Apple Versus The U.S Government: How it Went Down and Why It's Important

Over the past few weeks Apple has been making headlines due to their ongoing battle with the US Government. The FBI now wants to strong-arm Apple...
  1. Monopolyman

    Over the past few weeks Apple has been making headlines due to their ongoing battle with the US Government. There have been multiple cases where the FBI has wanted information on an iPhone but were unable to get past the phone’s encryption. The FBI now wants to strong-arm Apple and have them break their own encryption to get evidence that might be on the work phone of a terrorist. Apple has refused to do such a thing, so this debate has been brought to the courts. The implications and precedents that this dispute carries go much further than any of the individual FBI case. In this article, I’ll lay out how everything went down, take a look at the motivations of the parties involved, and discuss why this is all so important.

    The core of the issue is the role of encryption in the justice system. The narrative of needing to get rid of encryption has been going on for a very long time, but the discussion was amplified following the tragic attacks that took place in Paris on November 13, 2015. After this happened, many people were at the throats of tech companies blaming encryption for the atrocities that took place. Despite the fact that it was eventually discovered encrypted SMS was the terrorists’ main method of communication, political figureheads, such as David Cameron, still sought out backdoors and an end to encryption.

    A few months later, another tragic attack happened in San Bernadino which once again sparked a heated debate around encryption. In this case, the FBI has possession of the attackers phone but they don’t know the PIN number that unlocks the phone. The FBI turned to U.S. Judge Sheri Pym so they could force Apple to break the encryption on the phone. The CEO of Apple, Tim Cook, responded a day later with an open letter announcing that he will be not be complying with the court and will challenge their decision.

    This situation is exposed for what it really is when you consider the motivations behind the FBI’s actions. In reality, the FBI isn’t just concerned about the San Bernardino case. In fact, they had access to a six-week old backup of the phone, and they could have gained an up-to-date backup if they simply took the phone to a recognized network. Instead, the FBI attempted to change the password of the iCloud account which locked them out of the data they wanted. While this specific mistake seems to be due to incompetence on the FBI’s behalf, the US Government is well aware of the implications of unlocking the phone.

    By asking Apple to break the encryption on the one phone, they would be weakening the encryption on every other iOS device. Currently there is no one that can get passed Apple’s encryption, not even Apple. In order to get data on the phone, Apple would need to create a backdoor for the government. This can have some really negative consequences because a backdoor is essentially an artificial vulnerability, and once there is a vulnerability in the software it can be attacked by anyone. Considering iPhones are so widely used, there are a lot of people that want access to them for nefarious reasons, and we know that in a lot of cases hackers are one step ahead of law enforcement.

    It’s also necessary to take a look at what exactly the FBI wants from Apple. The FBI isn’t simply asking Apple to get into this one phone, but rather create a tool for them that is capable of getting past the encryption. This does not only mean that the FBI can use this tool on any iPhone, but it also means there will need to be a lot of transparency within the legal system. Jonathan Zdziarski is is well versed in this subject matter and has even taught law enforcement agencies about iOS forensics. He recently made a blog post explaining how if Apple was to make such a tool, it would need to be heavily reviewed and explained to the courts. This means the tool and how it works will be known by many people, which makes nefarious abuse of a backdoor much more likely.

    Even though the government's war against encryption has only recently began to make headlines, it is something that has been going on for a very long time. Two decades ago, in 1996, the US had encryption export regulations for international devices. This regulation made it so that international software from the US cannot have encryption stronger than 40 bits. This was a fairly significant problem because 40-bit encryption could be attacked via brute force and bypassed using regular desktop computers. A tech company, Lotus, was unhappy with this and attempted to try to create stronger encryption within the government’s standards. They did this by using 64-bit encryption, but gave a 24-bit key to the NSA. This key eventually became public knowledge, so anyone could attack the encryption as if it was only 40 bits.

    One thing that is even more concerning than the key itself is how it is referred to within the software. Someone who reverse engineered the software in search for the key found that it is referred to as “MiniTruth”, which is a reference to Orwell’s fictional agency dedicated to propaganda, and “Big Brother”. Now it should be noted that it is likely Lotus who put these names in the software. Regardless, it shows how the NSA was viewed before the modern anti-terrorism narrative. It’s also worth noting that during this time the NSA was a lot more transparent, as Lotus disclosed the relationship they had with the NSA. Ray Ozzie, the man who invented Lotus notes, has recently said, “it pains me to see such a lack of transparency in how our elected officials are running our government.”

