Apple vs. FBI Case Study
- Markkula Center for Applied Ethics
- Focus Areas
- Business Ethics
- Business Ethics Resources
Business & government struggle over encryption’s proper place.
Apple iPhone
Kiichiro Sato/AP Photo
In the wake of the December 2015 terrorist attack in San Bernardino, attention turned to the perpetrator’s iPhone. A federal judge asked Apple, maker of the iPhone, to provide “reasonable technical assistance” to the FBI in accessing the information on the phone with that hope of discovering additional threats to national security.
Apple provided the FBI with data it had in their possession and sent Apple engineers to advise the FBI, but refused to comply with the court order to bypass the phone’s security measures: specifically the 4-digit login code and a feature that erases all data after ten incorrect attempts. The FBI argued that the bypass could only be used for this phone, this one time. The agency also cited national security concerns, given the phone may lead to better understanding the attack and preventing further incidents.
Apple CEO Tim Cook issued a public letter reiterating Apple’s refusal to cooperate. Cook advocated for the benefits of encryption in society to keep personal information safe. He stated that creating the backdoor entry into the iPhone would be akin to creating a master key capable of accessing the tens of millions of iPhones in the U.S. alone. Cook also had concerns that the FBI was outstepping its bounds - by using the court system to expand its authority - and believed the case should be settled after public debate and legislative action through Congress instead.
Public opinion polls on the issue were split. A number of major tech firms filed amicus briefs in support of Apple. The White House and Bill Gates stood behind the FBI. In anticlimactic fashion, the FBI withdrew its request a day before the hearing, claiming it no longer needed Apple’s help to assess the phone. It is speculated that an Israeli tech firm, Cellebrite, helped the FBI gain assess.
- Was Apple wrong for not complying with the FBI’s request? If so, why? If not, why not?
- What ethical issues are involved in this case? Please consult our Framework for Ethical Decision Making for an overview of modes of moral reasoning.
- Who are the stakeholders in this situation?
- Apple’s values are listed on the bottom of its home page at apple.com . Is the company’s decision consistent with its values? Is that important?
Loyola University > Center for Digital Ethics & Policy > Research & Initiatives > Essays > Archive > 2016 > Balancing Security and Privacy in the Age of Encryption: Apple v. FBI
Balancing security and privacy in the age of encryption: apple v. fbi, june 6, 2016.
The San Bernardino attack that resulted in the deaths of 14 people last December continues to evolve into the polarizing yet familiar battle over the balance between privacy and national security . For those who have lost track of how it all started, the story began when the FBI was unable to unlock an iPhone belonging to one of the attackers, Syed Rizwan Farook, and approached Apple for assistance. Drama ensued as Apple refused to help the FBI break into the phone, believing that the methodology it was asked to utilize was unwarranted and threatening to public security. In what many have argued is an unethical, unprecedented request, the FBI ordered Apple to create software that would disable privacy settings used in select iPhones models. In addition to existing disputes over the acceptable extent of access to private information, the order gave rise to a new question: Does the FBI have the right to demand security backdoors that could compromise the safety of uninvolved civilians?
The trouble began soon after the FBI found that it could not unlock Syed’s phone, which was locked with a four-digit code set to erase the phone’s contents after ten incorrect password attempts. The task was further complicated by a setting that increased time increments between failed password trials, a particularly frustrating problem in crimes when time is of the essence. In fact, Apple’s iPhone encryption software was so advanced that the company itself claimed it did not possess the technology needed to unlock it. Frustrated with Apple’s refusal to comply with its requests, the FBI asked Magistrate Sheri Pym to issue a court order demanding that Apple create a new operating system to allow it to bypass security measures.
The order was unique both because it asked for nonexistent software and because it requested a security ‘backdoor’ that could be used to unlock myriad devices. So was it ethical, not to mention legal, for the FBI to ask for software that had the potential to override broadly-applicably security measures? According to Apple, the answer is a big, fat, thespian no. Apple not only refused to comply but also published an open letter to the public, advising people of the ‘chilling’ implications of a security backdoor, writing that, “this demand would undermine the very freedoms and liberty our government is meant to protect.” Apple warned that the technology could be detrimental if misused, stating: “In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession ... while the government may argue that its use would be limited to this case, there is no way to guarantee such control.” The letter went on to outline several alarming scenarios that could result from giving the government access to this technology. Among them were the right to ask for software that intercepts texts or photos, health records, financial data and locations.
Though the letter was a bit artful, it raised important questions that deserve careful consideration. For one, the request for nonexistent software could set a legal precedent for permitting additional nonstandard, privacy-compromising demands. Apple’s fear stemmed in part from the approach the FBI took to seeking out iPhone contents. Rather than issuing a standard subpoena for information found on one device, the government requested a court order under the All Writs Act , which allows federal courts to issue all necessary or appropriate legal writs (i.e., court orders) compelling citizens to undertake certain actions as long as it is necessary and appropriate. The Act is a component of the Judiciary Act of 1789, and its creators could not have possibly predicted cell phones, let alone the links between individual phone software and security of technologies belonging to the greater public. Because the Act is so broad, it could, in theory, be applied to more extensive requests for technology that would jeopardize our privacy.
Whether major fears about abuses of power are symptomatic of public paranoia or forward-thinking dedications to ensuring public security is debatable. The government’s stance on the issue is not. Soon after the open letter was published, the FBI filed a motion to compel Apple to comply with the court order and accused the company of misrepresenting facts for marketing purposes. Government prosecutors wrote : “Rather than assist the effort to fully investigate a deadly terrorist attack by obeying this Court’s Order of February 16, 2016, Apple has responded by publicly repudiating that order … The Order does not, as Apple’s public statement alleges, require Apple to create or provide a ‘back door’ to every iPhone; it does not provide ‘hackers and criminals’ access to iPhones … It does not give the government ‘the power to reach into anyone’s device without a warrant or court authorization …” The motion also goes on to imply that Apple misled the public about the dangers of the All Writs Act, claiming that Apple previously complied with the Act, and use of the law for such purposes was not unprecedented.
While Apple and the FBI clearly stand on opposite sides of the argument, the public’s opinions on whether the government is dangerously overstepping boundaries are mixed. Based on a March phone poll of over 1,000 individuals, CBS revealed that 50 percent of those polled thought that Apple should unlock the iPhone, and 45 percent thought it should refute the order. Despite the varied results, eight in 10 respondents still believed that it was at least somewhat likely a decision to unlock the phone could set a legal precedent for mandates to unlock additional devices in the future. In other words, a belief that the government will continue to push privacy boundaries are widespread
Luckily for the FBI, it is unlikely that the bureau will be forced to defend itself on a public stage. Nor will Apple be lucky enough to testify in court, acting as a stalwart battling the government to protect collective security. What could have set the stage for a Hollywood movie has begun to devolve into a background narrative. After asking for a delay on its court date with Apple, the FBI fully retracted its demands. Instead of fighting the tech giant, it secured the services of professional hackers who were able to find and expose flaws in the iPhone’s security system, allowing the government to unlock the phone without clearing its contents.
Not only has the dramatic storyline come to an abrupt halt, the ball is back in the FBI’s court. Now that it possesses information about Apple’s security flaws, it has the opportunity to minimize accusations about unethical intentions to infiltrate additional devices. If the FBI chooses to provide Apple with details about its operating system failings, the bureau may qualm some public suspicions, but it will also risk losing valuable information that could be utilized for future searches. The path it chooses to take will likely be determined by the White House in the coming weeks, but inevitably, uncertainties over its intentions will remain intact.
Paulina Haselhorst was a writer and editor for AnswersMedia and the director of content for Scholarships.com . She received her MA in history from Loyola University Chicago and a BA from the University of Illinois at Urbana-Champaign. You can contact Paulina at [email protected] .
Research & Initiatives
Return to top.
- Support LUC
- Directories
- Email Sakai Kronos LOCUS Employee Self-Service OneDrive Password Self-Service More Resources
- Symposia Archive
- Upcoming Events
- Past Events
- Publications
- CDEP in the News
© Copyright & Disclaimer 2024
A business journal from the Wharton School of the University of Pennsylvania
Knowledge at Wharton Podcast
Apple vs. the fbi: what it means for privacy and security, march 9, 2016 • 30 min listen.
