Apple New Product Security

Apparently impersonating police officers, searching homes without a warrant, and threatening immigrants has not worked very well for the giant media/technology company:

Calderón told us that six badge-wearing visitors came to his home in July to inquire about the phone. Calderón said none of them acknowledged being employed by Apple, and one of them offered him $300, and a promise that the owner of the phone would not press charges, if he would return the device.

The visitors also allegedly threatened him and his family, asking questions about their immigration status. “One of the officers is like, ‘Is everyone in this house an American citizen?’ They said we were all going to get into trouble,” Calderón said.

One of the officers left a phone number with him, which SF Weekly traced to Anthony Colon, an [ex San Jose police officer and] investigator employed at Apple, who declined to comment when we reached him.

Apple must have finally tasted some of the pickle they are in or maybe it’s just a coincidence that they now are hiring a security manager to oversee new products. Note the tone of the qualifications in the “proven record” of their “ideal candidate”.

Simultaneously working with multiple constituencies, balancing disparate priorities, problem solving in high-demand situations, defining and establishing attainable measures of success, and regularly achieving positive outcomes in large-scale business environments.

Translation: You will be responsible for convincing others who probably do not even get along with each other, and who see you as an impediment to their success, to follow what you say. Also known as experience marketing a very low bar as success because advocating too high a bar would just make everyone align even more against security.

Accurately assessing physical and logical security implementations and making actionable risk management recommendations that consider impact on corporate culture, business operations, system architectures, manufacturing processes, and employee workflows.

Translation: Experience not getting in they way; knowledge of how to let the business make the final decision on the amount of risk they will run while leaving the responsibility of risk (e.g. your reputation as a security “manager”) on you.

Formulating, and successfully implementing, a variety of security technologies utilizing industry-recommended practices and/or risk frameworks.

Translation: Experience buying and implementing security controls three or four years after they already should have been in place.

Looks like an excellent opportunity and a much-needed role. The question is how effective it can be if they are constantly emphasizing in the job spec that they want someone who will not push them too much too soon. Apple could see a significant turnaround if they find the right person, but a manager-level role could be argued as too little too late to alter course from where they appear to be headed.

It reminds me of the patient who will only work with a doctor under certain conditions. The patient, for example, might accept advice but disallow being told what to do and forbid any intervention, even to save their life. The medical profession seems to call this the “difficult” patient problem.

Doctors report that about one in six patients is “difficult.” […] The data suggest that some doctors may simply have a shorter fuse when it comes to dealing with a challenging patient. The researchers noted that older, more experienced practitioners are likely better at dealing with unhappy patients and may be less likely to view patient visits as difficult, even when they’re not perfect. […] An editorial suggested…doctors need better training to cope with the psychological challenges of caring for patients…doctors are advised to rise to the challenge of working with a difficult patient.

Who will rise to the challenge of working with Apple?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.