Apple, The FBI And iPhone Encryption: A Look At What's At Stake

  
Via:  dean-moriarty  •  4 years ago  •  10 comments

Apple, The FBI And iPhone Encryption: A Look At What's At Stake

http://www.npr.org/sections/thetwo-way/2016/02/17/467096705/apple-the-fbi-and-iphone-encryption-a-look-at-whats-at-stake

Apple, The FBI And iPhone Encryption: A Look At What's At Stake



Apple CEO Tim Cook appears Sept. 9, 2015, in San Francisco to unveil the latest iterations of the company's smartphone.



Apple CEO Tim Cook appears Sept. 9, 2015, in San Francisco to unveil the latest iterations of the company's smartphone.


Stephen Lam/Getty Images


Remember the cryptex, the little handheld safe from  The Da Vinci Code  where entering the correct combination will reveal the secret message and entering the wrong one will destroy it?

Now replace the little safe with an iPhone, and instead of a secret message, it's holding evidence in a terrorism case. The critical combination? It's a passcode — one the FBI doesn't know, and one that Apple is reluctant to help the agency figure out.

Of course, it's more complicated than that. Here are a few key questions and answers about the  dispute between the tech giant and federal investigators :

Whose Phone Are Investigators Trying To Access?


In December, Syed Farook and Tashfeen Malik  attacked the Inland Regional Center in San Bernardino, Calif. , with guns and explosives, killing 14 people before being killed themselves in a shootout with police.

Malik had expressed support for the Islamic State on a Facebook page created under an alias, investigators say, but there are still many questions about who the two shooters might have communicated with before the attack, and what their motives were.

During the investigation, the FBI obtained an iPhone 5c used by Syed Farook. The device was a company phone, owned by Farook's employer, San Bernardino County.

Investigators have a warrant to search the phone and also have permission from the county — but the phone is protected by a passcode that the FBI does not know.

The agency has asked Apple to help it circumvent the phone's security features — a request Apple has denied. Now a federal judge  has ordered  Apple to cooperate, and Apple has refused.

What Is The FBI Looking For?


Investigators say they've already obtained the most recent backup of Farook's iCloud account — but that the iCloud account stopped updating a month and a half before the attack. That suggests there may be something valuable on the actual phone, the U.S. Attorney's Office for the Central District of California wrote in a  court filing :



"This indicates to the FBI that Farook may have disabled the automatic iCloud backup function to hide evidence, and demonstrates that there may be relevant, critical communications and data around the time of the shooting that has thus far not been accessed, may reside solely on the SUBJECT DEVICE, and cannot be accessed by any other means known to either the government or Apple."





... there may be relevant, critical communications and data around the time of the shooting that has thus far not been accessed. ... 


U.S. Attorneys, in a court filing


We don't know what, if anything, the phone contains. Law enforcement can typically access some information shared through a phone — such as social media posts, Web searches, some emails and text messages — with a subpoena to telecom and tech companies. But some information, such as iMessages or WhatsApp messages, gets encrypted on the sender's phone and only gets decrypted when delivered, while other data, like photos, might never get shared with another device.

Why Does The FBI Need Apple's Help?


"The encryption is so well done and so hard that they know they're not going to be able to break the encryption or they would have already done that," says Joseph Lorenzo Hall, chief technologist at the Center for Democracy and Technology.

In fact, Apple designed iPhone security with exactly this kind of scenario in mind, saying the company made it  impossible even for Apple  to crack.  The data are protected  by a code specific to the physical device and a passcode (aka PIN) set by the user. Without both numbers, Apple says, it's impossible for third parties to decrypt the phone's content.

The FBI has the phone, but not the PIN. So can't it just guess?

Well, it's stumped by three security features: an auto-erase function that deletes a phone's content after 10 incorrect passcode entries, a mandatory delay between entering passcodes after a certain number of failed attempts, and the requirement that passcodes be entered manually instead of being quickly plugged in by a computer.

What Does The FBI Want Apple To Do?


The FBI  wants the company  to circumvent those security features so that the bureau can just test out enough passcodes to find the right one (a process called "brute forcing").

"There's breaking encryption, which is effectively either exhaustively guessing or finding a flaw in the actual way the encryption is performed. And there's messing with the security software that serves as glue around the encryption pieces to make the thing work," Hall says.

Here's a helpful analogy from Matthew Green,  cryptographer and associate professor at Johns Hopkins University.

Think of your phone as a bank. Inside it is a safe that has your information — emails, messages, photos. The FBI is outside the bank, unable to get through the front door to try to crack the safe. So it's asking Apple to help get inside the bank so it can set up a safecracking team to try various combinations to open it.

If Apple complies with the judge's order, "all that would give [the FBI] is the ability to get close to that encryption core," says Green.

"I think the FBI acknowledged that Apple is not lying when it says that the best Apple can really potentially do is get them onto the phone and help them guess the passcode."

What Would Apple's Cooperation Look Like?


The FBI has proposed that Apple could get it closer to the safe inside that bank (to follow the earlier analogy) by building software that could be loaded onto the phone and would allow the FBI to try out unlimited passcodes to see which one works. If Farook's passcode consisted only of four digits, security experts say, it could take as little as 30 minutes to find it (though of course far longer if it's a complex alphanumeric one).

The FBI thinks that software is feasible — but it has to be made by Apple, not another developer, because only Apple has the proper security credentials to push new software to iPhones.

Why Doesn't Apple Want To Comply?


Apple says building that kind of software would amount to building a whole "new version of the iPhone operating system," customized to lift the security restrictions. Here's what CEO Tim Cook  said in an open letter :



"In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone's physical possession. ...

"The government suggests this tool could only be used once, on one phone. But that's simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable."



So ... Is The FBI Asking For A "Backdoor"?


Apple has described the FBI's request as amounting to asking for "a backdoor to the iPhone" — a flaw in a security system purposefully designed to help law enforcement break in for investigations. But unlike the FBI's  policy demands for encryption backdoors , here it is not asking for a change to the technology on all iPhones; instead, the court order calls for a targeted tool, software using unique identifiers of this individual phone.



They don't want this software in the world.


Cryptographer Matthew Green


"They are not asking Apple to redesign its product or to create a new backdoor to one of their products. They're simply asking for something that would have an impact on this one device," White House spokesman Josh Earnest has said.

But Apple says such a tool, once created, would be too easy to reuse. "They don't want this software in the world," Green says. "Once they build it, they're potentially going to have to break it out every time the FBI comes back."

How Is The FBI Trying To Compel Apple To Cooperate?


The FBI is citing a two-sentence law that dates to the birth of America's legal system. The  All Writs Act  was originally part of the Judiciary Act of 1789 and is both simple and sweepingly broad: It says that courts "may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law."



In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone's physical possession.


Apple CEO Tim Cook


In 2014, at the Justice Department's request, a federal court in New York used the law to  order a phone-maker to unlock a password-protected device . The Justice Department says various other companies have been ordered under the All Writs Act to provide otherwise inaccessible information to investigators.

But Apple says the use of the All Writs Act in this instance — pushing a manufacturer not to unlock a phone but to develop a system for breaking into a phone  designed to be impossible to unlock  — is "unprecedented."

"If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone's device to capture their data," Cook writes in his open letter.

What's Next?


Apple has five business days to formally respond to the court order issued Tuesday.

Last fall, the Justice Department, using the All Writs Act, tried to force Apple to  unlock an iPhone running iOS 7  in a case involving a suspected methamphetamine dealer. Apple responded that it might be technically capable of unlocking that phone (since iOS 7 has fewer security features than later operating systems) but said the cost to the company's reputation — and resulting harm to its business — would pose an "undue burden." That case is still pending,  The New York Times says  — and suggests one possible line of argument that Apple might try again.

Regardless of how Apple chooses to respond, this case might turn into a lengthy battle — one that could eventually work its way to the U.S. Supreme Court

Is This A New Dispute Between Apple And The Government?


Not by a long shot. Apple and the federal government have been arguing about encryption for years. The debate has taken various forms — fighting over the FBI's requests for  backdoors into Apple encryption , sparring with the DEA over  encrypted iMessages , arguing over  the feasibility of unlocking iPhones  — but the general disagreement has been the same. Federal investigators and prosecutors want access to more data, and Apple maintains that it's essential to keep encryption unbreakable.

The rhetoric has been hot — expressed in life-or-death terms. In November 2014,  The Wall Street Journal reported  that a senior Justice Department official told Apple that its encryption technology would eventually lead to a child's death, because law enforcement would be unable to access encrypted iPhone data.

In  an interview with Charlie Rose  in September 2015, Cook said of putting a backdoor in Apple's servers for law enforcement, "they would have to cart us out in a box before we would do that."

Apple isn't the only one in this fight — Google, too, has beefed up its encryption  within the past few years . But Cook has placed a strong emphasis on the issue during his 4 1/2 years helming the company.

"Some of our most personal data is on the phone: our financial data, our health information, our conversations with our friends and family and co-workers," he told  NPR in October 2015 .

"We do think that people want us to help them keep their lives private," Cook said.


Tags

jrDiscussion - desc
smarty_function_ntUser_is_admin: user_id parameter required
[]
 
Dean Moriarty
link   seeder  Dean Moriarty    4 years ago

I hope Apple wins. 

 
 
 
Randy
link   Randy    4 years ago

Me too.

 
 
 
JohnRussell
link   JohnRussell    4 years ago

If I were the FBI I would give Apple the phone and say "unlock it for us. You don't have to tell us how you did it, just do it" And then tell Apple that the next x amount of times they need to unlock an apple phone for security reasons, they will bring them back to apple just like this one. 

Apple provided the locking system, if national security demands the phones of two dead people need to be unlocked, they should be unlocked. 

 
 
 
Randy
link   Randy  replied to  JohnRussell   4 years ago

But where will it end? Will the FBI be allowed to force Apple to open a phone or computer for any crime they want? If they do it once you know they'll keep doing it over and over and over again. They'll be sending unlock "requests" to Apple 20 or 30 or more times a day. Will they open it to local law enforcement like they do their crime lab? Will the LAPD be able to call on the FBI and request them to order Apple to open the contents of a phone for a local crime like to do for a set of fingerprints or a DNA sample?

I have nothing illegal to hide on my computer or phone, but what is on them is my business alone, not the FBI or any other LE. I think it's a slippery slope to LE being able to look in anyone's phone or computer for any reason. To me it's the same as letting them search my house just because a neighbor doesn't like me and says I'm a suspicious person. If I have nothing to hide then why should I mind doesn't cut it in my home or on my phone or computer.

 
 
 
JohnRussell
link   JohnRussell  replied to  Randy   4 years ago

All these things are controlled by court order. If they get a court order to search your phone why would a lock be a dealbreaker ? 

 If they have a court order to search your house they will break the door down, lock and all. 

 
 
 
Randy
link   Randy  replied to  JohnRussell   4 years ago

Let them get a court order to search my phone. I don't use encryption software on it, but if I did it would be encrypted because I wanted it to be my business and no one elses. No back doors. If I want software on my phone or computer that automatically destroys everything on it after a certain number of times of trying to figure out my password, then that should be my right.

 
 
 
Hal A. Lujah
link   Hal A. Lujah  replied to  JohnRussell   4 years ago

"All these things are controlled by court order."

Oh, please.  The FBI uses parallel construction extensively.  They want the key to ALL the information, and they're going to be careful about how they frame up their targets so that any information that should have required a court order doesn't become part of the record.

 
 
 
forgotten46544
link   forgotten46544    one month ago

The government has lost all credibility. The courts came down on the government for still using the NSA illegally. They target innocent Americans and will character assassinate you to convict someone in the court of public opinion. Look at Ruby Ridge,Richard Jewel and Carter Page. Once they have a back door than a lot of innocent people will be targeted. Out of Indiana 2 years ago the US attorney was hiding and destroying evidence on death penalty cases. Read licensed to lie. 1 in 9 death penalty cases overturned and government crime lab was wrong on alot of cases but used it as creditable evidence anyway to convict innocent people. Its not about the truth but get a conviction at all cost even if they are innocent. Read DOJ gone wild as they commit crimes and hold no one accountable!

 
 
Loading...
Loading...

Who is online

CB
JBB
Dulay


26 visitors