{"id":3959,"date":"2016-02-26T12:30:36","date_gmt":"2016-02-26T16:30:36","guid":{"rendered":"http:\/\/ncjolt.org\/?p=3959"},"modified":"2020-06-04T20:53:03","modified_gmt":"2020-06-04T20:53:03","slug":"apple-inc-and-the-federal-bureau-of-investigation-at-loggerheads-over-encrypted-cell-phone","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/apple-inc-and-the-federal-bureau-of-investigation-at-loggerheads-over-encrypted-cell-phone\/","title":{"rendered":"Apple Inc. and the Federal Bureau of Investigation at Loggerheads Over Encrypted Cell Phone"},"content":{"rendered":"<p>On December 2, 2015 Syed Farook and his wife Tashfeen Malik carried out a deadly mass shooting at Farook\u2019s workplace in San Bernardino, California. The attack, which was likely inspired by extreme anti-western views, has been labeled the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/local\/california\/la-me-1227-islamic-convention-20151227-story.html\">\u201cworst terrorist attack on American soil since Sept. 11.\u201d<\/a> <\/span>Farook and Malik were killed the same day in a shootout with police, leaving investigators to gather and piece together evidence about the attack without ever having the opportunity to question the perpetrators.<br \/>\nThe FBI now claims it would like to access data on Syed Farook\u2019s Apple iPhone which it believes could be valuable for thwarting future terrorist attacks and learning more about the motives and planning behind the couple\u2019s deadly rampage. However, the FBI <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.techdirt.com\/articles\/20160220\/22412933661\/no-fbi-does-not-need-info-farooks-iphone-this-is-entirely-about-precedent.shtml\">may also be trying to set a precedent<\/a><\/span> which will ensure tech companies compliance in handing over data, or the tools to access data, in the future. On February 16, 2016 a Federal Judge in California sided with the FBI and issued an order to apple that it \u201cassist in enabling the search\u201d of Farook\u2019s phone.<br \/>\n<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.techdirt.com\/articles\/20141129\/07385129274\/doj-using-antiquated-1789-all-writs-act-to-try-to-force-phone-manufacturers-to-help-unlock-encrypted-phones.shtml\">This is not the first tussle between the FBI and Apple<\/a><\/span> over how complicit the company must be in assisting the FBI to gather information from its customers. In 2014, Apple strengthened privacy and security features for iPhones running with newer operating systems. Formerly, Apple had the capability to hack into a person\u2019s iPhone if it was handed over by law enforcement. With the new phones, however, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/apple-court-encryption-idUSL1N12K2A420151021\">Apple said it would no longer be able to do this<\/a><\/span>. With the newer phones, creating a PIN to access the phone encrypts data on the phone using two tiered encryption where the PIN unlocks the key which in turn unlocks the data.<br \/>\nUnfortunately for the FBI, they can\u2019t simply keep guessing PINs until they get it right. The iPhone that Farook used, the 5c, will automatically wipe the data from the phone after ten incorrect PIN entries. Then there is a delay between PIN entries, so <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.cnet.com\/news\/apple-versus-the-fbi-why-the-lowest-priced-iphone-has-the-us-in-a-tizzy-faq\/\">that even a super computer might take 5.5 years to crack a six digit PIN<\/a><\/span>. A combination of numbers and letter could take much longer. Furthermore, the phone is designed so that PINs must be entered directly on the phone, meaning connecting the phone to a computer might be an issue.<br \/>\nThese new security features <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.cnet.com\/news\/apple-versus-the-fbi-why-the-lowest-priced-iphone-has-the-us-in-a-tizzy-faq\/\">are important to many customers<\/a><\/span> in the wake of the 2013 Snowden revelations, where documents revealed that some tech companies where complicit in spying on the American people. Apple <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/kieranhealy.org\/blog\/archives\/2016\/02\/18\/walled-garden\/\">was in a position to show that it took privacy seriously<\/a><\/span>, and did so by upgrading the protections on its devices. But what this means for the FBI is that there will be situations where a device has evidence, the FBI has a court order, and they still will not be able to access the data.<br \/>\nWhich is exactly the situation the FBI says it has in the case of Farook\u2019s phone. Therefore, the FBI requested, and a judge ordered Apple <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.techdirt.com\/articles\/20160216\/17393733617\/no-judge-did-not-just-order-apple-to-break-encryption-san-bernardino-shooters-iphone-to-create-new-backdoor.shtml\">to do three things<\/a><\/span>:<br \/>\n(1) it will bypass or disable the auto-erase function whether or not it has been enabled; (2) it will enable the FBI to submit passcodes to the SUBJECT DEVICE for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available on the SUBJECT DEVICE and (3) it will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware.<br \/>\nEssentially the FBI is asking Apple to <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.theguardian.com\/technology\/2016\/feb\/22\/apple-vs-fbi-engineers-breaking-encryption-unholy\">write new software<\/a> <\/span>to defeat its own security measures. Unmoved by the government\u2019s arguments, Apple has since publically stated that it will not comply with the order.