And you have some dangerous logic, do not put security measures in place because it drives criminals further underground!! really, is that your logic??
As for how many terrorist incidents could have been avoided, yes I do know how many...ALL of them, because each one has had a public enquiry and in the enquiry the security services/police have complained at not being able to monitor the communication/messages. They know something is going down but they have no idea where, when and how.
You've answered your own query? Apple put security measures in place to safeguard users. Its UK, EU and others that want that security features removed to create a back door.
As for your ridiculous assertion that all terrorist incidents could have been avoided....completely wrong. As for citing public enquiries....that's really clutching at straws especially with regards the UK where these are usually 6 years after the event and designed in the main to kick cock ups into the long grass.
Of course backside covering results in people suggesting if only we had this, it wouldn't have happened, or 'it wasn't our fault' and of course authorities want more and more control of your data, but that gives no evidence at all it would reduce terrorism.
Indeed recent stats regarding child porn demonstrate beyond any doubt that these sick individuals ALREADY utilise other methods to maintain anonymity which makes their detection even harder, so the only reason for a backdoor is not the excuse proffered of solving crime, it is a surveillance society where billions of innocent people are designated guilty, whilst the guilty parties have already made other arrangements.
Reminder of the 1769 doctrine by William Blackstone that “the law holds that it is better that 10 guilty persons escape, than that 1 innocent suffer"
In this case its billions of people presumed guilty, and their personal liberty and privacy destroyed and sad thing is its not about crime fighting, its about POWER.
Every now and again we get a new excuse to chip at freedoms, chip at privacy...all just an excuse for the few to exert control over the many.
Criminals adapt but once you open Pandora's box of backdoors and preventing Apple and others from having high level security measures to protect users you are on a very slippery slop as it does not reduce crime, it does not make the job of authorities trying to catch these people easier it makes it harder as criminals go underground:
The dirty magazines have all but disappeared.
www.latimes.com
A Fremont man is among 14 defendants facing federal charges after investigators have busted what they say is one of the largest child porn rings they have ever uncovered.
www.cbsnews.com
Criminal to criminal (C2C) communications
Criminal forums within the deep web or Darknet remain a crucial environment for cybercriminals to communicate. They are a key component of the crime-as-a-service business model which underpins much of cybercrime, providing cybercriminals, entry-level and upwards, with access to the tools and services they need, and providing an environment where they can teach, learn, buy and sell, advertise and do business. Following the law enforcement take-down of the Darkode forum in July 2015
148 - the most prolific English speaking criminal forum at the time - there do not appear to be any notable replacements.
Other web-based communication platforms such as chatrooms or open forums are still commonly used for C2C communications, as is ‘simple’ email. Secure, encrypted email is readily available. Some states still report the use of draft emails to communicate from accounts with shared access.
While forums may be suitable for initial contact, most subsequent communications continue using alternate, less public means. Here Jabber is a commonly used tool, and believed to be the preferred means of communication for the more technically competent cybercriminals. To a slightly lesser extent, IRC and ICQ are also used, whereas commercial ‘branded’ products are largely absent. More exotic means of communication such as the use of gaming consoles or even RATs are rare.
Essentially, cybercriminals will use whatever communication method they deem to be the most convenient and/or that which they perceive to be sufficiently secure.