The U.S. government’s fight with Apple over unlocking a terrorist’s iPhone speaks to the countervailing forces of privacy and national security, according to Wharton professors Eric Orts and Amy Sepinwall.
- Public Policy
Eric Orts and Amy Sepinwall on Apple vs. the FBI
The federal government’s demand that Apple create new software to hack into the phone of one dead terrorist speaks to the complex and countervailing forces of privacy and national security. The subject of corporate constitutional rights is of great interest to professors Eric Orts and Amy Sepinwall from Wharton’s legal studies and business ethics department. Perhaps presciently, they recently penned the article, “Privacy and Organizational Persons,” in the Minnesota Law Review that foreshadowed this debate.
Sepinwall and Orts joined the Knowledge at Wharton show on Wharton Business Radio on SiriusXM channel 111, to discuss the juxtaposition of privacy and security in the digital and social media age.
An edited transcript of the conversation appears below.
Knowledge at Wharton: Let’s just start with your reaction to the case itself — Apple against the government, just a case of two sides butting heads, trying to figure this out.
Amy Sepinwall: The issues are really complicated. Because of some security concerns, we don’t have a full sense of just what’s at stake.
In much of the media, this has been portrayed as a kind of dichotomy between, on the one hand, security interests, which are obviously very important to us, but privacy interests as well. There is something a little misleading about that, though, because in fact, privacy is a countervailing force against our concerns for security. It’s also the case that there are security concerns on Apple’s side as well as on the government side, and Apple security concerns have reason to be of moment for all of us.
Apple’s concern is that if it develops this technology, which it doesn’t currently have, that will allow it to unlock this phone, and that’s not technology that’s going to be specific to that particular phone. Once that technology exists, it could get into the wrong hands, which could lead to cyber-attacks or hacking that essentially puts all of us at risk. So again, there are security concerns on both sides of this debate, and it’s important to take those seriously.
Our interest in the issue comes from a larger-scale interest in corporate constitutional rights, and those rights themselves are a source of some anxiety. To take us away from the Apple issue for just a moment, when you think about a case like Citizens United, what’s at stake there is a corporate constitutional right to political speech. And again, some of us have concerns about whether corporations should be engaging in politics in that way, or if you think about Hobby Lobby, what’s at stake there is a corporate constitutional right to freedom of religion.
“Once that technology exists, it could get into the wrong hands, which could lead to cyber-attacks or hacking that essentially puts all of us at risk.” –Amy Sepinwall
Here, we have a case of a corporation’s invoking its asserted rights to privacy. One important distinction perhaps is that it is doing so, not on its own behalf, but on behalf of its users. So it’s seeking to protect its users in ways that they really couldn’t protect themselves, both because they obviously don’t have the power that Apple has, but also because, if, for example, the United States government wanted to be spying on me through my iPhone, I wouldn’t know about it, so I wouldn’t be able to assert my privacy rights. So it’s incumbent upon Apple, given that it is in this privileged position, to seek to protect the privacy of its users.
Knowledge at Wharton: Tim Cook did an interview yesterday with ABC News’ David Muir, and he talked about a lot of what you just spoke about, and I wanted to play a clip from it.
Tim Cook: What is at stake here is, can the government compel Apple to write software that we believe would make hundreds of millions of customers vulnerable, around the world, including the U.S., and also trample civil liberties that are at the basic foundation of what this country was made on?
David Muir: And you would have to write that system in order to unlock that phone.
Cook: Yes, … the only way we know would be to write a piece of software that we view as sort of the software equivalent of cancer. We think it’s bad news to write, we would never write it, we have never written it. And that is what is at stake here.
Knowledge at Wharton: What’s your reaction to what Cook said?
Sepinwall: I don’t think you could put it in starker terms than likening the software to cancer. That isn’t the way that I’ve been thinking about it. I’ve been thinking about it more like the development of a master key, but of course, a master key has power of its own. One of the interesting pieces here is that Tim Cook, and Apple as a whole, seem to be motivated not even by concerns about their bottom line, but on the basis of principle.
“What if someone has a cell phone the FBI needs unlocked, and it’s a nuclear threat of some kind? Then what?” –Eric Orts
So just a very deep commitment to privacy, which Tim Cook in other contexts has called a civic duty, motivates them. In fact, at a meeting with shareholders sometime within the last year, Tim Cook effectively said to them, “Look, if what you care about is the bottom line, at the expense of our commitment to privacy, then you really should go elsewhere.” So he has been very forthright about the fact that this is commitment that deserves weight on its own, independent of whatever effect it may have on the company’s stock value.
Knowledge at Wharton: In the article that you and Eric Orts did for the Minnesota Law Review, you talk about how the term “privacy” is kind of fluid right now. And it’s changing even as we speak.
Sepinwall: That’s right. It’s inevitable, given how quickly technology itself is developing. I teach undergraduate students at Wharton, and they have a completely different conception of informational privacy than I might have, just because so much of their lives are now made available to the world at large through various social media.
Knowledge at Wharton: What do you think the resolution will be of this particular case with Apple and the FBI?
Sepinwall: It’s really complicated. If Apple [finds] itself to be in a bargaining position, it could seek to negotiate terms, such that the technology it developed would be destroyed immediately afterward. And that it wouldn’t feel subject to having now established this precedent, whereby the government can compel it to create technology for purposes of breaching users’ privacy.
If Apple could specify, “Look, we’ll do this, but only because we have really good reason to know that the person whose phone [it is] is someone who [committed] a series of murders. But for other cases, for lower level crimes, for example, don’t come to us. We’re just not going to be your handmaidens when it comes to developing that technology.”
Knowledge at Wharton: Later in that interview, Tim Cook alludes to that as well. If the government hadn’t taken the tack that they did in making this such a public issue, you get the sense that Apple might have worked with them. So it makes you think: Well, maybe Apple does have the ability to do this, but now they just don’t want to do this.
Sepinwall: That could be. I think one of the issues here is, why did the government come out? I think the government thought it had this very sympathetic case. Everyone wants to see what might have been on the San Bernardino shooter’s phone, and as it happens, Apple has been subject to something like 11,000 requests in the last year. And it says it has complied with about 7,000 of them, so it’s largely been cooperative. But of course, this is an especially polarizing case, given what’s at stake. This isn’t a low-level criminal.
“The idea that you use all that effort to create the backdoor, and then somehow can erase that knowledge, I think is the problem.” –Eric Orts
At the same time, the Manhattan [district attorney] has said, “Well, we need to have access to the phones of low-level criminals too, because some of what we’re going to find there is going to lead us to bigger criminals.” So you have a slippery slope, and it’s really hard to know whether you should embark upon it, and if so, whether you’re going to be able to stop that train — to mix metaphors — once it gets going.
Knowledge at Wharton: Eric Orts joins us. I’m sure this has been an interesting week for you as well, watching this all play out along the lines of what you and Amy wrote about a few months ago.
Eric Orts: It’s always helpful when you think you’re writing something that is rather theoretical, and then suddenly it’s on the front pages of all of the papers, and we get invited on to your show, etc. But it is a very important issue … the whole question of the right of organizations to assert privacy rights, whether on their own behalf or for their customers and users.
Knowledge at Wharton: Is a company like Apple asserting this on behalf of its consumers a relatively new concept? And is it one that we will see develop as we go further?
Orts: That’s one of the things that we talk about in our article, but there is a theoretical question: Is Apple only responsible for advancing the interests of its users? In many of Tim Cook’s pronouncements, that is the argument. Encryption is created for users. We respect the privacy of our users, and we’re not going to make a big backdoor to that. And the reason is that we are protecting the privacy of our users.
But there are times — including at one point in the ABC interview — when Tim Cook was asked, “Well, what would Steve Jobs have done?” And he says, “I think about that every day. In fact, I think about him every day.” And one thing that he said about [Jobs] is that he always did the right thing, at least according to how he thinks about it.
So then, the question is, Does Tim Cook, as CEO of Apple, have responsibility from a business ethics point of view, to actually take a position on what the right thing to do is? And I think a lot of this argument, too, is what’s the best thing for the future of making everybody safe? Protecting privacy on millions, billions of phones? I think you do have to take a public perspective on that.
At that point, it’s not just about business interests. It’s not just about your customers, or what’s going to make money for you. It’s about a higher principle. And I think you have Google, Facebook, Twitter, some of the other companies weighing in, and they have to think about similar kinds of questions. To what extent can these new technologies be used by terrorists, or to hurt many people? Not just San Bernardino, but what if someone has a cell phone the FBI needs unlocked, and it’s a nuclear threat of some kind? Then what?
“Even if they could manage to erase the new operating system itself, the developers now have the knowledge of how to do this in their heads … and it ends up in the wrong hands.” –Amy Sepinwall
And against that issue, you have to [strike a] balance: Do you really make people safer if you have backdoors in your encryption, that criminals or maybe even terrorists could then use, and then they use that against you? So it’s not an easy question, but I think that, inevitably, the companies are correct in that they have to stand up, and step up, and take a position one way or another on these issues.
Knowledge at Wharton: The idea that Washington could say, “Listen, we have 14 people who were killed and there is potentially this [valuable] information on this one phone. Could you unlock this? And then destroy the process of doing it?” I think a lot of people would want that, but the problem is, somehow, some way, most likely, that information is going to get out. Where do you fall on that question?
Orts: I’m not a technology expert, so I’m relying, to some extent, on what Cook and other Apple executives are saying. But my understanding is, that what they would have to do technically is that they basically create a new operating system that replaces the phone’s OS. Then, with the new operating system, you can crack the password by running high-level computers on that.
Now, the idea is that you would create that whole operating system, have a bunch of people working on that who would have to use Apple confidential information, maybe, to create that. But the idea that you use all that effort to create the backdoor, and then somehow can erase that knowledge, I think is the problem. At least from Apple’s perspective, you create that new software, and then it’s like creating a new Frankenstein monster out there.
…But then once you create that, there are going to be other demands for that, and then what’s the stopping point? What happens when the Chinese government comes to Apple, and says, “We need you to create a backdoor to stop this terrorist.” You can see that there is something to the “slippery slope” argument that Apple is making here.
Sepinwall: So let me add something that gets back to your earlier question about whether this is a new frontier, whether we are just now seeing … corporations trying to protect their users. The precedent that the government is invoking here is a 1977 case involving phone companies, where the phone companies were resisting government efforts to track the phone numbers that suspected individuals were calling, and the phone companies were forced to relent, and to hand over that information. But of course, that is a much smaller-scale infringement on privacy, relative to all of the content that is currently on a person’s iPhone. Their photos, their notes, their calendar, their location.
Orts: Credit card info.
Sepinwall: Right. Some very sensitive financial information, some potentially intimate information. So what is at stake here is much larger — to say nothing of the concerns that Eric rightly raises about this technology getting into the wrong hands.
Again, even if they could manage to erase the new operating system itself, the developers now have the knowledge of how to do this in their heads, and you don’t want to have a situation where someone becomes disgruntled, or someone gets bought for a high enough price such that they are willing to recreate this technology that we thought was destroyed, and it ends up in the wrong hands.
Knowledge at Wharton: The other interesting thing is the fact that we are talking about an issue of privacy in an era where technology advances so quickly, yet privacy law, in some respects, is going back to the founding of our country, back in the 1700s.
“It’s only Apple that really has the firepower to stand up against the FBI on this issue. It’s not going to be every individual iPhone user.” –Eric Orts
Orts: There is a lot of law that is developing to protect privacy rights, whether it’s in the context of the Fourth Amendment protection against unreasonable searches and seizures, or other areas of privacy. Amy and I have written about the different areas of privacy, and we’re following other people. But I think you’re right.
It is somewhat ironic that in the United States, where I think we have a general sense that our privacy is very heavily protected, in fact, we are a little bit behind some other parts of the world, notably Europe, where they take privacy interests very strongly. There are fairly large controversies between businesses in the United States that want to mine a lot of data, etc., versus Europe’s sense that you should protect privacy more. So Apple gets thrown right into that, as well as the other big companies.
You even have, in the example of this case, just an illustration of how old the law is here: You have the ‘All Writs Act’ that is being relied on — it was a 1789 act. I don’t think anybody was thinking about, “Let’s get all of your information on an iPhone” when that was written, so it’s probably time to update the law a little bit on privacy. Then you have a democratic determination of what the law of privacy should be in this age, rather than these court fights. But that doesn’t mean that we’re not going to have this court fight. It looks like it’s inevitable.
Knowledge at Wharton: So we need to update our philosophy and laws on privacy. But in the meantime, potentially, if we’re talking about one company deciding what their level of privacy is, other companies could view privacy in a different manner, correct?
Orts: That’s correct. You’re going to have a division between the different companies involved. One of the other interesting features here is — and this is something that Amy and I write about in our article — their traditional idea was that you would have big government, and then individual people would oppose the government trying to get into their business, invade their privacy.
But in a modern world, the idea that one person is going to stand up against the NSA, for example, or one person in China is going to stand up against their government, is unrealistic. We make the argument that organizations like Apple, like the big companies of the world, that are engaged in providing this technology, which ostensibly is providing privacy by encryption and other means — they actually have a responsibility to step up. And in some ways, if you’re an advocate of privacy — as I think we are — you want companies to do that, because they are the players. It’s only Apple that really has the firepower to stand up against the FBI on this issue. It’s not going to be every individual iPhone user.
“Some of these tech companies, even while they are asserting rights to privacy on behalf of their users, engage in a fair amount of data mining on their own.” –Amy Sepinwall
Sepinwall: On the other side of the issue, one of the interesting dynamics here is that some of these tech companies, even while they are asserting rights to privacy on behalf of their users, engage in a fair amount of data mining on their own. So their analytics and their business model depends on their tracking what kind of searches individuals are doing.
Apple has presented itself as operating with a different model, so it sees itself as providing hardware, not software. It sees itself as disabled from seeing what is on an individual’s phone, and that is supposed to be a key virtue of an Apple device. Apple itself is not participating in this double-sided game, where on the one hand it’s trying to stave off the government, and on the other hand it’s engaging in perhaps its own privacy violations. But some of the other tech companies could be said to be playing both sides of this fence.
Orts: It is interesting that, in some respects, it sounds like Apple is kind of playing two sides here, because, obviously, they are a company out to make a profit, and they are providing services for hundreds of millions of people around the globe, yet they do also have the technology aspect of this as well.
Sepinwall: They do, and I think the cynical take is, Apple is just putting up a good front. It’s going to resist for as long as it can, and then the government will compel it, and it will have to turn over the information, or it will have to develop the technology. But of course, we won’t be able to blame it because it put up a very good fight. I am not necessarily prepared to be that cynical about it. I think that this is a longstanding commitment of Apple’s that it is not always focused first on what is going to enhance its profits. And the commitment is real, as far as I can tell, anyway.
Orts: Yeah, I think that’s right. We had an interesting debate in my MBA class [recently] about this case, where some students presented this issue. The opinion of the class, I think, was roughly divided half and half, because I think it’s not easy to tell what the motivations are of a company of this sort. When I’ve seen Tim Cook actually in these interviews — for what it’s worth, I’m not an expert in judging demeanor particularly — but it looks to me like he is seriously grappling with the ethical principles involved here. That it’s not just window dressing, and the company trying to make as much profits as possible.
So Amy is right to also mention that there are other companies that have different interests, different profiles, and views of privacy. Just as companies can defend privacy, as Apple seems to be doing right now, you can have companies going the other way, and not being so protective.
More From Knowledge at Wharton
Can the Mobile Wave Help Us Navigate the AI Wave?
What I’ve Learned: Olivia S. Mitchell
Who Benefits in the Deal Between Reddit and OpenAI?
Looking for more insights.
