Apple Irritates Interest Groups, Law Enforcement With Its (Reasonable) Refusal To Restart Its Client-Side Scanning Program

from the minor-gains-versus-massive-problems dept

After years of irritating the DOJ with its refusal to compromise encryption, Apple suddenly went the other way after receiving criticism over its perceived inability to stop the distribution of CSAM (child sexual abuse material) via its devices and services.

For a very brief moment, Apple decided it would no longer be a world leader in privacy and security. It declared it would begin engaging in client-side scanning of users’ content in hopes of preventing the spread of CSAM.

Mere moments later, it abandoned this never-implemented plan, citing the security and privacy flaws client-side scanning would create. While it’s always a good idea to do what you can to prevent CSAM distribution, if that effort means subjecting every device user to unpatchable, deliberately created security holes, then it’s not worth doing.

Why? Because it just creates an exploit governments can use to search out other content they don’t care for, like dissenting views, work product created by critical journalists, or anything that might be used to silence content that doesn’t comply with the government’s preferred narrative.

Apple had good reasons for attempting to limit the distribution of CSAM. It also had good reason to shut down this project before it began after realizing the negative, unintended consequences would likely outweigh whatever public good it might create by deliberately compromising its own encryption.

Needless to say, this has produced another set of enemies for Apple. Governments all over the world sincerely hoped voluntary client-side scanning by a major US tech company would allow them to pass laws demanding similar compliance from other tech companies. Groups involved in deterring the sharing of CSAM hoped Apple’s proactive scanning would prompt others to similarly compromise the security and privacy of their customers — something that might make it a bit easier to round up child abusers and deter future victimization.

Apple appears to have moved past the “mothball” stage to a permanent rejection of client-side scanning efforts. That move has generated a new round of criticism. This time it’s not a government demanding Apple do more. It’s child safety group Heat Initiative, which sent Apple an email criticizing its move away from proactive client-side scanning of uploaded content.

Heat Initiative wanted answers. It got them… but not the answers it wanted. Not only that, but Apple has chosen to make its answer public, as Lily Hay Newman reports for Wired:

Today, in a rare move, Apple responded to Heat Initiative, outlining its reasons for abandoning the development of its iCloud CSAM scanning feature and instead focusing on a set of on-device tools and resources for users known collectively as Communication Safety features. The company’s response to Heat Initiative, which Apple shared with WIRED this morning, offers a rare look not just at its rationale for pivoting to Communication Safety, but at its broader views on creating mechanisms to circumvent user privacy protections, such as encryption, to monitor data. This stance is relevant to the encryption debate more broadly, especially as countries like the United Kingdom weigh passing laws that would require tech companies to be able to access user data to comply with law enforcement requests.

Heat Initiative may have preferred this communication (especially since it ended with a powerful rebuttal of the group’s demands) remained private. Apple has chosen to make this response [PDF] public because it makes the points groups and governments tend to desire aren’t made publicly, like the fact that engaging in client-side scanning tends to benefit autocrats, surveillance state participants, and, yes, other criminals far more than it benefits even the most helpless members of our society: the children being exploited by sexual abuse.

Scanning of personal data in the cloud is regularly used by companies to monetize the information of their users. While some companies have justified those practices, we’ve chosen a very different path — one that prioritizes the security and privacy of our users. Scanning every user’s privately stored iCloud content would in our estimation pose serious unintended consequences for our users. Threats to user data are undeniably growing — globally the total number of data breaches more than tripled between 2013 and 2021, exposing 1.1 billion personal records in 2021 alone. As threats become increasingly sophisticated, we are committed to providing our users with the best data security in the world, and we constantly identify and mitigate emerging threats to users’ personal data, on device and in the cloud. Scanning every user’s privately stored iCloud data would create new threat vectors for data thieves to find and exploit.

It would also inject the potential for a slippery slope of unintended consequences. Scanning for one type of content, for instance, opens the door for bulk surveillance and could create a desire to search other encrypted messaging systems across content types (such as images, videos, text, or audio) and content categories. How can users be assured that a tool for one type of surveillance has not been reconfigured to surveil for other content such as political activity or religious persecution? Tools of mass surveillance have widespread negative implications for freedom of speech and, by extension, democracy as a whole. Also, designing this technology for one government could require applications for other countries across new data types.

Scanning systems are also not foolproof and there is documented evidence from other platforms that innocent parties have been swept into dystopian dragnets that have made them victims when they have done nothing more than share perfectly normal and appropriate pictures of their babies.

These are all good answers. And they’re definitely not the answers Heat Initiative was hoping to receive. But they’re the most honest answers — ones that don’t pretend what this group wants will somehow be workable and free of negative consequences.

The unsurprising twist is that Heat Initiative already knew Apple would raise legitimate concerns about client-side scanning, rather than simply do what the activist group wanted it to do. Instead of engaging in the issue honestly and directly as Apple has done, Heat Initiative has already moved forward with a plan to (dishonestly) portray Apple as a willing participant in the spread of CSAM:

A child advocacy group, the Heat Initiative, has raised $2 million for a new national advertising campaign calling on Apple to detect, report and remove child sexual abuse materials from iCloud, its cloud storage platform.

Next week, the group will release digital advertisements on websites popular with policymakers in Washington, such as Politico. It will also put up posters across San Francisco and New York that say: “Child sexual abuse material is stored on iCloud. Apple allows it.”

The thing is: Apple doesn’t allow it. Apple simply refuses to undermine every user’s privacy and security to detect what is assuredly a very small amount of illegal content being transmitted via its services. Apple’s argument — stated directly and intelligently to Heat Initiative — is simply this: breaking encryption results in broken encryption. And that can be exploited by governments and criminals just as easily as it can be utilized to detect CSAM.

There is no perfect solution that benefits every stakeholder in CSAM cases. But what should never be considered the most acceptable solution is anything that converts innocent users into fodder for government oppression. That’s what Apple wants to prevent. And, for that, it will continue to be labeled as a participant in child sexual abuse by intellectually dishonest entities like Heat Initiative.

Filed Under: , , , , ,
Companies: apple, heat initiative

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Apple Irritates Interest Groups, Law Enforcement With Its (Reasonable) Refusal To Restart Its Client-Side Scanning Program”

Subscribe: RSS Leave a comment
24 Comments
This comment has been deemed insightful by the community.
Anonymous Coward says:

It will also put up posters across San Francisco and New York that say: “Child sexual abuse material is stored on iCloud. Apple allows it.”

Is it just me or is that straying awfully close to defamation? If they added “intentionally” or “deliberately” that seems like it would actually be wrong.

And as you said Apple does not allow it. Except in a way similar to that the government allows all forms of child abuse, murder, kidnapping, etc, because it has totally failed to kill-everyone (there by stopping them from committing all crimes).

PS. Full disclosure. If you asked if I like or disliked Apple, I’d have to say “dislike”… But I prefer burning (figuratively) people/organization for the wrongs they have committed, random blathering that is disconnected from reality.

Anonymous Coward says:

Good Choice, Apple

I for one am glad that they decided against this, not because of privacy or security, but just the fact that AIs need training data to know what’s what. If you want a CSAM scanner, you need training data. Which in this case would be illegal, immoral, and just all around horrible. Who even thought that this would be remotely doable?

Anonymous Coward says:

Re:

I disagree, accuracy isn’t a big problem compared to other problems. IMO the big problems are:

  • The government is pressuring a company to perform searches indiscriminately, without probable cause. The reason to require probable cause is to limit the power of the government. Apple providing these searches on the government’s behalf similarly centralizes power out of the hands of ordinary people.
  • Once such a system is established, it will be used for other purposes. You can guarantee it will be used for terrorism and eventually for copyright protection. Invasive client-side searches will be normalized and may even eventually be required by law.

Re: accuracy, the proposed system doesn’t use machine learning. It works by comparing hashes of images with hashes of CP. A particular agency has copies of large quantities of CP and sends Apple hashes. Apple then compares hashes of local images to those given to it. Whether you agree with that approach, it does seem reasonable. However, we ordinary people don’t have any way to inspect it and verify that it works as intended.

Anonymous Coward says:

Re:

This reminds me of all those advocates who INSIST we should have every text, video, and image scanned. But when you say “Okay, then I want copies of every text, video, or image you’ve ever sent or will send. If you have nothing to hide you have nothing to fear right?” T

heir tone would completely change. I didn’t think the leopards would eat MY face.

Cattress (profile) says:

Re:

I won’t even take the risk of photographing my kid without clothes because the law or the tech can always change, security isn’t perfect & there isn’t anyone who I want to share those particular moments with. Also, no judgement on parents that do take naked baby pictures. There’s no shame in nudity, this is just what I decided was best for us.

This comment has been deemed insightful by the community.
That One Guy (profile) says:

Not the sorts you want to be agreeing with

Privacy and the lack of total and complete surveillance of every word you say and act you do is what allows CSAM to be created and shared, so nice of the Heat Initiative to say the quiet part out loud and side with tyrants and dictators who likewise loathe both.

Privacy can protect terrible people, this is certainly true, but it protects vastly more innocent people in countless ways, making destroying privacy to go after [insert problem here] the equivalent of burning down an apartment building to get rid of a termite, and adding insult to injury in this comparison while the tenants had their lives ruined and/or ended by the fire the termite is temporarily inconvenienced, and unlike the people who were living there it just moves into another building none the worse.

Anonymous Coward says:

Potentially stupid and conspiratorial question, but has anybody been able with to find information on this Heat Initiative group? I just found it strange this organisation that search results don’t recognise at all (and think is groups that deal in heating and climate change) beyond the articles also quoted in this article. I ask because whilst yes, any schmuck can make a public statement (hi) or send a sternly-worded letter to a big company, most of them don’t suddenly get cash injections worth 2 million + the advertising pull or capacity to plant ads, much less on big newspapers (and with claims like That on said ads).

Anyone know more?

Anonymous Coward says:

As I recall, there was two distinct programs that some like to conflate into a single program.

The one that they want to be the shiny object that we pay attention to was this CSAM scanning before pictures were uploaded to Icloud. That’s the one that doesn’t affect anyone I know.

The other one was a scanner for iMessage, which affects every Apple user that I do know. This scanner, represented as an opt-in feature for families to protect children could easily be repurposed at the behest of governments to scan any aspect of iMessages, opt-in or otherwise.

They want us focused on the shiny object. But, it is the 2nd scanner, the one that scans iMessages that I pay attention to.

Michael Brian Bentley says:

Were Apple to implement this

Very early in developing a massive public-facing technology, one ought to ask how state governments such as that of the People’s Republic of China, as well as less-capable state governments, would repurpose the technology once it became available to them? This exercise asks, “what if?” and needs to be considered when a technology winds up being used through over a billion devices.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Subscribe to Our Newsletter

Get all our posts in your inbox with the Techdirt Daily Newsletter!

We don’t spam. Read our privacy policy for more info.

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...