly think the whole debate is one of those where we are doomed if Apple complies and doomed if it doesn't. It has been stated in some quarters that this is a fight Apple can afford to have right up to the supreme court,the issue of resources is not a hindrance and it strengthens their brand integrity in the eyes of their customers.</font><div><font face="arial, helvetica, sans-serif"><br></font></div><div><font face="arial, helvetica, sans-serif">Legally, the FBI chose to use an outdated law whose modern application may be questionable and that may be their undoing. Apple has stated that t<span style="color:black">he All Writs Act does not provide a basis to conscript Apple to create software enabling the government to hack into
iPhones. It has further stated that the</span><span style="color:black;line-height:107%"> Act does not grant authority to compel assistance where congress has considered but chosen not to confer such authority</span><span style="color:black;line-height:107%">.</span></font></div><div><font face="arial, helvetica, sans-serif"><span style="color:black;line-height:107%"><br></span></font></div><div><font face="arial, helvetica, sans-serif"><font color="#000000"><span style="line-height:107%">It is a battle between the right to the protection of privacy versus the protection of national security and the prevention of </span><span style="line-height:13.91px">terrorism, the question is which right will prevail over the other? </span><span style="line-height:107%">The final outcome of this case will have far reaching consequences which will determine the future of security in technology, if the supreme courts force Apple to comply then no one will waste time and resources in developing highly secure platforms however if Apple wins it gives criminals a guilt free pass to store all criminal data on their phones knowing that no one, not even the government will have access(who needs a dark web? just use your iPhone).</span></font></font></div><div><font face="arial, helvetica, sans-serif"><font color="#000000"><span style="line-height:107%"><br></span></font></font></div><div><font face="arial, helvetica, sans-serif"><font color="#000000"><span style="line-height:107%">Let us see how this plays out.</span></font></font></div><div><font face="arial, helvetica, sans-serif"><font color="#000000"><span style="line-height:107%"><br></span></font></font></div><div><font face="arial, helvetica, sans-serif"><font color="#000000"><span style="line-height:107%"> </span></font></font><span style="font-size:12.8px">Rosemary Koech-Kimwatu</span></div><span style="font-size:12.8px">Twitter: @TechWakili </span><br style="font-size:12.8px"><span style="font-size:12.8px">Tel: +254 718181644/771632344</span><div><span style="color:black;font-size:11pt;line-height:107%"><font face="arial, helvetica, sans-serif"><br></font></span></div><div><span style="color:black;font-family:Calibri,sans-serif;font-size:11pt;line-height:107%"><br></span></div><div><span style="color:black;font-family:Calibri,sans-serif;font-size:11pt;line-height:107%"><br></span></div><div><span style="color:black;font-family:Calibri,sans-serif;font-size:11pt;line-height:107%"><br></span></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Feb 26, 2016 at 7:44 AM, Tony White via kictanet <span dir="ltr"><<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Apple has now filed an appeal against the ruling:<br>
<br>
<a href="http://www.scribd.com/doc/300521994/Motion-to-Vacate-Brief-and-Supporting-Declarations" rel="noreferrer" target="_blank">http://www.scribd.com/doc/300521994/Motion-to-Vacate-Brief-and-Supporting-Declarations</a><br>
<br>
Perhaps the list's 'legal friends' can comment?<br>
<div><div class="h5"><br>
<br>
On 22/02/2016, Mark Kipyegon via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br>
> It is amusing that the law in question was drafted over two hundred years<br>
> ago. For the courts this is a good opportunity to interpret the limits<br>
> within which law enforcement can operate.<br>
><br>
> --<br>
> <a href="http://keybase.io/kipyegonmark" rel="noreferrer" target="_blank">keybase.io/kipyegonmark</a><br>
><br>
> On 22 Feb 2016, at 11:11, "Dennis Kioko" <<a href="mailto:dmbuvi@gmail.com">dmbuvi@gmail.com</a>> wrote:<br>
><br>
>> Being in Apple's position, I initially would have complied with the FBI's<br>
>> request, seeing that this measure would only be limited to one device.<br>
>><br>
>> However, after looking at Apple's response, I see what Tim Cook is coming<br>
>> from. That single piece of software would be hard to keep tabs on - the<br>
>> stakes would be very high. There many other institutions and<br>
>> countries(regimes) that would like to get their hand on such software.<br>
>><br>
>> In the past, US firms and Government Agencies have found out they have<br>
>> been hacked well after hackers had penetrated their computers.<br>
>><br>
>> Once out of control of both Apple and the FBI, the software would mean any<br>
>> iPhone in the "wild" would be susceptible to unauthorised access by<br>
>> however who has access to this "God" version of iOS.<br>
>><br>
>> Sounds like one of those movies where a disease or modified organism<br>
>> escapes from a lab.<br>
>><br>
>> What would you do were you the judge in this case?<br>
>><br>
>> On Monday, 22 February 2016, Mark Kipyegon via kictanet<br>
>> <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br>
>> It might be worth noting that recent history shows law enforcement<br>
>> agencies abuse their power to access such controlled information.<br>
>><br>
>> Edward Snowden (@Snowden) Tweeted at 7:50 a.m. - 17 Feb 2016 :<br>
>><br>
>> The @FBI is creating a world where citizens rely on #Apple to defend their<br>
>> rights, rather than the other way around.<br>
>> (<a href="https://twitter.com/Snowden/status/699984388067557376?s=17" rel="noreferrer" target="_blank">https://twitter.com/Snowden/status/699984388067557376?s=17</a>)<br>
>><br>
>> --<br>
>> <a href="http://keybase.io/kipyegonmark" rel="noreferrer" target="_blank">keybase.io/kipyegonmark</a><br>
>><br>
>> On 21 Feb 2016, at 21:33, <a href="mailto:kictanet-request@lists.kictanet.or.ke">kictanet-request@lists.kictanet.or.ke</a> wrote:<br>
>><br>
>> ><br>
>> > However, I think the security agencies should have access to targeted<br>
>> > information as investigations lead them - with the oversight of<br>
>> > legislature and judiciary. The problem is how to ensure this is not<br>
>> > misused to collect any information they think they need about a society.<br>
>> > Self censorship, fear and basically ?guilty by default? will be the<br>
>> > order of the day and you really don?t want to go down that road.<br>
>> ><br>
><br>
<br>
<br>
</div></div>--<br>
Tony White<br>
<span class=""><br>
_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
</span>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/chemukoechk%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/chemukoechk%40gmail.com</a><br>
<div class="HOEnZb"><div class="h5"><br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</div></div></blockquote></div><br></div>