Sign up to stay informed about our latest article releases.
New Court Decision: The FBI, Apple & the Company that Broke iPhone Encryption
Last year – Apple battled in court with the FBI in the aftermath of the massacre in San Bernardino, California. The FBI obtained a court order in February 2016 directing Apple to furnish an encryption key so that law enforcement could access the iPhone of the killer. The court case raged in federal court until the FBI purchased a software tool from an Israeli company that broke the iPhone’s encryption security. The court case became moot because the FBI successfully hacked the iPhone without Apple’s assistance.
For further background, my presentation about this important privacy and national security issue in 2016 about the case can be seen here , and my slides can be found here .
“The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand. This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.”
— “ A Message to our Customers ” by Tim Cook, CEO of Apple, that summed up Apple’s position
Last week – A federal court denied a request by the Associated Press to obtain information about the Israeli company, the price the FBI paid, and details about the tool. AP had asked the FBI under the Freedom of Information Law to provide the information. When the FBI refused, AP sued the FBI to compel it to produce the information.
AP unsuccessfully asked Judge Tanya S. Chutkan in the District of Columbia to rule that the information should be made public in accordance with FOIL and for public policy reasons.
The court was persuaded by the FBI’s claims that the identity of the vendor and the cost of the tool relate to intelligence activities or intelligence sources or methods. According to the government, releasing the vendor’s identity could allow foreign or terrorist adversaries to use existing public technology created by the vendor to probe for weaknesses, develop exploits, and create better encryption technology to thwart the FBI’s ability to use the tool.
The FBI also expressed its grave concerns that if it identified the vendor, its classified intelligence source and method would be revealed. This could put national security at risk. Moreover, the government argued that the vendor’s computing systems and technology could become vulnerable to hacking if it released the vendor’s name.
As far as disclosing the price that the FBI paid to the vendor for the tool, the judge agreed with the FBI’s position that adversaries might be able to learn how important the US government considers the technology and also may allow them to estimate the FBI’s budget for cybersecurity.
“’Minor details of intelligence information,’ like the price paid for the iPhone hacking tool, ‘may reveal more information than their apparent insignificance suggests because, much like a piece of jigsaw puzzle, each detail may aid in piecing together other bits of information…. the court finds that this is an adequate justification for withholding the vendor’s identity…and purchase price.”
Importantly, the court agreed with the FBI that the iPhone hacking tool is both an intelligence source and also an intelligence method . The court sided with the FBI, ruling that it could use the iPhone unlocking technology in future law enforcement activities, making the tool itself a law enforcement technique.
The battle to encrypt devices and data to fend off hacking has only just begun. Stay tuned.
Associated URL: NEW COURT DECISION: THE FBI, APPLE & THE COMPANY THAT BROKE iPHONE ENCRYPTION
Related Topics
Reminder – FinCEN Reporting Requirements for Beneficial Ownership
Successful Litigation Defends Trustees Against Property Partition
AF Victory in Brooklyn Construction Negligence Case
Local R espect, State-Wide R each
For further information about our experience, please contact our law firm on Long Island at 516-328-2300, in Brooklyn at 718-215-5300, White Plains at 914-607-7010, Rochester at 585-218-9999 or Albany at 518-535-9477 to schedule an initial consultation.
- Artificial Intelligence
- Generative AI
- Business Operations
- IT Leadership
- Application Security
- Business Continuity
- Cloud Security
- Critical Infrastructure
- Identity and Access Management
- Network Security
- Physical Security
- Risk Management
- Security Infrastructure
- Vulnerabilities
- Software Development
- Enterprise Buyer’s Guides
- United States
- United Kingdom
- Newsletters
- Foundry Careers
- Terms of Service
- Privacy Policy
- Cookie Policy
- Member Preferences
- About AdChoices
- E-commerce Links
- Your California Privacy Rights
Our Network
- Computerworld
- Network World
Apple vs. the FBI: The legal arguments in a nutshell
Apple has attacked the fbi's iphone unlocking request on several legal fronts.
Apple has raised some interesting, and potentially winning, legal arguments in its motion to overturn a judge’s order requiring the company to help the FBI unlock the iPhone of a mass shooter.
The FBI’s request for Apple to write new software to defeat password protections on the phone violates the company’s free speech and due process rights, Apple argued Thursday in its motion to vacate Magistrate Judge Sheri Pym’s Feb.16 order .
Apple has a chance to prevail in court, especially with its First Amendment free speech argument, said Jennifer Dukarski, a technology lawyer with the Butzel Long law firm in Ann Arbor, Michigan.
Several past court cases have looked on software code as a form of speech, although the legal record is mixed, she said. Apple argues the court cannot force speech from the company, particularly when the speech would be against Apple’s own interests.
“Clarity on this issue would help all who write and defend those who write code,” Dukarski said. “If the code is treated as speech, I think Apple has a strong position against compelled speech.”
Still, the company has an “uphill battle” with Pym after her initial order requiring Apple to help unlock the phone, said Braden Perry, a lawyer specializing in federal enforcement cases with Kennyhertz Perry in Kansas City.
The First Amendment argument could carry weight because the government needs a “compelling” interest to force Apple to write new code, he said. Apple argues that the FBI has produced “nothing other than speculation that the compelled speech could produce fruitful information.”
It’s important to consider the bigger picture than this one case, Perry added. “The majority of the argument is about balancing the needs of law enforcement with the privacy and personal safety interests of the public,” he said.
Following are some of the main legal issues.
What’s the FBI’s argument? The FBI’s request relies heavily on the All Writs Act , a U.S. law dating, back to the late 1700s, allowing courts to “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
The All Writs Act gives judges wide latitude to compel parties to cooperate in cases before them, but there are limits. The judge must have no other legal options available, the target of the writ (Apple) must be closely connected to the case, and the court order cannot impose an undue burden.
Apple’s participation is necessary to access the phone, Department of Justice lawyers representing the FBI argue. “Here, the government has obtained a warrant to search the phone of a mass murderer, but unless this Court enforces the Order requiring Apple’s assistance, the warrant will be meaningless,” DOJ lawyers wrote in a stinging rebuke of Apple filed Feb, 19.
The bigger issue: More broadly, FBI Director James Comey and other officials have called for a policy debate about criminals’ use of encrypted communications to shield law enforcement from their activities.
Beyond this case, the larger issue is “really about who we want to be as a country, and how do we want to govern ourselves?” Comey said during a congressional hearing Thursday. Investigators increasingly can’t read the communications of “terrorists, gangbangers, pedophiles, all different kinds of bad people,” he said.
The FBI wants a public debate about the issues of encryption and security, Comey added. “We’re not here to tell the American people what to do about it, we’re just here to tell you there is a big problem, and that darkness is going to grow and grow and grow and change our world,” he said.
Apple argues that the FBI request, if successful, will open the door to hundreds of similar requests from investigators across the country and the world.
“This is not a case about one isolated iPhone,” the company’s lawyers wrote Thursday. Instead, the FBI is seeking “a dangerous new power” to force Apple and other tech companies to undermine basic security and privacy protections.
The order, if upheld, would create a workaround to encryption protections on iPhones, “making its users’ more confidential and personal information vulnerable to hackers, identity thieves, hostile foreign agents, and unwarranted government surveillance,” Apple’s lawyers wrote.
Apple vs. the All Writs Act: The company argues Pym’s order ignores several limits on the All Writs Act. The act does not give courts new authority to compel assistance beyond that already authorized by Congress, Apple says.
In addition, the judge’s order is “unreasonably burdensome,” and would require Apple to create a new operating system, tying up six to 10 of its employees for up to a month.
Apple is also “far removed” from the terrorism and mass shooting case being investigated, its lawyers argue. “The All Writs Act does not allow the government to compel a manufacturer’s assistance merely because it has placed a good into the stream of commerce,” they wrote in their appeal . “Apple is no more connected to this phone than General Motors is to a company car used by a fraudster on his daily commute.”
Apple’s First Amendment argument: The company points to several court cases where judges have considered code as a form of speech. It’s a violation of the First Amendment to force speech, the company’s lawyers argue.
