• Home
  • About RSIS
    • Introduction
    • Building the Foundations
    • Welcome Message
    • Board of Governors
    • Staff Profiles
      • Executive Deputy Chairman’s Office
      • Dean’s Office
      • Management
      • Distinguished Fellows
      • Faculty and Research
      • Associate Research Fellows, Senior Analysts and Research Analysts
      • Visiting Fellows
      • Adjunct Fellows
      • Administrative Staff
    • Honours and Awards for RSIS Staff and Students
    • RSIS Endowment Fund
    • Endowed Professorships
    • Career Opportunities
    • Getting to RSIS
  • Research
    • Research Centres
      • Centre for Multilateralism Studies (CMS)
      • Centre for Non-Traditional Security Studies (NTS Centre)
      • Centre of Excellence for National Security (CENS)
      • Institute of Defence and Strategic Studies (IDSS)
      • International Centre for Political Violence and Terrorism Research (ICPVTR)
    • Research Programmes
      • National Security Studies Programme (NSSP)
      • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
    • Future Issues and Technology Cluster
    • [email protected] Newsletter
    • Other Research
      • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
    • Graduate Programmes Office
    • Overview
    • MSc (Asian Studies)
    • MSc (International Political Economy)
    • MSc (International Relations)
    • MSc (Strategic Studies)
    • NTU-Warwick Double Masters Programme
    • PhD Programme
    • Exchange Partners and Programmes
    • How to Apply
    • Financial Assistance
    • Meet the Admissions Team: Information Sessions and other events
    • RSIS Alumni
  • Alumni & Networks
    • Alumni
    • Asia-Pacific Programme for Senior Military Officers (APPSMO)
    • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
    • SRP Executive Programme
    • Terrorism Analyst Training Course (TATC)
  • Publications
    • RSIS Publications
      • Annual Reviews
      • Books
      • Bulletins and Newsletters
      • Commentaries
      • Counter Terrorist Trends and Analyses
      • Commemorative / Event Reports
      • IDSS Paper
      • Interreligious Relations
      • Monographs
      • NTS Insight
      • Policy Reports
      • Working Papers
      • RSIS Publications for the Year
    • Glossary of Abbreviations
    • External Publications
      • Authored Books
      • Journal Articles
      • Edited Books
      • Chapters in Edited Books
      • Policy Reports
      • Working Papers
      • Op-Eds
      • External Publications for the Year
    • Policy-relevant Articles Given RSIS Award
  • Media
    • Great Powers
    • Sustainable Security
    • Other Resource Pages
    • Media Highlights
    • News Releases
    • Speeches
    • Vidcast Channel
    • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
Facebook
Twitter
YouTube
RSISVideoCast RSISVideoCast rsis.sg
Linkedin
instagram instagram rsis.sg
RSS
  • Home
  • About RSIS
      • Introduction
      • Building the Foundations
      • Welcome Message
      • Board of Governors
      • Staff Profiles
        • Executive Deputy Chairman’s Office
        • Dean’s Office
        • Management
        • Distinguished Fellows
        • Faculty and Research
        • Associate Research Fellows, Senior Analysts and Research Analysts
        • Visiting Fellows
        • Adjunct Fellows
        • Administrative Staff
      • Honours and Awards for RSIS Staff and Students
      • RSIS Endowment Fund
      • Endowed Professorships
      • Career Opportunities
      • Getting to RSIS
  • Research
      • Research Centres
        • Centre for Multilateralism Studies (CMS)
        • Centre for Non-Traditional Security Studies (NTS Centre)
        • Centre of Excellence for National Security (CENS)
        • Institute of Defence and Strategic Studies (IDSS)
        • International Centre for Political Violence and Terrorism Research (ICPVTR)
      • Research Programmes
        • National Security Studies Programme (NSSP)
        • Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      • Future Issues and Technology Cluster
      • [email protected] Newsletter
      • Other Research
        • Science and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      • Graduate Programmes Office
      • Overview
      • MSc (Asian Studies)
      • MSc (International Political Economy)
      • MSc (International Relations)
      • MSc (Strategic Studies)
      • NTU-Warwick Double Masters Programme
      • PhD Programme
      • Exchange Partners and Programmes
      • How to Apply
      • Financial Assistance
      • Meet the Admissions Team: Information Sessions and other events
      • RSIS Alumni
  • Alumni & Networks
      • Alumni
      • Asia-Pacific Programme for Senior Military Officers (APPSMO)
      • Asia-Pacific Programme for Senior National Security Officers (APPSNO)
      • SRP Executive Programme
      • Terrorism Analyst Training Course (TATC)
  • Publications
      • RSIS Publications
        • Annual Reviews
        • Books
        • Bulletins and Newsletters
        • Commentaries
        • Counter Terrorist Trends and Analyses
        • Commemorative / Event Reports
        • IDSS Paper
        • Interreligious Relations
        • Monographs
        • NTS Insight
        • Policy Reports
        • Working Papers
        • RSIS Publications for the Year
      • Glossary of Abbreviations
      • External Publications
        • Authored Books
        • Journal Articles
        • Edited Books
        • Chapters in Edited Books
        • Policy Reports
        • Working Papers
        • Op-Eds
        • External Publications for the Year
      • Policy-relevant Articles Given RSIS Award
  • Media
      • Great Powers
      • Sustainable Security
      • Other Resource Pages
      • Media Highlights
      • News Releases
      • Speeches
      • Vidcast Channel
      • Audio/Video Forums
  • Events
  • Giving
  • Contact Us
  • instagram instagram rsis.sg
Connect