<br \/>\nWhat is extremely interesting, and perhaps most telling, is how each side has publically addressed the situation. While it is true that there is an actual phone and an actual violent plot at the background of all this, the fight between the Feds and the tech giant is really about a much larger ongoing debate. This is a perfect case to study various arguments for enhanced privacy, versus the arguments for increased access by law enforcement, thus enhancing security of the public at large.<br \/>\nFrom Apple\u2019s perspective, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/2016\/02\/19\/technology\/how-tim-cook-became-a-bulwark-for-digital-privacy.html\">CEO Tim Cook has said<\/a><\/span> from the beginning that this is about privacy. But while that may appeal to Apple customers and privacy advocates, the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/business\/technology\/la-fi-tn-pew-apple-fbi-20160222-story.html\">general public may not agree<\/a><\/span> that the FBI should not be able to look through someone\u2019s phone if they have a court order. Maybe not surprisingly, Apple has pivoted its stance to one that raises concerns about security.<\/p>\n<blockquote><p>If Apple creates a backdoor to encryption, it says, it will only be a matter of time before the ability to hack devices falls into the wrong hands, such as criminals or foreign bad actors.<\/p><\/blockquote>\n<p>&nbsp;<br \/>\nOnce that happens every device will be vulnerable. Therefore, Apple argues, breaking into this one phone will have consequences that far outweigh the reward.<br \/>\nFor the FBI\u2019s part, they have carefully tried to frame the issue to make it as much about this one case as possible. The shooting is a sensitive subject and there is great public support to fight perceived terrorist threats. However, if the FBI wins this battle it will have set a precedent it no doubt would like to exploit in the future. <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.techdirt.com\/articles\/20160220\/22154433660\/fbi-told-san-bernardino-to-change-password-which-is-why-fbi-now-cant-access-farooks-iphone-data.shtml\">As Mike Masnick of Techdirt reminds<\/a><\/span>, \u201cafter the Intelligence Community lost the fight to get a law banning strong encryption, intelligence officials said out loud that they&#8217;d just wait until the next terrorist attack.\u201d\u00a0 The political environment surrounding a serious attack such as the San Bernardino shooting makes the security argument the FBI is pushing much more favorable. There is even<span style=\"color: #0000ff\"> <a style=\"color: #0000ff\" href=\"https:\/\/medium.com\/@thegrugq\/feeble-noise-pollution-627acb5931a2#.bldpezf5a\">doubt as to whether the FBI really needs the data<\/a><\/span> it can access by breaking through the Encryption on Farook\u2019s phone. And the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.techdirt.com\/articles\/20160220\/22154433660\/fbi-told-san-bernardino-to-change-password-which-is-why-fbi-now-cant-access-farooks-iphone-data.shtml\">FBI\u2019s own actions<\/a><\/span> may be responsible for locking itself out in this case.<br \/>\nWhatever one thinks of the merits of each sides\u2019 arguments. This is a case that should be paid close attention to because it involves important questions about the balance of personal privacy and collective security. And also whether or not a company should be compelled to help the government break into its own product. Interestingly, even if the government wins this round, privacy advocates <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/theintercept.com\/2016\/02\/18\/passcodes-that-can-defeat-fbi-ios-backdoor\/\">are already one step ahead<\/a><\/span> coming up with ways to protect their data from a government hack. If nothing else peaks ones interest in this case, it is worth noting the irony that the FBI\u2019s legal argument on why it has the authority to beat encryption is based on a law that is over 200 years old. Proving once again that in the fast paced twenty-first century of a new iPhone seemingly every year, the pace of the law is as cautious and plodding as ever.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On December 2, 2015 Syed Farook and his wife Tashfeen Malik carried out a deadly mass shooting at Farook\u2019s workplace in San Bernardino, California. The attack, which was likely inspired by extreme anti-western views, has been labeled the \u201cworst terrorist attack on American soil since Sept. 11.\u201d Farook and Malik were killed the same day <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/apple-inc-and-the-federal-bureau-of-investigation-at-loggerheads-over-encrypted-cell-phone\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":3960,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3959"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=3959"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3959\/revisions"}],"predecessor-version":[{"id":7231,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3959\/revisions\/7231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/3960"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=3959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=3959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=3959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}