    By looking at the behavior of the Department of Justice, it’s clear that they don’t necessarily care too much about the San Bernardino phone by itself. They already have had access to the iCloud backups and the phone itself is only a work phone. The reason the FBI has made such a big deal out of this specific case is because it’s an easy way to appeal to the emotions of citizens by utilizing the narrative of a war on terrorism. Of course, no one likes terrorism. The attacks in San Bernardino were tragic and hardly anyone is against the FBI seeing what was on the terrorist’s iPhone. The problem is that weakening encryption isn’t just stopping the terrorists, but it is also impeding the privacy of civilians.

    It’s clear that weakening encryption for everyone isn’t the answer when it comes to criminal investigations involving technology. That being said, there still needs to be a discussion to figure out what the answer should be. Unfortunately, the technology we have today is vastly different than what existed when most of the laws and regulations were created. Information is no longer kept on pieces of paper stored in a secure location. Instead, it is stored on devices that are connected to the world wide web and needs to be protected from the potential cyber threats.

    As of now, there isn’t a logical way to give law enforcement access and keep the bad guys away at the same time. It is also important to always remember the true motivations behind the government, because us citizens need a way to protect their privacy. Maybe once we see more advancement in encryption and technology together building in backdoors might be a viable option if used properly. Until then, Apple seems to have the right idea by completely locking down their customer’s information with backdoor-free encryption.

    Sources: ArsTechnica, Gizmodo, ReCode, USSRBack, Cypherspace, Jonathan Zdziarski, TechCrunch, Y Combinator

    Share This Article

    About Author

    I am a young writer who is passionate about gaming and technology. PC is my preferred platform, but I appreciate all forms of video games. I enjoy voicing my opinion in the articles I write, but also like to keep our readers informed on the latest news.


To make a comment simply sign up and become a member!
  1. Revonix v
    I don't believe in the gvt's actions for this case. The way they are handling it is terrible. If Apple doesn't want them in, just lay back. No need to take it into court at all. F.I.B was being ***** and it's just retarded. They are being asshats:asshat:
  2. myDarling
    I'm still fairly convinced the FBI could potentially get whatever it is that they want off that phone. They're just saying they can't get into it to try to fuel people to support the idea of a backdoor which would just make retrieving information from phones easier and more global for them.
  3. SSL
    I think its stupid that apple refuses to help the F.B.I Obtain information of a killer, and after this case, many more. Apple has their little talk on privacy, but isn't this a little more important than the F.B.I gets the info they needed? So what if they read a text between a killer and his mother, or a selfie of him. I thought apple turned alot of heads when they said no.
  4. cheeeeeeetoh
  5. 3xTiNcT
    I've been thinking and maybe this is them trying to cover up the fact they can gain access anyways.
  6. Alexi
    This entire article is very inaccurate but I'm not about to go and rewrite it and explain every individual point. So instead I'll try to clear up a few of the errors.

    The FBI is in fact asking Apple to only give them to access to one phone. This is known by the documents filed in court, as well as from the letters and analysis given by various concerned parties. The FBI is asking Apple to write a specific version of the iOS operating system that will allow them to bypass the data erasing security measures, as well as the anti brute force functions. They are asking for a version of iOS which Apple is internally calling "GovtOS" that the FBI is capable of unlocking through a brute force attack on the PIN for the phone.

    Apple has stated that the precedent set by this single use tool for one specific phone is enough to cause concern as it could be used to leverage other possible cases against other companies.

    I can't comment directly on the US legal system as I have never thoroughly examined it but there is already a huge lack of transparency between departments and agencies, as documents released from the Snowden leaks and other whistle blowers have shown. A tool such as this without any oversight would be a cause for concern.

    Going on, Mr. Zdziarski, although an expert in iOS forensics, overlooked a major part of the Apple vs. FBI battle. The FBI has outright said that Apple could keep complete ownership of the software their developers write for them. They would not be obliged to release the source code to the FBI, explain how the tool works, or publish any sort of materials relating to the GovtOS tool. This means that the courts would not have the tool explained to them, nor would there be "many people" with knowledge of how this backdoor works.

    Finally, Apple has already won a similar court case pertaining to an iPhone 5s in a federal court in New York State where Apple was not required to unlock a phone belonging to a convicted drug dealer.

      Monopolyman likes this.
  7. runman
    the only privacy you have is in your head. once its written down it not privet anymore its just there for others to eventually find
  8. runman
    when will people learn you cant win against big governments. they will just make a law forcing it to be handed over. this is a dumb move by apple that will now affect us all. Apple should be hassled to hell for the stupidity. they should have just handed it over again because they already handed it over now there making a big song and dance trying to look like the good guy when they already unlocked it for the gov. they have no leg to stand on they already set a precedent
  9. Red58
    "Any society that would give up a little liberty to gain a little security will deserve neither and lose both"
    - Benjamin Franklin
  10. Nagato
    Apple for the win!