Getting to RSIS

Map

Address

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

View location on Google maps Click here for directions to RSIS

Get in Touch

    Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
    RSISVideoCast RSISVideoCast rsisvideocast
      school/rsis-ntu
    instagram instagram rsis.sg
      RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    RSIS Intranet

    S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
    Nanyang Technological University Nanyang Technological University

    Skip to content

     
    • RSIS
    • Publication
    • RSIS Publications
    • CO16053 | Beyond Apple vs FBI: Implications for Singapore’s Smart Nation Project
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • Commentaries
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • IDSS Paper
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers
    • RSIS Publications for the Year

    CO16053 | Beyond Apple vs FBI: Implications for Singapore’s Smart Nation Project
    Benjamin Ang

    04 March 2016

    download pdf
    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Synopsis

    The ongoing legal dispute between Apple Inc and the FBI, over accessing data on the iPhone of a deceased terror suspect, has been characterised as a conflict between security and privacy in the US. But it has also highlighted cybersecurity issues that have serious implications for Singapore’s Smart Nation initiative.

    Commentary

    APPLE INC is refusing to comply with a court order demanding that the company disable a key security feature on the iPhone of a deceased terror suspect, so that the FBI can gain access to its data as part of investigations into the San Bernardino mass shooting. The legal battle, including appeals and congressional hearings, could take months to conclude. But regardless of the outcome, it has raised awareness of serious cybersecurity issues.

    Opinions are divided between those who believe that Apple should comply, to protect national security, and those who believe that Apple should resist, to protect civil liberties like the right to privacy. Opinions are also divided between those who believe that the technology that would be created as a result could be discovered and used by criminals, and those who believe that Apple could help the FBI without creating such a risk.

    Implications for cybersecurity

    While these are serious debates, the case has other implications for the relationship between public and private sectors around the world.

    If Apple loses, a legal precedent could be set that compels technology companies to help governments and law enforcement agencies gain access to customer data. Alternatively, if Apple wins, legislators (in many countries) might want to overcome this by passing laws that require technology companies to grant that access from the stage of creation, called ‘back doors’ – this has already been proposed in some countries. Such tight control over the technology sector could stifle innovation and even expose the public to greater cyber security risks.

    Besides, Apple already operates in many countries where specific laws leave no room for debate. For example, Singapore’s Criminal Procedure Code makes it compulsory to help the police gain access to data stored on a suspect’s computer, or face imprisonment, while the Computer Misuse and Cyber Security Act grant wide powers of access if national security is at risk.

    Furthermore, the majority of smart phone users do not use Apple iPhones. Among the other mobile phone manufacturers, some would not (and already do not) refuse to help governments or law enforcement agencies gain access to customer data.

    In any of the scenarios above, if this technology is discovered (by accident, deception, corruption, or neglect) by hackers, they could use it as a back door to gain access for criminal purposes like identity theft or credit card fraud. Then the public would be well advised not to rely on manufacturers for security, but to use other means of protection instead, like installing additional security (or encryption) software on their phones and computers, like an additional lock on their ‘back door’.

    On the other hand, criminals and terrorists are known to use encryption to hide their nefarious deeds, such as ISIS using the Telegram secure messaging app. Law enforcement agencies need to develop tools to break through (decrypt) this security, creating a competitive race of encryption and decryption.

    Implications for Singapore’s Smart Nation Project

    If security continues to be a lower priority for manufacturers, this has serious implications for Singapore as we become a Smart Nation. Internet of Things (IoT) devices like smart refrigerators, pacemakers or cars, depend on manufacturers to secure them, because unlike smartphones and computers, these IoT devices are usually not designed for users to install additional security.

    It has already been demonstrated that a hacker who gains access to a smart refrigerator, could use it to enter other computers or smart phones in the same household or office network. And if hackers gain access and take over pacemakers or cars, tests have shown that the results could be deadly.

    On the other hand, law enforcement could make good use of evidence stored in a smart device, such as where a suspected terrorist’s smart car has travelled, or if a suspected drug dealer had stored illegal drugs in his smart refrigerator.

    Options Going Forward

    In light of these issues, there are two available options. The first is to legislate that manufacturers of smart devices build in tighter security. This is a highly rational option that would protect customers from hackers, but would most likely hinder police investigations as well as create unease among manufacturers and some consumers.

    The second is to legislate that manufacturers install back doors to device security for law enforcement agencies to access in an emergency/national security crisis – this option would certainly help investigators, but expose customers to criminals who discover these back doors. It would similarly create unease among some manufacturers and consumers.

    At this point, there are no ready answers but rather more questions that will result from the expected fallout from this and other similar cases in the future. This means that more meaningful discussions need to take place between the private and public sector.

    Governments may need to incentivise and perhaps nudge manufacturers to adopt a security-by-design approach to future offerings. In the meantime, smart citizens should lock their phones and computers, but also pay attention to securing their other smart devices.

    About the Author

    Benjamin Ang is a Senior Fellow at the Centre of Excellence for National Security, S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: Commentaries / Cybersecurity, Biosecurity and Nuclear Safety / Singapore and Homeland Security / Global / Southeast Asia and ASEAN

    Last updated on 04/03/2016

    RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical and contemporary issues. The authors’ views are their own and do not represent the official position of the S. Rajaratnam School of International Studies (RSIS), NTU. These commentaries may be reproduced with prior permission from RSIS and due credit to the author(s) and RSIS. Please email to Editor RSIS Commentary at [email protected].

    Synopsis

    The ongoing legal dispute between Apple Inc and the FBI, over accessing data on the iPhone of a deceased terror suspect, has been characterised as a conflict between security and privacy in the US. But it has also highlighted cybersecurity issues that have serious implications for Singapore’s Smart Nation initiative.

    Commentary

    APPLE INC is refusing to comply with a court order demanding that the company disable a key security feature on the iPhone of a deceased terror suspect, so that the FBI can gain access to its data as part of investigations into the San Bernardino mass shooting. The legal battle, including appeals and congressional hearings, could take months to conclude. But regardless of the outcome, it has raised awareness of serious cybersecurity issues.

