Modern field guide to security and privacy

Opinion: Why the FBI will eventually reveal its iPhone hack to Apple

Because of a two-year-old policy known as the Vulnerability Equities Process, the government may be compelled to disclose the flaw it is attempting to use for unlocking the San Bernardino shooter's iPhone. 

|
Stephen Lam/Reuters
The new iPhone SE displayed at an Apple launch event at the company's Cupertino, Calif., headquarters. REUTERS/Stephen Lam

The FBI has hit the pause button in its battle royale with Apple over the iPhone used by San Bernardino, Calif., gunman Syed Rizwan Farook. In a twist to the intense legal drama, an unknown "third party" may have a way to hack the phone. 

If it turns out the bureau can successfully crack the iPhone after all, will it reveal the software vulnerability to Apple?

It may seem unlikely. After all, why would the FBI buy such a capability only then to give it up? There are no laws forcing its hand, and the FBI has no more commitment to Apple than other government organizations, like the National Security Agency, that collect arsenals of software vulnerabilities. 

But based on a two-year old policy, the FBI and Department of Justice are subject to what's known as a White House Vulnerability Equities Process, or VEP, which kicks in whenever an agency comes across "newly discovered" vulnerabilities, called zero-days.

The VEP is meant to be a "disciplined, rigorous, and high-level decisionmaking process" so that the National Security Council can balance the benefits to law enforcement or intelligence of using the bug versus the broader security value of protecting industry and consumers.

According to documents made available through a Freedom of Information Act request, the VEP "applies to all components, civilian and military personnel, and contractors of the United States government." The FBI can’t find much of a loophole there.

Nor is there a loophole that the iPhone bug is somehow not "newly discovered." Even if the third-party hackers helping the FBI have known about it, it's new to the US government. 

With everything we know about the Apple v. FBI iPhone battle, the White House will let the FBI off the hook very easily. That would set a dangerous precedent giving the National Security Agency, CIA, and others more reasons to delay or obfuscate.

The VEP Equities Review Board headed up by White House cybersecurity czar Michael Daniel should make the call on whether – or when – to disclose the bug to Apple.  According to Mr. Daniel, the VEP Equities Review Board seeks to answer to the following questions:

  1. How much is the vulnerable system used in the core Internet infrastructure, in other critical infrastructure systems, in the US economy, and/or in national security systems?
  2. Does the vulnerability, if left unpatched, impose significant risk?
  3. How much harm could an adversary nation or criminal group do with knowledge of this vulnerability?
  4. How likely is it that we would know if someone else was exploiting it?
  5. How badly do we need the intelligence we think we can get from exploiting the vulnerability?
  6. Are there other ways we can get it?
  7. Could we utilize the vulnerability for a short period of time before we disclose it?
  8. How likely is it that someone else will discover the vulnerability?
  9. Can the vulnerability be patched or otherwise mitigated?

The answer to several of these questions – chiefly when it comes to the broader harm that could come from a flaw in the iPhone – seems to indicate the government would be driven to disclose the security hole to Apple. Unpatched iPhones pose a serious risk – allowing other nations or criminal groups to cause significant harm to consumers. Moreover, the bug won’t stay for secret for long, certainly not with the media attention on this single phone. 

The FBI could try out the vulnerability to see if it unlocks the phone used by Mr. Farook, and potentially many other phones the FBI has said it wants to unlock, before revealing the flaw to Apple.

That's probably the fairest way to handle this particular vulnerability. The FBI probably won't like it. And Apple will discover a bug courtesy of the federal government all the better since the company does not reward hackers who uncover its software flaws.

But even though the FBI may have to reveal the apparent gift from its "third party" helper, it doesn't mean the agency should stop seeking out zero-days for when it may need them again. Discovering new vulnerabilities for temporary use is how everyone, from hackers and security researchers to intelligence agencies, play the game.  If the FBI wants to join the field, they can’t claim special privilege any more than NSA. 

In short, if the FBI uses a zero day to access the terrorist’s iPhone, neither they nor the US government as a whole must tell Apple about how they did it. But if they follow the White House’s own policy, it appears they should.

Jason Healey is senior research scholar at Columbia University’s School of International and Public Affairs and senior fellow at the Atlantic Council. He began his career as a US Air Force signals intelligence officer in Alaska, NSA, and the Pentagon. Follow him on Twitter @Jason_Healey.

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Opinion: Why the FBI will eventually reveal its iPhone hack to Apple
Read this article in
https://www.csmonitor.com/World/Passcode/2016/0325/Opinion-Why-the-FBI-will-eventually-reveal-its-iPhone-hack-to-Apple
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe