{"id":9196,"date":"2016-03-02T17:09:10","date_gmt":"2016-03-02T22:09:10","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/crcl\/?p=9196"},"modified":"2016-09-05T15:08:39","modified_gmt":"2016-09-05T19:08:39","slug":"apple-v-fbi-civil-liberties-implications-of-the-san-bernadino-encryption-battle","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/crcl\/apple-v-fbi-civil-liberties-implications-of-the-san-bernadino-encryption-battle\/","title":{"rendered":"Apple v. FBI: Civil Liberties Implications of the San Bernadino Encryption Battle"},"content":{"rendered":"<p>The ongoing debate surrounding digital privacy and national security is set to erupt into a high-profile legal battle between Apple and the federal government. In an order issued on February 16<sup>th<\/sup>, a federal judge ruled that Apple must create new software that would bypass security features on the iPhone used by San Bernadino shooter, Syed Riswan Farook. Apple CEO Tim Cook has announced that he will <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino-shooter\/2016\/02\/16\/69b903ee-d4d9-11e5-9823-02b905009f99_story.html?tid=a_inl\" target=\"_blank\">contest the order<\/a>, arguing that it represents an overreach by the federal government and an unjustified intrusion into the privacy of Apple\u2019s customers.<\/p>\n<p><strong>Apple\u2019s Encryption System<\/strong><\/p>\n<p>In September 2014, Apple introduced new encryption software to the iPhone operating system, largely in response to increased digital privacy concerns following revelations from former NSA contractor, Edward Snowden. Models of the iPhone 5c onwards allow users to activate a security feature that permanently encrypts the data on their phone after ten failed attempts to enter the passcode. When data is permanently encrypted, it is no longer accessible and effectively useless. This self-encryption feature makes it virtually impossible to break into a phone using a \u201cbrute-force attack\u201d\u2014a trial and error method of decryption where a computer program attempts tens of millions of combinations\u2014without risking deletion of the data.<\/p>\n<p>However, while the iPhone data is encrypted, the software that runs the phone is not. This means that it is possible to create a hacked version of the operating system and install it on a phone without consent of the phone\u2019s owner and without entering the passcode. If Apple were to write a version of the iPhone software without the self-encrypting feature and install it on a device, it would be possible to unlock the phone using brute force to guess the passcode.<\/p>\n<p><strong>The Recent Court Order<\/strong><\/p>\n<p>On February 16<sup>th<\/sup>, federal magistrate judge Sheri Pym issued <a href=\"http:\/\/www.ndaa.org\/pdf\/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf\" target=\"_blank\">an order<\/a> compelling Apple to build a version of the iPhone software without the self-encrypting feature. She also ordered Apple to disable another security feature that adds a delay after multiple incorrect passcode entries. Since a four-digit passcode has only approximately 10,000 possible combinations, the altered software would allow a powerful computer to unlock Farook\u2019s phone relatively quickly.<\/p>\n<p>In issuing the order, the court cited a 227-year old law called the \u201cAll Writs Act.\u201d The act, originally part of the Judiciary Act of 1789 and signed by President George Washington himself, essentially allows federal judges to issue \u201cwrits,\u201d or court orders, on certain matters about which Congress has been silent. It has been described as a \u201cgap filler\u201d for issues that Congress has not addressed. At one point in history, writs were relatively common, but now courts tend to use them only in extraordinary circumstances where no other laws apply to the situation at hand. In this case, the lack of legislation regarding encryption allows the government to invoke the Act. The entire text of the Act reads as follows:<\/p>\n<p>(1) The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.<\/p>\n<p>(2) An alternative writ or rule <em>nisi <\/em>may be issued by a justice or judge of a court which has jurisdiction.<\/p>\n<p>The All Writs Act has been used to justify various government actions compelling telephone companies to install wiretaps, phone companies to produce call records, and to obtain CCTV footage, handwriting exemplars, and DNA samples. To support its <a href=\"https:\/\/www.documentcloud.org\/documents\/2714000-SB-Shooter-MOTION-Seeking-Asst-iPhone.html\" target=\"_blank\">application to the federal court<\/a>, the government primarily relied on a 1977 Supreme Court decision, <em>United States v. New York Telephone Company<\/em>, in which a telephone company was required to comply with a gambling investigation by implementing a pen register and trap and trace device, before Congress had passed a law that specifically authorized pen registers by court order.<\/p>\n<p><strong>Apple\u2019s Reaction<\/strong><\/p>\n<p>On the same day the order was issued, Apple CEO Tim Cook published an <a href=\"http:\/\/www.apple.com\/customer-letter\/\" target=\"_blank\">open letter<\/a>\u00a0to the company\u2019s customers calling the order a \u201cdangerous precedent.\u201d He wrote that Apple would contest the order in court, stating that \u201cwhile we believe the FBI\u2019s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.\u201d<\/p>\n<p>While the government argues that the new software would only be used on the Farook phone, Apple emphasizes in its letter that the technology could be used over and over again on any number of devices. Cook states that creating the software would \u201cundermine decades of security advancements that protect [Apple] customers \u2013including tens of millions of American citizens\u2014from sophisticated hackers and cybercriminals.\u201d<\/p>\n<p><strong>What happens next?<\/strong><\/p>\n<p>On Tuesday, Apple\u2019s legal chief Bruce Sewell and FBI director James Comey both testified at a U.S. Congressional Hearing on encryption issues. Members of the Judiciary Committee called the hearing in order to learn more from both sides of the dispute.<\/p>\n<p>Apple has also filed an <a href=\"http:\/\/www.scribd.com\/doc\/300524244\/Apple-s-Motion-to-Vacate\" target=\"_blank\">official motion<\/a>\u00a0to vacate the federal court\u2019s order. The filing states that \u201cthis is not a case about one isolated iPhone\u201d and that the FBI seeks a \u201cdangerous power&#8221; that would undermine the security and privacy interest of hundreds of millions of people. Apple also argues that the All Writs Act does not give the government \u201cunlimited and sweeping use of the judicial process\u201d and that the FBI\u2019s demand for a new software would violate its First and Fifth Amendment rights, as it is the equivalent of compelled speech and is contrary to Apple\u2019s core principles. Lastly, it points to the <a href=\"http:\/\/hdefenderscommunity@gmail.com\" target=\"_blank\">Communications Assistance for Law Enforcement Act<\/a> as evidence that Congress limited the assistance companies must provide to law enforcement.<\/p>\n<p>The civil liberties implications of this case are huge. Washington and Silicon Valley have been embroiled in an ongoing encryption\/backdoor debate for the last two years, and this is one of several pending cases regarding similar privacy and security concerns. A ruling in DOJ\u2019s favor may direct the law to a point where every digital interaction is theoretically within the reach of the federal government. Other tech companies have recognized this possibility and <a href=\"http:\/\/www.washingtontimes.com\/news\/2016\/feb\/18\/tech-companies-back-apple-battle-fbi\/\" target=\"_blank\">backed Apple<\/a> in recent weeks. Apple has also expressed the concern that if it can be compelled to create software for the U.S. government, there is a possibility that it would have to do the same for other governments as well. On the other hand, a favorable ruling for Apple could set substantial limits on the ability of the government to erode digital privacy in the name of national security and public safety.<\/p>\n<p>Having submitted its official opposition, Apple must now wait to hear back from the courts. If its motion to vacate is denied by the district court, Cook has pledged to take the fight all the way to the Supreme Court.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ongoing debate surrounding digital privacy and national security is set to erupt into a high-profile legal battle between Apple [&hellip;]<\/p>\n","protected":false},"author":117,"featured_media":9197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,44],"tags":[],"coauthors":[],"class_list":["post-9196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-amicus","category-courts"],"jetpack_featured_media_url":"https:\/\/journals.law.harvard.edu\/crcl\/wp-content\/uploads\/sites\/80\/2016\/03\/Apple-FBI.png","jetpack_shortlink":"https:\/\/wp.me\/peZrWS-2ok","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/posts\/9196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/comments?post=9196"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/posts\/9196\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/media\/9197"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/media?parent=9196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/categories?post=9196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/tags?post=9196"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/crcl\/wp-json\/wp\/v2\/coauthors?post=9196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}