Apple’s Fifth Amendment argument: The due-process claims are a bit tougher to follow, but they go like this: The Fifth Amendment protects U.S. residents against the government taking away their liberty. The requested order would require Apple to “do the government’s bidding” in a way that’s burdensome and violates Apple’s “core principles,” its lawyers argue.
What happens now? Judge Pym has scheduled a hearing on Apple’s appeal for March 22 in Riverside, California. It’s almost certain that her ultimate decision will be appealed by the losing side. The case could go then to a district court judge, and if challenged there, to the U.S. Court of Appeals for the Ninth Circuit. Ultimately, the case could end up in the Supreme Court , many legal experts have predicted.
Related content
Get security smart, salted hash ep 13: bug bounties and video surveillance programs, spectre and meltdown: what you need to know going forward, what to do about internet-connected toys, from our editors straight to your inbox.
Grant Gross, a senior writer at CIO, is a long-time technology journalist. He previously served as Washington correspondent and later senior editor at IDG News Service. Earlier in his career, he was managing editor at Linux.com and news editor at tech careers site Techies.com. In the distant past, he worked as a reporter and editor at newspapers in Minnesota and the Dakotas.
More from this author
Deepfakes: coming soon to a company near you, unauthorized ai is eating your company data, thanks to your employees, fcc hit with ddos attacks after john oliver takes on net neutrality, us device searches at borders ignite resistance, how to prevent your data from being searched at the us border, spain arrests accused russian spammer at us request, us lawmakers demand to know how many residents are under surveillance, us trade lobbying group attacked by suspected chinese hackers, most popular authors.
- Gyana Swain
Show me more
Major github repos leak access tokens putting code and clouds at risk.
Thousands of NetSuite stores leak sensitive data due to access control misconfiguration
MIT delivers database containing 700+ risks associated with AI
CSO Executive Sessions: Guardians of the Games - How to keep the Olympics and other major events cyber safe
CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi)
CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands
Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience
- Commercial AI Use
- Gov't AI Use
- AI in the Criminal Justice System
- Screening & Scoring
- FTC Commercial Surveillance Rulemaking
- Social Media Privacy
- Data Brokers
- Communications Privacy
- Competition and Privacy
- Web Scraping
- Article III Standing
- Data Security
- Election Security
- Presidential Directives
- International Privacy
- Enforcement of Privacy Laws
- Government Records & Privacy
- Location Tracking
- Children's Privacy
- Student Privacy
- Health Privacy
- Workplace Privacy
- Privacy & Racial Justice
- Voter Privacy
- Census Privacy
- Donor Privacy
- Online Harassment
- Access to Information
- Freedom of Information Act
- Federal Advisory Committee Act
- Privacy Impact Assessments
- Fourth Amendment
- International Privacy Laws
- U.S. Privacy Laws
- Proposed U.S. Legislation
- State Privacy Laws
- FISA Section 702
- Face Surveillance & Biometrics
- Drones & Aerial Surveillance
- Traveler Screening & Border Surveillance
- Privacy in Public
- Intelligence Surveillance
- Government Databases
- PATRIOT Act
- Wiretapping
- EPIC Publications
- Digital Library
- EPIC in the News
- EPIC Statements
- EPIC Commentaries
- EPIC Projects
- Board & Staff
- EPIC Advisory Board
- Careers & Internships
- Being a Non-profit
- Cy Pres Awards
- Privacy Policy
Amicus Briefs
Apple v. FBI
Central District of California
The dispute between Apple and the FBI arises out of an application that the agency filed with a federal magistrate judge in California, seeking assistance with the search of an iPhone that was seized during the investigation into the December 2015 attacks in San Bernardino, CA. The FBI was unable to access data on the locked iPhone, which was owned by the San Bernardino Health Department but used by one of the perpetrators, and requested that the Court order Apple to provide assistance in decrypting the phone. But because Apple has no way to access the encrypted data on the seized iPhone, the FBI applied for an order requiring Apple to create a custom operating system that would disable key security features on the iPhone. The Court issued an order requiring that this custom hacking tool be created and installed by Apple without unlocking or otherwise changing the data on the phone. Apple has opposed the order on the grounds that it is unlawful and unconstitutional. Apple argues that if the order is granted it will undermine the security of all Apple devices and set a dangerous precedent for future cases.
The dispute between Apple and the FBI arises out of a warrant application that the agency filed in the U.S. District Court for the Central District of California in December 2015, following the attacks in San Bernardino. The case is captioned “In the Matter of the Search of An Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203.” The FBI filed an application for an order of assistance under the All Writs Act, 28 U.S.C. § 1651, on February 16, 2016. The Court granted the application the same day and issued a three page order requiring apple to “assist in enabling” the search of the phone by “providing reasonable technical assistance,” which “shall accomplish the following three important functions”:
- it will by pass or disable the auto-erase function whether or not it has been enabled;
- it will enable the FBI to submit passcodes to the SUBJECT DEVICE for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available on the SUBJECT DEVICE;
- it will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware
The Court also specified that “Apple’s reasonable technical assistance may include, but is not limited to: providing the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (“SIF”) that can be loaded onto the SUBJECT DEVICE.” This custom software would need to be able to “load and run from Random Access Memory (“RAM”) and will not modify the iOS on the actual phone, the user data partition or system partition on the device’s flash memory.” Apple would also need to uniquely code the software to the phone at issue and provide the government with a means to “conduct passcode recovery analysis” on the device in an Apple facility or government facility.
The Court noted that Apple may seek to comply with the order “using an alternate technical means” if “it can achieve the three functions” stated in the order. The Court also noted that “Apple shall advise the government of the reasonable cost of providing this service” and that “[t]o the extent that Apple believes that compliance with this Order would be unreasonably burdensome, it may make an application” to the Court “within five business days” of the Order.
Shortly after the Court granted the FBI application and issued the order to Apple, the FBI moved to unseal the documents and notified the press of its request for Apple’s assistance in the case. In response, Apple CEO Tim Cook published a letter to Apple customers, making clear that the company would oppose the order and that the order would set a “dangerous precedent.” The Court subsequently issued a scheduling order, establishing deadlines for briefs in the case and setting a hearing for March 22, 2016 at 1:00pm. The FBI also filed a motion to compel compliance with the court’s February 16th order.
On February 25, 2016, Apple filed its motion to vacate the Court’s order, arguing that the order is unlawful and unconstitutional. Specifically, Apple argued that “[t]he All Writs Act does not provide a basis to conscript Apple to create software enabling the government to hack into iPhones” and that the Order “would violate the First Amendment and the Fifth Amendment’s Due Process clause.”
EPIC’s Interest
Since its founding more than 20 years ago, EPIC has been an advocate for the rights of consumers to use strong encryption and the promotion of privacy enhancing technologies. This issue was at the center of the national debate 1990s after the White House introduced the Clipper Chip proposal in 1993 and the FBI led an effort to outlaw non-escrowed encryption . EPIC lead one of the first major Internet petitions in opposition to the Clipper proposal after a group of leading cryptography experts sharply criticized the Clipper Chip technology in a letter to the President . EPIC also filed amicus briefs in two important cases concerning export controls and other restrictions on the use of encryption software, Bernstein v. U.S. Department of Justice , 176 F.3d 1132 (9th Cir. 1999), vacated , 192 F.3d 1308 (9th Cir. 1999), and Karn v. U.S. State Department , 107 F.3d 923 (D.C. Cir. 1997). The district court decision in Bernstein established that code is speech and that restrictions on the dissemination of encryption software burdened the First Amendment rights of a computer researcher. Ultimately the Clipper Chip proposal and efforts to ban strong encryption were defeated.
EPIC also played a key role in the development of the international framework for cryptography and privacy policy, which led to establishment of the OECD Cryptography Guidelines in 1997. These guidelines outlined eight key principles to guide the development of international cryptography policy, including (1) the establishment of trust in cryptographic methods in order to promote the use of communications systems, (2) the right of users to choose any cryptographic method, and (3) the protection of privacy and personal data. A report by the National Academy of Sciences also found in 1996 that cryptography “is a most powerful tool for protecting information” and that “many vital national interests require the effective protection of information.” EPIC also prepared a report entitled Cryptography and Liberty 2000 , which outlined the state of international cryptography policy following the resolution of the key escrow and export controls debates.
