Modern field guide to security and privacy

Apple's opposition to FBI request sets stage for broader fight over encryption

Security and privacy experts say a lot is riding on the outcome of a federal court order to bypass security functions on an iPhone used by one of the San Bernardino shooters, which would require Apple to build what CEO Tim Cook calls a ‘dangerous’ backdoor.

|
Eric Risberg/AP/File
Apple CEO Tim Cook introduced the iPhone 6s and iPhone 6s Plus at an Apple event in September 2015.

Can Tim Cook fight the government and win?

Apple's chief executive officer has promised to appeal a federal court ruling demanding his company help the FBI get around built-in security features on an iPhone used by one of the San Bernardino, Calif., shooters.

But this case, insist US security and privacy experts, is not just about allowing investigators to find out more information from one Apple device seized from a slain terror suspect. Instead, they say, the outcome could affect anyone who uses American tech products because it could open the door for the government to insist on new mechanisms for weakening security on all consumer devices. 

"While it seems like this case is only about one iPhone, it’s become the flash point in the fight over encryption and the security of the Internet," says Kevin Bankston, the director of New America's Open Technology Institute. "They are asking a company to build new tools to bypass the security of its own product. That’s a problem that would go far beyond Apple. It’s not even a slippery slope – it’s a sharp cliff."

If a US court can indeed compel Apple to do this, Mr. Bankston continued, "It can likely legally compel any other software providers to do the same thing."

Law enforcement has long complained that the trend of increasingly strong encryption deployed by companies such as Apple and Google is stymieing their pursuit of terrorists and criminals. Apple insists its encryption is a best practice that protects consumers from any unwanted parties, whether they are criminal hackers or snooping governments, and that it does not have the technical means to access the protected data.

The ongoing encryption debate – which has pitted many in the security industry against intelligence and law enforcement officials – may find its first major test case here, as the world’s largest tech company promises to go head-to-head with the US government in a highly sensitive investigation for an attack on US soil.

The FBI says Apple’s built-in iPhone security features have blocked agents from accessing data on the iPhone used by Syed Rizwan Farook, which they believe may contain crucial evidence relating to the December terrorist attack that killed 14 people. 

In a win for the government's side, a magistrate judge in Riverside, Calif., ordered Apple to write new software to make it easier for federal agents to access the phone’s data by "brute force," in which investigators could guess the passcode by using programs designed to try millions of combinations quickly. To do this, Apple would have to turn off the feature that would erase the iPhone’s data after 10 incorrect tries.

The Department of Justice says accessing the phone is necessary to fully investigate the San Bernardino attacks. "We have made a solemn commitment to the victims and their families that we will leave no stone unturned as we gather as much information and evidence as possible," said United States Attorney Eileen M. Decker in a statement. "These victims and families deserve nothing less."

Apple has "no sympathy for terrorists" and has helped investigators in this case, Apple’s Mr. Cook said in a public letter. But, he said, building a new version of the iPhone operating system that circumvents key security features and installing it on the seized device would "undeniably create a backdoor" into his products. That’s something, Cook said, "we simply do not have, and something we consider too dangerous to create."

Even though the government suggests this tool could only be used in this case, Cook says, "that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks – from restaurants and banks to stores and homes. No reasonable person would find that acceptable."

But if the FBI can force Apple to hack into one user's device, worries American Civil Liberties Union staff attorney Alex Abdo in a statement, “then so too can every repressive regime in the rest of the world."

It could be tough for companies to retain the moral high ground on bulletproof security if they cooperate for the US government but refuse similar demands by other countries in which they operate. "Imagine if this was China asking for the same thing? And who is to say they won't ask for the same tomorrow?” says Cris Thomas, a strategist at the cybersecurity firm Tenable who is known by his hacker name Space Rogue.

"Once this 'feature' is created it will not be contained, it will eventually trickle down to local police forces and foreign governments," he said. "The potential for abuse is huge."

Compliance for many companies could also prove enormously cumbersome. A company like Apple might be able to write another, weaker operating system without tanking its business. But Chris Finan, chief executive officer of Manifold Security notes, "We can’t afford to build several versions.”

Like Apple, he says, "We similarly try to build one product that works in international markets and focus on empowering our customers. We never want any suggestion we could undermine their security."

For its part, Apple has five days to respond to the order and detail whether compliance would be "unreasonably burdensome" on the company.

But compliance could cost the company more than money – instead damaging consumers’ trust, especially in the wake of the Edward Snowden revelations that showed widespread government surveillance.

"People around the world will perceive this as the US government bullying US companies into taking its side," says Mr. Finan says. "That can have a huge economic consequences for not just Apple but other US based companies doing business overseas."

Already, rallies organized by progressive digital rights advocacy group Fight for the Future are planned outside Apple stores across the country.

The iPhone in question is currently in the hands of law enforcement. But privacy policy experts worry that Apple complying in this case allow the Justice Department to require American tech companies to find ways to break into phones investigators have not yet confiscated.

Amie Stepanovich, policy manager at digital rights group Access, worries that if Apple complies with the FBI request, it could lead to government agencies trying to remotely access devices that belong to belonging to criminal suspects or anyone the police are investigating – not just devices it has in custody. This, she says, could potentially compromise citizens' rights. 

"It opens a big can of worms,” she says.

At its core, this case brings up an important question of responsibility, says Jon Callas, chief technology officer of encrypted communications firm Silent Circle. Even if law enforcement has a warrant, the constitution does not automatically guarantee that a legal search will be successful, he notes.

"If there's a building full of file cabinets, there's no guarantee [agents] will find what they're looking for even if they know it's there," Mr. Callas says. A warrant, he adds, also "doesn't obligate the target to help search."

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Apple's opposition to FBI request sets stage for broader fight over encryption
Read this article in
https://www.csmonitor.com/World/Passcode/2016/0217/Apple-s-opposition-to-FBI-request-sets-stage-for-broader-fight-over-encryption
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe