Apple vs. FBI

The order calls for Apple to provide “reasonable technical assistance.”  Reasonable technical assistance is defined by the following:[i]

  • “…Bypass or disable the auto-erase function…”
  • “Enable the FBI to submit passcodes to the [iPhone] for testing electronically; and
  • “Ensure that when the FBI submits passcodes to the [iPhone] software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware.”

The order does state that Apple would need to develop a “software image file” (SIF) that is “coded with a unique identifier of the phone so that the SIF would only load and execute on the SUBJECT DEVICE”, (i.e. the phone in question).

FBI Director James Corney released a statement on February 21, stating, “The relief we seek is limited and its value increasingly obsolete because the technology continues to evolve. We simply want the chance, with a search warrant, to try to guess the terrorist’s passcode without the phone essentially self-destructing and without it taking a decade to guess correctly.”[ii] Public opinion seems to be in supportive of this view as seen in a recent poll conducted by SurveyMonkey with 51% in agreement with the FBI.[iii]

Apple, however, claims that the FBI through this order is calling “…[for] a new version of the iPhone operating system, circumventing several important security features and install it on an iPhone recovered during the investigation. In the wrong hands this software, which does not exist today, would have the potential to unlock any iPhone in someone’s physical possession.”[iv] 

Apple and its supporters argue that this would not only weaken Apple’s encryption codes, but will also create precedent for other foreign governments such as China, Iran, and others to force companies to develop or provide that same key. Both sides have legitimate concerns, however, both sides need to have an honest assessment of the world around them. Apple needs to recognize that this matter is not just a criminal case, but also one involving national security.

Consider a scenario in which a terrorist attack causes a catastrophe on a much larger scale. A government agency may make a similar request to the FBI, and what will Apple do? The pressure to comply fueled by grief and anger will be enormous. Will Apple stick to its conviction to the point of consumer boycotts and the possibility of closing shop?

At the same time, the US government needs to understand that the power they are requesting has the potential for great abuse. The image of a federal government agent or official that has little or no accountability monitoring phone conversations, whatever the motivation, is not comforting. The temptation to rely on backdoor encryption is too strong for any government agency or official to withstand. 

Recently, members of Congress have expressed their frustration with Apple. Some have called for a commission to study the encryption issue much further.  While the idea of a commission is great, there is concern as to who will be making up such a commission. House Homeland Security Committee Chairman Michael McCaul (R-TX) and Senator Mark Warner (D-VA) are expected to introduce legislation to create a national commission to investigate police use of encrypted data and protection of privacy.[v] The Senate Intelligence Committee is also working on a bill regarding encryption, with efforts led by Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA).[vi]

Ideally, any legislation concerning encryption should balance an individual’s right to privacy and the security of our Nation. There should be no reason why this cannot become a “both and”, instead of an “either or” scenario. Any encryption legislation should recognize that encryption technology is a unique business product that provides relief from customers’ fears that their emails will not be hacked resulting in the loss of personal or business information. At the same time there should be strong accountability measures (i.e. criminal or civil penalty) for any government agent or official that abuses the backdoor encryption or the access to the encryption key.[vii]   

If the debate becomes only a privacy issue or only a national security issue, then we as a nation lose. We need to reconcile those two interests simultaneously in order for this to be successful. 



[i]See https://regmedia.co.uk/2016/02/17/apple_order.pdf (last accessed Feb. 23, 2016).
[iii]See “In Apple vs. the FBI, Americans Want the Phone Unlocked” from http://blogs.wsj.com/digits/2016/02/20/in-apple-vs-the-fbi-americans-want-the-phone-unlocked/ (last accessed Feb. 23, 2016).
[iv]See http://www.apple.com/customer-letter/ (last accessed Feb. 23, 2016).
[vii]A “backdoor” in computing is a method of bypassing the normal method of authentication. Backdoors are usually inserted into a program or alogorithm before it is distributed widely. They are often hidden in part of the design of the program or alogorithm. In cryptography specifically, a backdoor would allow an intruder to access the encrypted information without having the correct credentials (from stanford.edu)