Abstract
The recent impasse between Apple and the FBI made flash security part of the daily news. The FBI wanted to look at the data in a dead terrorist’s cell phone and demanded that Apple unlock the encryption. Apple refused, citing security and privacy issues and noting that governments around the world could demand drive unlocking for almost any reason. Besides, Apple noted, such a backdoor would soon be widely available.Do we refuse requests from law enforcement that could thwart terrorist attacks and save lives? Do we allow requests and end up with private data being used for blackmailing and spread around the news media? Could we then have lists of police informants, spies, or protesters against autocratic governmentsmade public, as well as sensitive corporate data? The specific solution in the Apple/FBI case raises even more questions. The FBI paid over $1 million to an unknown vendor to thwart the encryption. Who else could build or buy the same tool? In the corporate world, both security and recovery are essential tools in the arsenal of business processes. Ideally, we want harmonious co-existence. This Panel will explore the tension between security and data recovery, search for any win/win trade-offs and alternatives, and hopefully elevate the discourse above the irrational, often hysterical, level heard today; we hope! Come join a lively discussion of a fascinating issue.