Legal Documents
U.s. district court for the central district of california, nos. 16-cm-00010 and 15-mj-00451.
- FBI Application Under the All Writs Act (Feb. 16, 2016)
- Order Compelling Apple to Assist Agents in Search (Feb. 16, 2016)
- Scheduling Order (Feb. 19, 2016)
- FBI Motion to Compel Apple to Comply with the Court’s February 16, 2016 Order (Feb. 19, 2016)
- Apple Motion to Vacate Order Compelling Assistance and Opposition to FBI Motion to Compel (Feb. 25, 2016)
- Apple Notice of Objections to Order Compelling Assistance and Opposition to FBI Motion to Compel (March 1, 2016)
- Government’s Reply , with declarations but without exhibits (March 10, 2016)
- Apple’s Reply , with declarations but without exhibits (March 15, 2016)
- FBI Motion to Vacate Hearing (March 21, 2016)
- 32 Law Professors
- Access Now and Wickr Foundation
- ACT/The App Association
- Airbnb, Atlassian, Automattic, CloudFlare, eBay, GitHub, Kickstarter, LinkedIn, Mapbox, Medium, Meetup, Reddit, Square, Squarespace, Twilio, Twitter and Wickr
- Amazon, Box, Cisco, Dropbox, Evernote, Facebook, Google, Microsoft, Mozilla, Nest, Pinterest, Slack, Snapchat, WhatsApp, and Yahoo
- American Civil Liberties Union, ACLU of Northern California, ACLU of Southern California, and ACLU of San Diego and Imperial Counties
- AVG Technologies, Data Foundry, Golden Frog, the Computer & Communications Industry Association (CCIA), the Internet Association, and the Internet Infrastructure Coalition
- BSA|The Software Alliance, the Consumer Technology Association, the Information Technology Industry Council, and TechNet
- Center for Democracy & Technology
- Electronic Frontier Foundation and 46 technologists, researchers, and cryptographers
- Electronic Privacy Information Center (EPIC) and eight consumer privacy organizations
- iPhone security and applied cryptography experts including Dino Dai Zovi, Dan Boneh (Stanford), Charlie Miller, Dr. Hovav Shacham (UC San Diego), Bruce Schneier (Harvard), Dan Wallach (Rice) and Jonathan Zdziarski
- The Media Institute
- Privacy International and Human Rights Watch
- Richard F. Taub
- Beats, Rhymes & Relief, Center for Media Justice, The Gathering for Justice, Justice League NYC, Opal Tometi and Shaun King
- David Kaye, United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression | Supporting Document
- Salihin Kondoker, San Bernardino, CA
- Amicus Brief from the Federal Law Enforcement Officers Association, Association of Prosecuting Attorneys, and National Sheriffs’ Association, in support of the government (March 3, 2016)
- Amicus Brief from the California State Sheriffs Association, California Police Chiefs’ Association and the California Peace Officers’ Association, in support of the government (March 3, 2016)
- Amicus Brief from families of victims in the San Bernardino shooting, in support of the government (March 3, 2016)
- Amicus Brief from the San Bernardino County District Attorney on behalf of the People of California, in support of the government (March 3, 2016)
- Memorandum and Order , In re Order Requiring Apple, Inc. to Assist in the Execution of a Search Warrant Issued by This Court, No. 15-mc-1902 (JO) (E.D.N.Y. Feb. 29, 2016)
- EPIC: Cryptography Policy
- EPIC: Cryptography and Liberty 2000
- Recommendation of the Council Concerning Guidelines for Cryptography Policy , OECD (Mar. 27, 1997)
- Cryptography’s Role in Securing the Information Society , Committee to Study National Cryptography Policy, National Research Council (Kenneth W. Dam & Herbert S. Lin, eds. 1996)
- Brief for Amici Curiae EPIC et al. , Bernstein v. DOJ, 176 F.3d 1132 (9th Cir. 1999), vacated , 192 F.3d 1308 (9th Cir. 1999)
- Brief for Amici Curiae EPIC et al. , Karn v. U.S. State Department, 107 F.3d 923 (D.C. Cir. 1997)
- Alice B. Lloyd, Questions Leftover From The Apple-FBI Debate , Weekly Standard (Jul. 13, 2016)
- Mark Skelton, What the Apple versus FBI Debacle Taught Us , Scientific American (May 20, 2016)
- Editorial Board, After Apple vs. FBI, more reasons to be wary in privacy fight , Los Angeles Daily News (Apr. 29, 2016)
- Lana Ciobotea, Why the Apple-FBI battle made people realize the importance of privacy faster than Snowden , VentureBeat (Apr. 29, 2016)
- Danny Yadron, FBI confirms it won’t tell Apple how it hacked San Bernardino shooter’s iPhone , The Guardian (Apr. 28, 2016)
EPIC and 48 Civil Society Organizations Send Joint Statement to New EU Presidency to Withdraw CSA Regulation that Would Break Encryption.
July 2, 2024
EPIC Urges the NSF to Prioritize Privacy Protections and Risk Mitigation in Technology Investment Roadmap
July 28, 2023
EPIC Opposes STOP CSAM Act
July 21, 2023
Support Our Work
EPIC's work is funded by the support of individuals like you, who allow us to continue to protect privacy, open government, and democratic values in the information age.
- Skip to main content
- Keyboard shortcuts for audio player
All Tech Considered
The apple-fbi debate over encryption, apple vs. the fbi: the unanswered questions and unsettled issues.
Alina Selyukh
A protester supporting Apple in its battle against the FBI holds up an iPhone that reads "No Entry" outside an Apple store in New York on Feb. 23. Bryan Thomas/Getty Images hide caption
A protester supporting Apple in its battle against the FBI holds up an iPhone that reads "No Entry" outside an Apple store in New York on Feb. 23.
The FBI's success in unlocking, without Apple's help, the iPhone of one of the San Bernardino terrorists marks a dramatic end to the heated dispute between the Justice Department and the tech giant about the scope of the government's power to compel a company to weaken its digital security for a criminal investigation.
Below are some of the key takeaways — and mysteries — left in the aftermath of the case.
Related NPR Stories
The Two-Way
The fbi has successfully unlocked the iphone without apple's help, the latest in the apple-fbi debate over encryption.
From Reagan's Cyber Plan To Apple Vs. FBI: 'Everything Is Up For Grabs'
What has been settled? The particular case of this specific phone, though we don't know yet what exactly the investigators found inside.
(A quick recap) Because the information on the iPhone used by Syed Rizwan Farook was encrypted and uncrackable, the investigators needed to guess the passcode that locked the phone's contents. The FBI wanted to hook it up to a computer that would figure out the four-digit combination, but the phone's security features required manual password attempts and would have wiped the phone clean after 10 wrong tries. So the FBI got a court order compelling Apple to write special software that would lift those security features, which Apple fought.
After weeks of saying that Apple's special software was the only way to safely get inside the phone ( read here why the NSA wasn't an option), the Justice Department last week said a third party had proposed a new, undisclosed method — and on Monday, the method was proved successful .
If unlocking this particular iPhone was the goal, "you could argue that this is a success because the FBI got the information much more quickly than they would have through the court system," says Eric Berg , a lawyer at Foley & Lardner and former federal prosecutor who specialized in electronic surveillance.
But was this iPhone's content the entire goal? The case sets no precedent and another similar dispute is likely.
For years, these kinds of government requests were settled behind closed doors. The standoff over the San Bernardino shooter's iPhone escalated the debate over law enforcement's ability to force cooperation from an unwilling third party.
One of the major stakes in this standoff between Apple and the FBI was the ability of the government to force cooperation from an unwilling third party.
The government's court order against Apple relied on a broad 18th century law called the All Writs Act , which has been used to compel assistance from other companies, but the scuttling of the legal case against Apple leaves no case law for how All Writs can be used to bypass digital security.
