Apple Versus the US Government, Who is Right?

An iPhone is seen in Washington, Wednesday, Feb. 17, 2016.

An iPhone is seen in Washington, Wednesday, Feb. 17, 2016. AP Photo/Carolyn Kaster

It is important to note that technology giants have generally worked with the government for almost 100 years.

Carter Schoenberg is the president and CEO of HEMISPHERE Cyber Risk Management, Inc.

In the post-Snowden revelation world, the world’s greatest technology firms have rallied behind the “Don’t Tread on Me” flag. The days of these technology firms, founded and based in the United States, working with Uncle Sam has come to a screeching halt.  In recent congressional subcommittee meetings, we have heard Google, Apple, Telos, Microsoft, Verizon and other tech giants testify to the need for a balance of protecting their consumers’ privacy and intellectual property with national security concerns.

It is important to note that technology giants have generally worked with the government for almost 100 years.  From providing the government next-generation technology well in advance of consumer access to monitoring telecommunications, the relationship has existed for a long time. Today, that relationship is strained to the point of creating an environment that will have profound legal and political implications.

In December 2015, 14 people were killed and 22 wounded in the course of a terrorist attack in San Bernardino, California. The assailants, Syed Rizwan Farook and Tashfeen Malik, were killed in a shootout with law enforcement later that horrific day. Because of the nature of the crime, the FBI took over as it had clear authority in such a crime. Its investigation has since revealed clear ties between the assailants and Islamic terrorism. One of the pieces of evidence acquired in their investigation was an Apple iPhone.  

While most new phones have enhanced encryption capabilities, both BlackBerry and Apple products are particularly challenging for forensic analysis because of the chip set within these devices  I will not go into the exact detail how law enforcement can extract information but another challenge with Apple products is an option that enables a “self-destruct” type mechanism. I do not mean literally. The iPhone is not going to blow up like something from “Mission: Impossible” but there is a capability to completely wipe all data from the device after 10 failed logon attempts. This essentially creates a $600 paperweight for your desk.  

This scenario was recently publicized when local police seized a phone of a citizen filming the police in an alleged abuse of power and physically assaulting a civilian. When the police seized the phone of the person filming, and trumped up a charge to arrest the owner of this phone, they proceeded to have the department’s Criminal Investigation Division attempt to break into the phone to view the video (allegedly to erase it) and after 10 failed attempts, the iPhone wiped itself.  It is important to note it was only recently the Supreme Court said law enforcement couldn’t compel an American citizen to provide the password to their cell phone or computers as it violates the Fifth Amendment.

Because of these challenges, the FBI obtained a court order to have Apple decrypt the iPhone lawfully taken into evidence as part of this two-part criminal/terroristic investigation. Apple has been served the court order but has its legal team in place to defend a position of “we are not going to do this.”  

Traditionally, in the United States, we have a two-week memory cycle and then we move to the next big thing. Just as the classified email investigation for Hillary Clinton is not going away, I believe this story is not going anywhere but up. Up to the United States Supreme Court, that is.

Apple’s position is that 1) it has significant privacy concerns for its consumers and 2) concerns about divulging intellectual property. Apple’s internal practice of security is outstanding. The company has very strict policies and procedures that include termination of employment if two independent teams even have a basic discussion of one another’s project in the cafeteria.

If this sounds harsh, perhaps it is but this approach has been highly successful nonetheless. In fact, this approach is so successful that hackers are offering Apple employees up to $23,000 for network access to Apple resources. When you are multibillion-dollar company, you have the financial resources to look at the FBI and give the proverbial finger.

However, is Apple right to take this position? What is it that the FBI is asking for, exactly? The bureau wants the contents of the assailant’s iPhone. That is it.  So, let us look at the two key concerns Apple is professing as the reason it will not comply with the court order.

Privacy

Most states have unique privacy standards and granted California has some of the most stringent. For there to be a concern of privacy, there must be an implied level of harm to the individual. The person in question is deceased. We do not have any headlines of a family member coming forth and saying, “Please don’t do this."

Furthermore, any information collected will be for the investigative purposes to support national intelligence activities in fighting terrorism within the United States and abroad and is likely not going to be made available for public consumption.

Protecting Intellectual Property

If the FBI provides a court order to have Apple unlock the device and provide a drive copy of all the iPhone’s contents, I am not sure I see what intellectual property is being compromised. Why can’t Apple bring the device into its lab, attest to the integrity of the process in writing, and then give the yielded information over to the Justice Department. The threat of a defense attorney issuing a subpoena for the Apple employees that may do the forensic exam is nonexistent because again, the former iPhone owner is dead.

Sidebar: It is important to note that Apple has the right to charge the government for such a service. This is no different than what the telecommunication companies charge local law enforcement for telephone records. So now, you have taken away the privacy, intellectual property and cost arguments. So why not comply with the court order? It is not as if it was a FISA court; a U.S. Federal Court judge in the jurisdiction of the sstate where the phone and manufacturer are physically located issued this.

The Flip Side

I have highlighted what is the most likely scenario for how and why the FBI would issue a court order to assist in the course of an investigation. However, if the court order were to instruct Apple (or any company) to provide a “God key” (aka backdoor) or insist government representative be present when the original equipment manufacturer facilitates the technical expertise to break into a device, then we have an entirely different scenario.  

The reason why is that once an agent of the government is able to witness how to conduct such an exercise, it creates two problems. The first problem is that it could allow the government to have received knowledge transfer from Apple to conduct on their own without any further assistance from Apple. Unfortunately, because of the past activities of our government, I do not believe the “good faith” effort will prevail. The second problem is that Apple and other companies would place an intellectual property value on how to break the cryptographic modules on the devices and thereby have a claim of loss of intellectual property.

The long and the short of it is simply, if you have a court order issued within the authority of the courts as defined by the Constitution or Supreme Court decision, no one company is above the law. If there are concerns as described above, then you advise the government you will provide but it is contingent upon mutually agreeable terms. The position of flat-out saying no will possibly subject business leaders to contempt of court charges. Given the U.S. attorney general’s recent decrees on proceeding criminally against the C-Class, I would not dismiss the possibility of such a charge.

It will be interesting to see how this case evolves through appellate courts all the way up to the Supreme Court. Stay tuned.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.