    Opinions are divided between those who believe that Apple should comply, to protect national security, and those who believe that Apple should resist, to protect civil liberties like the right to privacy. Opinions are also divided between those who believe that the technology that would be created as a result could be discovered and used by criminals, and those who believe that Apple could help the FBI without creating such a risk.

    Implications for cybersecurity

    While these are serious debates, the case has other implications for the relationship between public and private sectors around the world.

    If Apple loses, a legal precedent could be set that compels technology companies to help governments and law enforcement agencies gain access to customer data. Alternatively, if Apple wins, legislators (in many countries) might want to overcome this by passing laws that require technology companies to grant that access from the stage of creation, called ‘back doors’ – this has already been proposed in some countries. Such tight control over the technology sector could stifle innovation and even expose the public to greater cyber security risks.

    Besides, Apple already operates in many countries where specific laws leave no room for debate. For example, Singapore’s Criminal Procedure Code makes it compulsory to help the police gain access to data stored on a suspect’s computer, or face imprisonment, while the Computer Misuse and Cyber Security Act grant wide powers of access if national security is at risk.

    Furthermore, the majority of smart phone users do not use Apple iPhones. Among the other mobile phone manufacturers, some would not (and already do not) refuse to help governments or law enforcement agencies gain access to customer data.

    In any of the scenarios above, if this technology is discovered (by accident, deception, corruption, or neglect) by hackers, they could use it as a back door to gain access for criminal purposes like identity theft or credit card fraud. Then the public would be well advised not to rely on manufacturers for security, but to use other means of protection instead, like installing additional security (or encryption) software on their phones and computers, like an additional lock on their ‘back door’.

    On the other hand, criminals and terrorists are known to use encryption to hide their nefarious deeds, such as ISIS using the Telegram secure messaging app. Law enforcement agencies need to develop tools to break through (decrypt) this security, creating a competitive race of encryption and decryption.

    Implications for Singapore’s Smart Nation Project

    If security continues to be a lower priority for manufacturers, this has serious implications for Singapore as we become a Smart Nation. Internet of Things (IoT) devices like smart refrigerators, pacemakers or cars, depend on manufacturers to secure them, because unlike smartphones and computers, these IoT devices are usually not designed for users to install additional security.

    It has already been demonstrated that a hacker who gains access to a smart refrigerator, could use it to enter other computers or smart phones in the same household or office network. And if hackers gain access and take over pacemakers or cars, tests have shown that the results could be deadly.

    On the other hand, law enforcement could make good use of evidence stored in a smart device, such as where a suspected terrorist’s smart car has travelled, or if a suspected drug dealer had stored illegal drugs in his smart refrigerator.

    Options Going Forward

    In light of these issues, there are two available options. The first is to legislate that manufacturers of smart devices build in tighter security. This is a highly rational option that would protect customers from hackers, but would most likely hinder police investigations as well as create unease among manufacturers and some consumers.

    The second is to legislate that manufacturers install back doors to device security for law enforcement agencies to access in an emergency/national security crisis – this option would certainly help investigators, but expose customers to criminals who discover these back doors. It would similarly create unease among some manufacturers and consumers.

    At this point, there are no ready answers but rather more questions that will result from the expected fallout from this and other similar cases in the future. This means that more meaningful discussions need to take place between the private and public sector.

    Governments may need to incentivise and perhaps nudge manufacturers to adopt a security-by-design approach to future offerings. In the meantime, smart citizens should lock their phones and computers, but also pay attention to securing their other smart devices.

    About the Author

    Benjamin Ang is a Senior Fellow at the Centre of Excellence for National Security, S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: Commentaries / Cybersecurity, Biosecurity and Nuclear Safety / Singapore and Homeland Security

    Last updated on 04/03/2016

    Back to top

    Terms of Use | Privacy Statement
    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
    OK
    Latest Book
    CO16053 | Beyond Apple vs FBI: Implications for Singapore’s Smart Nation Project

    Synopsis

    The ongoing legal dispute between Apple Inc and the FBI, over accessing data on the iPhone of a deceased terror suspect, has been characterised as a co ...
    more info