One down, 200+ more to go; FBI successfully got into SB shooter's phone without Apple's help. https://t.co/6GKeo8rubo — matt blaze (@mattblaze) March 28, 2016
That means this dispute is likely to be replayed, with Apple or another maker of encrypted devices — or encrypted messaging — as new technologies become a growing element of criminal investigations.
"Unfortunately, this news appears to be just a delay of an inevitable fight over whether the FBI can force Apple to undermine the security of its own products," Alex Abdo, staff lawyer at the American Civil Liberties Union, said in a statement on Monday.
A Justice Department spokeswoman, in her statement on Monday, acknowledged that the government is likely to continue asking tech companies for help:
"It remains a priority for the government to ensure that law enforcement can obtain crucial digital information to protect national security and public safety, either with cooperation from relevant parties, or through the court system when cooperation fails. We will continue to pursue all available options for this mission, including seeking the cooperation of manufacturers and relying upon the creativity of both the public and private sectors."
Can the FBI now get into all iPhones? It depends on what method it used, which we may never find out.
We don't know the details of what method the FBI used to get inside this locked iPhone, and the government may try to keep it classified. "There's not really any requirement for disclosure because they're not involving Apple," says Berg, the former federal prosecutor.
Apple says the FBI has not shared its technique with the company either, and its lawyers have previously said they'd push for such a disclosure.
Whether the technique can be applied to the hundreds of other locked Apple devices seized in other criminal investigations around the country depends on what exactly it entails.
According to iPhone forensics researcher Jonathan Zdziarski , if the method relied on tinkering with the hardware inside the phone (like the memory chip cloning method we described here ), that could be reused on other older devices, like the iPhone 5C at the center of this dispute. But if the method exploits a weakness in the phone's software, Zdziarski says the technique could work on newer devices.
If investigators do want to reapply this tool to other traditional investigations, they will need a search warrant with probable cause.
NPR business intern Naomi LaChance contributed to this story.
- Generative AI
- Office Suites
- Collaboration Software
- Productivity Software
- Augmented Reality
- Emerging Technology
- Remote Work
- Artificial Intelligence
- Operating Systems
- IT Leadership
- IT Management
- IT Operations
- Cloud Computing
- Computers and Peripherals
- Data Center
- Enterprise Applications
- Vendors and Providers
- Enterprise Buyer’s Guides
- United States
- Netherlands
- United Kingdom
- New Zealand
- Newsletters
- Foundry Careers
- Terms of Service
- Privacy Policy
- Cookie Policy
- Copyright Notice
- Member Preferences
- About AdChoices
- E-commerce Affiliate Relationships
- Your California Privacy Rights
Our Network
- Network World
Apple vs. the FBI: The legal arguments explained
Apple has attacked the fbi's iphone unlocking request on several legal fronts.
Apple has raised some interesting, and potentially winning, legal arguments in its motion to overturn a judge’s order requiring the company to help the FBI unlock the iPhone of a mass shooter.
The FBI’s request for Apple to write new software to defeat password protections on the phone violates the company’s free speech and due process rights, Apple argued Thursday in its motion to vacate Magistrate Judge Sheri Pym’s Feb.16 order .
Apple has a chance to prevail in court, especially with its First Amendment free speech argument, said Jennifer Dukarski, a technology lawyer with the Butzel Long law firm in Ann Arbor, Michigan.
Several past court cases have looked on software code as a form of speech, although the legal record is mixed, she said. Apple argues the court cannot force speech from the company, particularly when the speech would be against Apple’s own interests.
“Clarity on this issue would help all who write and defend those who write code,” Dukarski said. “If the code is treated as speech, I think Apple has a strong position against compelled speech.”
Still, the company has an “uphill battle” with Pym after her initial order requiring Apple to help unlock the phone, said Braden Perry, a lawyer specializing in federal enforcement cases with Kennyhertz Perry in Kansas City.
The First Amendment argument could carry weight because the government needs a “compelling” interest to force Apple to write new code, he said. Apple argues that the FBI has produced “nothing other than speculation that the compelled speech could produce fruitful information.”
It’s important to consider the bigger picture than this one case, Perry added. “The majority of the argument is about balancing the needs of law enforcement with the privacy and personal safety interests of the public,” he said.
Following are some of the main legal issues.
What’s the FBI’s argument? The FBI’s request relies heavily on the All Writs Act , a U.S. law dating, back to the late 1700s, allowing courts to “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
The All Writs Act gives judges wide latitude to compel parties to cooperate in cases before them, but there are limits. The judge must have no other legal options available, the target of the writ (Apple) must be closely connected to the case, and the court order cannot impose an undue burden.
Apple’s participation is necessary to access the phone, Department of Justice lawyers representing the FBI argue. “Here, the government has obtained a warrant to search the phone of a mass murderer, but unless this Court enforces the Order requiring Apple’s assistance, the warrant will be meaningless,” DOJ lawyers wrote in a stinging rebuke of Apple filed Feb, 19.
The bigger issue: More broadly, FBI Director James Comey and other officials have called for a policy debate about criminals’ use of encrypted communications to shield law enforcement from their activities.
Beyond this case, the larger issue is “really about who we want to be as a country, and how do we want to govern ourselves?” Comey said during a congressional hearing Thursday. Investigators increasingly can’t read the communications of “terrorists, gangbangers, pedophiles, all different kinds of bad people,” he said.
The FBI wants a public debate about the issues of encryption and security, Comey added. “We’re not here to tell the American people what to do about it, we’re just here to tell you there is a big problem, and that darkness is going to grow and grow and grow and change our world,” he said.
Apple argues that the FBI request, if successful, will open the door to hundreds of similar requests from investigators across the country and the world.
“This is not a case about one isolated iPhone,” the company’s lawyers wrote Thursday. Instead, the FBI is seeking “a dangerous new power” to force Apple and other tech companies to undermine basic security and privacy protections.
The order, if upheld, would create a workaround to encryption protections on iPhones, “making its users’ more confidential and personal information vulnerable to hackers, identity thieves, hostile foreign agents, and unwarranted government surveillance,” Apple’s lawyers wrote.
Apple vs. the All Writs Act: The company argues Pym’s order ignores several limits on the All Writs Act. The act does not give courts new authority to compel assistance beyond that already authorized by Congress, Apple says.
In addition, the judge’s order is “unreasonably burdensome,” and would require Apple to create a new operating system, tying up six to 10 of its employees for up to a month.
Apple is also “far removed” from the terrorism and mass shooting case being investigated, its lawyers argue. “The All Writs Act does not allow the government to compel a manufacturer’s assistance merely because it has placed a good into the stream of commerce,” they wrote in their appeal . “Apple is no more connected to this phone than General Motors is to a company car used by a fraudster on his daily commute.”
Apple’s First Amendment argument: The company points to several court cases where judges have considered code as a form of speech. It’s a violation of the First Amendment to force speech, the company’s lawyers argue.
Apple’s Fifth Amendment argument: The due-process claims are a bit tougher to follow, but they go like this: The Fifth Amendment protects U.S. residents against the government taking away their liberty. The requested order would require Apple to “do the government’s bidding” in a way that’s burdensome and violates Apple’s “core principles,” its lawyers argue.
What happens now? Judge Pym has scheduled a hearing on Apple’s appeal for March 22 in Riverside, California. It’s almost certain that her ultimate decision will be appealed by the losing side. The case could go then to a district court judge, and if challenged there, to the U.S. Court of Appeals for the Ninth Circuit. Ultimately, the case could end up in the Supreme Court , many legal experts have predicted.
Related content
8 out-of-sight superpowers for google contacts on android, ai is about to transform smartphones in a big way, 3 secrets to a smarter android status bar, what to expect with apple's upcoming iphone 16, from our editors straight to your inbox.
Grant Gross, a senior writer at CIO, is a long-time technology journalist. He previously served as Washington correspondent and later senior editor at IDG News Service. Earlier in his career, he was managing editor at Linux.com and news editor at tech careers site Techies.com. In the distant past, he worked as a reporter and editor at newspapers in Minnesota and the Dakotas.
