top of page
Search
presadurbengoamo

This Apple-FBI Fight Is Different From the Last One: How Technology and Politics Have Changed the Ga



Of course, Congress could choose to strike a different balance on this question, and might well do so in the future. We take no position here on that question. Nor do we address the authority courts may have to compel assistance from private persons and companies under color of other statutes that specifically contemplate the provision of technical assistance (indeed, we think the Apple cases stand in marked contrast to scenarios like the Lavabit case in the Fourth Circuit, which involved a technical-assistance order under the far-more-specific terms of 18 U.S.C. 3123(a)(1), part of the PR/TT statute). Until such time as there is legislation expressly addressing the scenario presented by passcodes and encryption, however, the generic language of the All Writs Act will remain the only game in town for disputes like the contretemps between Apple and the FBI. Our aim is to provide a principled way to apply the All Writs Act in these cases until and unless Congress decides to provide more specific authority.




This Apple-FBI Fight Is Different From the Last One



Apple and the US government are squaring off in an epic legal battle with wide-ranging implications for how technology firms must work with law enforcement. googletag.cmd.push(function() googletag.display('div-gpt-ad-1449240174198-2'); ); The US government earlier this month sought a court order to force Apple to help unlock an iPhone as part of the probe into last year's San Bernardino attacks.The highly charged case has created a sharp divide between those who say that users of devices like smartphones should be able to keep information private through encryption, and others who claim legitimate law enforcement investigations should take precedence when courts approve.Apple is challenging the California court order, saying the type of cooperation sought would undermine basic principles of data security and open new vulnerabilities for all its users.The government is asking for the creation of software that doesn't exist, an abuse of the law and violation of the company's constitutional rights, Apple says.It adds that creating a weaker "government OS" would undermine the encryption Apple and others have been introducing, and ultimately leak out to hackers and foreign governments."Apple wants to maintain the trust relationship with its customers, they feel deeply and firmly this is something that has to exist, and that no government should have access to this data," said John Dickson of the Texas-based Denim Group, which manages security and encryption for its customers."I anticipate there will be a technical response from Apple, so that it will be nearly impossible for them to be compelled to do anything."Julian Sanchez of the libertarian Cato Institute says in a blog post the case is "a fight over the future of high-tech surveillance, the trust infrastructure undergirding the global software ecosystem, and how far technology companies and software developers can be conscripted as unwilling suppliers of hacking tools for governments." Protesters demonstrate outside an Apple Store as they object to the US government's attempt to create a backdoor to hack into the Apple iPhone, in Los Angeles, California on February 23, 2016 Life, death and encryptionSome say Apple's position is based on a core principle about security of its users' data."Lack of privacy can be a matter of life and death or imprisonment," said Jon Hanour, chief executive of California startup USMobile, which makes an application for encrypted mobile messaging."Apostasy results in a death in Saudi Arabia. Homosexual acts send people to prison in Pakistan. And in many countries, adultery is punishable by lashing and stoning."But critics say Apple is simply providing an easy way for criminals and others to operate in the shadows.Allowing Apple to refuse would "thwart the public interest in a full and complete investigation of a horrific act of terrorism," the Justice Department argued in its court motion.New York County District Attorney Cy Vance, who has complained that encrypted phones have frustrated many investigations, said Apple and other makers of encryption should not be able to help skirt law enforcement."Apple and Google have created the first warrant-proof consumer products in American history, and the result is that crimes are going unsolved and victims are being left beyond the protection of the law," he said in a statement. The US government earlier this month sought a court order to force Apple to help unlock an iPhone as part of the probe into last year's San Bernardino attacks Apple argues that being forced to comply would set a dangerous precedent allowing broad access to law enforcement."Once the floodgates open, they cannot be closed, and the device security that Apple has worked so tirelessly to achieve will be unwound," Apple argued.But James Lewis, a former US official who is now a senior fellow at the Center for Strategic and International Studies, said there is nothing unusual about the case."The court decided this was a reasonable request," Lewis told AFP."The privacy people say it will set a precedent and it will be the end of life on this planet, and it's not true."Computer forensics researcher Jonathan Zdziarski said complying would be more complex than it appears.In a blog post, he notes that Apple would need to develop a tool to produce "reproducible, predictable results," which "must be forensically sound and not change anything on the target."Additionally, he said that Apple "must be prepared to defend their tool and methodology in court... What FBI has requested will inevitably force Apple's methods out into the open." (adsbygoogle = window.adsbygoogle []).push(); The China questionApple backers say weakening encryption will work against American interests by compromising security for users living under repressive regimes."Authoritarian regimes around the world are salivating at the prospect of the FBI winning this order," Nate Cardozo of the Electronic Frontier Foundation told PBS."If Apple creates the master key that the FBI has demanded that they created, governments around the world are going to be demanding the same access."But Apple's critics say the company may already assist the Chinese government with modifications of the iPhone for that market and cloud computing center hosted in China.Stewart Baker, a former Homeland Security official who is now in law practice in Washington, said Apple's lack of transparency in China raises questions."Maybe you can explain why a secret encryption system that everyone suspects of having a real back door is good enough for Apple's customers in China?" Baker says in a blog post.Snowden impactSome analysts say the conflict stems from revelations about widespread government surveillance by former intelligence contractor Edward Snowden."The Snowden disclosures revealed that many government agencies conduct extensive surveillance on citizens, which arguably not only undermine our privacy but compromise our entire information security infrastructure," says Rahul Telang, professor of information systems at Carnegie Mellon University.Telang said it is a difficult issue to resolve but that he sees the privacy argument as likely to win."Now that we know about government snooping, there is a trust issue," he said. "Once we give you backdoor access, where will it stop?" 2016 AFP


