{"id":4046,"date":"2016-04-04T14:54:48","date_gmt":"2016-04-04T18:54:48","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4046"},"modified":"2020-06-04T20:53:02","modified_gmt":"2020-06-04T20:53:02","slug":"tension-between-the-fbi-and-apple-is-halted-but-tension-between-national-security-and-privacy-will-persist","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/tension-between-the-fbi-and-apple-is-halted-but-tension-between-national-security-and-privacy-will-persist\/","title":{"rendered":"Tension Between the FBI and Apple Is Halted but Tension Between National Security and Privacy Will Persist"},"content":{"rendered":"<p>The Justice Department reported on Monday that it has discovered a way to unlock the iPhone of San Bernardino terrorist, Syed Farook, without aid from Apple. Consequently, the Justice Department withdrew its <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/2016\/03\/29\/technology\/apple-iphone-fbi-justice-department-case.html?ref=technology\">legal action<\/a><\/span> to compel Apple to assist in the investigation of the San Bernardino mass-shooting. The unlocking method was brought to the FBI earlier this month by an unidentified private entity. It allows investigators to bypass the security function without erasing contents of the iPhone. The FBI is now reviewing the contents of the phone \u201cconsistent with standard investigatory procedures\u201d according to Justice spokeswoman, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.usatoday.com\/story\/news\/nation\/2016\/03\/28\/apple-justice-department-farook\/82354040\/\">Melanie Newman<\/a><\/span>. The Justice Department dropping this case against Apple signifies a temporary retreat from a <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.wsj.com\/articles\/fbi-unlocks-terrorists-iphone-without-apples-help-1459202353\">high stakes standoff<\/a><\/span> between Washington and Silicon Valley over privacy and security in this digital age.<br \/>\nThe FBI contended, in court papers filed in February, that because Farook disabled the phone\u2019s iCloud backup function six weeks before the shootings, the FBI was <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/local\/lanow\/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html\">left ignorant<\/a><\/span> of Farook\u2019s actions in the days and weeks before the attack. Farook\u2019s iPhone was protected by an auto-erase feature that would permanently destroy all data on the phone after ten consecutive incorrect password entry attempts. By disabling the iCloud backup, Farook could keep all his data hidden behind the iPhone\u2019s passcode lock.<br \/>\n<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.wsj.com\/articles\/fbi-unlocks-terrorists-iphone-without-apples-help-1459202353\">Tension<\/a><\/span> between technology companies and the federal government has been developing for over a year. Technology companies have increasingly used encryption as a default setting for their products, and have declined to help law enforcement agencies open suspect devices in some cases. The FBI\u2019s <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/local\/lanow\/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html\">goal<\/a><\/span> in unlocking the iPhone was to obtain insight into the planning of the San Bernardino attacks and the movements of Farook and his wife, Tashfeen Malik in the hours after they shot and killed fourteen people on December 2, 2015. The FBI had argued that Apple was the only party that could help unlock the phone since it created the software. According to Apple, who has made security a central component of its marketing campaigns, it strongly opposed assisting the FBI in unlocking the iPhone because it would threaten the privacy of all its customers.<br \/>\nApple contended that the FBI was grossly overstepping their bounds on personal privacy and that the demand would put an <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/nypost.com\/2016\/03\/28\/fbi-breaks-into-san-bernardino-gunmans-iphone-ending-court-case\/\">undue burden<\/a><\/span> on Apple. It estimated that it would take up to ten company engineers and other workers a month to create the necessary software to unlock the phone and then Apple would just have to destroy it afterward. Apple\u2019s<span style=\"color: #0000ff\"> <a style=\"color: #0000ff\" href=\"http:\/\/www.usatoday.com\/story\/news\/nation\/2016\/03\/28\/apple-justice-department-farook\/82354040\/\">opposition<\/a><\/span> to assisting the FBI for fear of undermining consumer privacy was supported by Google, Facebook, Microsoft, and other tech giants.