More from this author
Air canada chatbot error underscores ai’s enterprise liability danger, conservative group takes credit for anti-net neutrality comments, bot-generated comments swamp fcc, urging overturn of net neutrality, fcc hit with ddos attacks after john oliver takes on net neutrality, us device searches at borders ignite resistance, how to prevent your data from being searched at the us border, qualcomm may consider asking us to ban iphone imports, verizon sells its cloud and managed hosting services to ibm, most popular authors.
- Gyana Swain
Show me more
Researchers tackle ai fact-checking failures with new llm training technique.
MIT delivers database containing 700+ risks associated with AI
Jamf’s Microsoft Azure partnership opens up the enterprise
Podcast: Is the gold rush for AI talent slowing down?
Podcast: Google loses antitrust, and the world yawns
Podcast: Does a chief risk officer make sense?
Is there still a gold rush for AI talent?
Tech news roundup: Google antitrust, Delta-Microsoft tiff, and stuck astronauts
Do companies need a Chief Risk Officer?
Sign up to Newsletter
Apple v FBI
Privacy International filed an amicus curiae brief outlining the international implications of eroding safety features on mobile phones
On 3 March 2016, Privacy International, together with Human Rights Watch, filed an amicus curiae brief in In the Matter of the Search of an Apple iPhone Seized during the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203 in the U.S. District Court for the Central District of California.
Popularly known as the “Apple v. FBI” case, the dispute stemmed from the FBI’s investigation of a December 2015 mass shooting in San Bernardino, California. As part of its investigation, the FBI obtained an iPhone used by one of the deceased shooters. The data on the iPhone was encrypted and the FBI filed an application for an order of assistance under the All Writs Act, 28 U.S.C. §1651, to compel Apple’s assistance in accessing that data. In particular, the FBI sought to compel Apple to design and write custom software that would cripple core security features of the iPhone. The court issued the order, which Apple challenged on the grounds that it was unlawful and unconstitutional.
Privacy International and Human Rights Watch’s brief focused on the international implications should the Court compel Apple to assist the FBI by hacking its own iPhone. In particular, we discussed how other countries already seek the power to compel technology companies to undermine the security of their products or services, through hacking and other techniques. We argued that should the Court compel Apple to assist the FBI, it would encourage these countries to place heightened pressure on companies to comply. Our brief also touched upon the civil and human rights abuses that can – and have – occurred when governments seek to exploit security weaknesses in technology products and services.
Privacy International, together with Human Rights Watch, submits a briefing to US court, arguing that Apple is right to refuse the FBI's demands to weaken iPhone security
Even this redacted letter wouldn't happen under the investigatory powers bill, reports and analysis, don't celebrate cellebrite, because your phone is at risk, legal files.
IMAGES
COMMENTS
Apple and its supporters, including top technology companies such as Google and Facebook, made the case on several fronts that the court order threatened the privacy of all individuals. First, according to Apple, the order effectively required the company to write code, violating its First Amendment right to free speech by forcing the company ...
Apple provided the FBI with data it had in their possession and sent Apple engineers to advise the FBI, but refused to comply with the court order to bypass the phone's security measures: specifically the 4-digit login code and a feature that erases all data after ten incorrect attempts. The FBI argued that the bypass could only be used for ...
video excerpts that summarized the two sides of the argument. The first video presented Tim Cook, CEO of Apple Inc., arguing that, while his company has been actively engaged in the past in helping the FBI extract information from phones, the particular software that the FBI wants the company to develop in this case will make its customers.
Apple's Tim Cook appears to be mad as hell. His open letter to customers — in which he scoffed at a court order that would compel Apple (under a 227-year-old law) to write code to help unlock ...
Drama ensued as Apple refused to help the FBI break into the phone, believing that the methodology it was asked to utilize was unwarranted and threatening to public security. In what many have argued is an unethical, unprecedented request, the FBI ordered Apple to create software that would disable privacy settings used in select iPhones models.
Eric Orts and Amy Sepinwall on Apple vs. the FBI. The federal government's demand that Apple create new software to hack into the phone of one dead terrorist speaks to the complex and ...
A jargon-free look at the row between Apple and the FBI over access to a deceased terrorist's iPhone. ... In this case, a different way to get into the phone other than by using the passcode, i.e ...
Last year - Apple battled in court with the FBI in the aftermath of the massacre in San Bernardino, California. The FBI obtained a court order in February 2016 directing Apple to furnish an encryption key so that law enforcement could access the iPhone of the killer. The court case raged in federal court until the FBI purchased a software tool from an Israeli company that broke the iPhone ...
Do you think Apple had a moral obligation to help the FBI open the iPhone in this case because it involved terrorism and a mass shooting? What if the case involved a different type of criminal
Bestseller. Apple V. The FBI. By: Chris Kemerer, Michael Smith. As the world continues its digital evolution, more aspects of our lives are dependent on data and digital devices. This shift has required technology manufacturers to emphasize encryption and robust…. Length: 13 page (s)
Apple argues that the FBI request, if successful, will open the door to hundreds of similar requests from investigators across the country and the world. "This is not a case about one isolated ...
Summary. The dispute between Apple and the FBI arises out of an application that the agency filed with a federal magistrate judge in California, seeking assistance with the search of an iPhone that was seized during the investigation into the December 2015 attacks in San Bernardino, CA. The FBI was unable to access data on the locked iPhone ...
A protester supporting Apple in its battle against the FBI holds up an iPhone that reads "No Entry" outside an Apple store in New York on Feb. 23. The FBI's success in unlocking, without Apple's ...
spectives Apple should comply with the FBI's request to develop and give the FBI a key that would enable it to break into the phone of a specific person, but that would also enable the FBI to break into all iPhones in this type of national security case where the FBI or other national security agencies have reasonable cause to suspect that the
The legal tussle between Apple and the U.S. Federal Bureau of Investigation (FBI) over access to the iPhone used by a shooter in last year's San Bernardino attacks is now over after authorities ...
Apple has raised some interesting, and potentially winning, legal arguments in its motion to overturn a judge's order requiring the company to help the FBI unlock the iPhone of a mass shooter ...
Popularly known as the "Apple v. FBI" case, the dispute stemmed from the FBI's investigation of a December 2015 mass shooting in San Bernardino, California. As part of its investigation, the FBI obtained an iPhone used by one of the deceased shooters. The data on the iPhone was encrypted and the FBI filed an application for an order of ...
ABSTRACT. Second-level agenda-setting suggests that news media influence how we think. As a case study examining the nature and effects of mainstream news media's coverage of the 2015 Apple/FBI dispute about data privacy versus national security, this study found via content analysis that a majority of articles covering the dispute (73.7%) made the same potentially misleading claim about how ...
A U.S. magistrate judge has ordered Apple to help the FBI break into an iPhone used by one of the gunmen in the mass shooting in San Bernardino, Calif. (AP Photo/Carolyn Kaster) February 19, 2016 ...
Introduction. The case was one of the most high-profile conflicts between the government and a technology company in the dispute over encryption and data privacy.. The conflict between Apple Inc. and the Federal Bureau of Investigation (FBI) brought the tension between privacy and national security to the public's notice. The FBI ordered Apple to provide anti-encryption software to retrieve ...
By David Ingram. Two iPhones have put Apple back into the FBI's sights. The phones belonged to a deceased Saudi national accused of fatally shooting three people at a Florida naval base in ...
Apple v The FBI. Case. -. Reference no. 9B18E013. Subject category: Knowledge, Information and Communication Systems Management. Authors: Chris F Kemerer (University of Pittsburgh); Michael D Smith (Carnegie Mellon University) Published by: Ivey Publishing. Originally published in: 2018. Version: 2018-09-10.
The conflict between privacy and security is examined in this case, starting with the 2016 legal challenge when, after a mass shooting, the U.S. Federal Bureau of Investigation sought a court order directing Apple, Inc. to create software that would unlock the suspect's iPhone. Although that legal challenge was dismissed, the issues remain live ...