"There is no easy side to be on in this debate," he said. "Strong encryption has its costs, from protecting terrorists to drug dealers to child pornographers. But I happen to feel that the risks of weakening encryption, even a little bit, even just for the government, are potentially much worse."


For more, check out Apple Is Not the FBI's Tech Support and Apple's FBI Battle Is About the Gadgets We Haven't Even Thought of Yet, as well as our coverage from RSA, where a number of top administration officials addressed Apple's encryption fight with the FBI.


"Those worried about our privacy should stay wary," said a statement from Representative Darrell Issa (R-Calif.), who has faulted the government's stance in the case. "Just because the government was able to get into this one phone does not mean that their quest for a secret key into our devices is over."


Nothing should be beyond the realm of a judicial approved court order. That is what our justice system is built on. This is no different than entering a house, car, pc, bank account with judicial approval. Having the ability to search this phone for additional information that could help bring other responsible persons to justice and prevent such a despicable act from happening again is most important. You give up your privacy when you break the law. The software developed for this case can be used on this one phone and none others. It follows the same basic principal for privacy that we have in our homes that has been protected for centuries.


The FBI asked for a delay on the court fight last week because it may have figured out a way to break the iPhone's encryption on its own. Today the Department of Justice announced they have succeeded in getting into Farook's phone with the help of a third party. Apple's help is no longer needed. From CNN:


He would not name the "third party" that helped the FBI. And he refused to say whether the FBI will disclose this hacking method to Apple so the company can protect future phones from being hacked this way.


Even though this particular fight is ending, the battle over encryption bypasses or "back doors" upon command by the federal government is far from over. Members of the Senate Intelligence Committee are currently drafting legislation that might require tech companies in some fashion to provide access through their own encryption. We don't know the final text as yet, but it would apparently authorize judges to order tech companies to do exactly what happened in this Apple case. Specifically giving judges authority to demand assistance would avoid a fight over the limits of the All Writs Act.


What specifically is Apple promising to protect as "private"? Some of the data on a particular device. Their vigilance does not extend to the data that leaves your phone and moves through cables and into and out of Apple's servers, data that is stored remotely "in the cloud," or the data that is collected by a myriad of companies you digitally contact. (As I have argued elsewhere on this blog, we need to rethink the relationship of "metadata" to privacy.) Apple, in other words, is not fighting to protect much in the way of your data; it is not even offering to protect what you store on its iCloud service. 2ff7e9595c


1 view0 comments

Recent Posts

See All

baixar 1 2 3 música mp3

Baixar 1 2 3 Song MP3: How to Enjoy the Hit Song de Sofia Reyes, Jason Derulo e De La Ghetto Introdução Se você está procurando uma...

Comments


bottom of page