<br \/>\nThe FBI\u2019s ability to unlock an iPhone through an alternative method raises uncertainties and questions about the strength of Apple\u2019s security on its devices. While Apple\u2019s lawyers have previously asserted that Apple would want to know the method used to unlock the iPhone, the government may make that method <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/2016\/03\/29\/technology\/apple-iphone-fbi-justice-department-case.html?ref=technology\">classified<\/a><\/span>. According to <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.nytimes.com\/2016\/03\/29\/technology\/apple-iphone-fbi-justice-department-case.html?ref=technology\">Esha Bhandari<\/a><\/span>, an attorney at the ACLU, the government generally goes through a process, known as an equities review, whereby it decides whether to disclose information about certain vulnerabilities so that manufacturers can fix them. The FBI would be required tell Apple about any vulnerability potentially affecting iPhones unless it can show a group of administration officials that there is a substantial <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.bloomberg.com\/news\/articles\/2016-03-23\/thank-you-for-hacking-iphone-now-tell-apple-how-you-did-it\">national security need<\/a><\/span> to keep the flaw secret. <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/fbi-has-accessed-san-bernardino-shooters-phone-without-apples-help\/2016\/03\/28\/e593a0e2-f52b-11e5-9804-537defcc3cf6_story.html\">Michael Daniel<\/a><\/span>, special assistant to the president and cybersecurity coordinator,\u00a0believes that disclosing the vulnerability may mean that the FBI would consequently forgo an opportunity to collect crucial intelligence that could thwart a terrorist attack.<br \/>\nPolice have consistently contended that data encryption allows criminals to store information on smartphones to avoid detection. While it is still uncertain how the FBI gained access to Farook\u2019s iPhone, if the FBI found a way around Apple\u2019s security measures, it could allow access to police <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/local\/lanow\/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html\">nationwide<\/a><\/span> of similarly encrypted data in a much wider range of investigations. While many Americans may be unconcerned about the security of personal information on their phones, in other countries where due process of law and civil rights are limited, access by authorities to iPhone data could result in serious and unjust consequences for the individual.<br \/>\nAlthough the Justice Department dropping its case against Apple halts a pending legal fight over whether the government can force technology companies to write software to aid in criminal investigations, the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.wsj.com\/articles\/fbi-unlocks-terrorists-iphone-without-apples-help-1459202353\">questions<\/a><\/span> of how secure electronic communications should be and what firms should have to do to help the government access their customers\u2019 data still linger. Melanie Newman indicated that while Farook\u2019s phone is no longer at issue, the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.wsj.com\/articles\/fbi-unlocks-terrorists-iphone-without-apples-help-1459202353\">broader fight<\/a><\/span> over encryption-protected technology will endure. Newman asserted, \u201cIt remains a priority for the government to ensure that law enforcement can obtain crucial digital information to protect national security and public safety, either with cooperation from relevant parties, or through the court system when cooperation fails.\u201d<br \/>\nSmartphones have the ability to reveal a variety of in depth information about their owners. For example, they can serve as a gateway to an individual\u2019s communications, daily schedule and locations, interpersonal relationships, health information, financial information, and other data. Therefore, one can understand why technology firms want to <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.wsj.com\/articles\/fbi-unlocks-terrorists-iphone-without-apples-help-1459202353\">protect devices<\/a> <\/span>from infiltration and why law enforcement wants to gain access to them. Without knowing the method by which the FBI unlocked the iPhone, it is difficult to posit what the security implications might be for iPhone users.<\/p>\n<blockquote><p>While the drama between the FBI and Apple has come to a standstill, the issues implicated will surely be of continuing debate as the FBI continues the pursuit of national security and public safety by obtaining crucial digital information through all available options.<\/p><\/blockquote>\n<p>&nbsp;<br \/>\n&nbsp;<br \/>\n&nbsp;<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Justice Department reported on Monday that it has discovered a way to unlock the iPhone of San Bernardino terrorist, Syed Farook, without aid from Apple. Consequently, the Justice Department withdrew its legal action to compel Apple to assist in the investigation of the San Bernardino mass-shooting. The unlocking method was brought to the FBI <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/tension-between-the-fbi-and-apple-is-halted-but-tension-between-national-security-and-privacy-will-persist\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4047,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4046"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4046"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4046\/revisions"}],"predecessor-version":[{"id":7210,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4046\/revisions\/7210"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/4047"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}