. Military Space News .
CYBER WARS
FBI-Apple standoff puts encryption on front burner
By Rob Lever
Washington (AFP) Feb 17, 2016


Apple ordered to hack San Bernardino shooter's iPhone
San Francisco (AFP) Feb 17, 2016 - An American judge ordered Apple on Tuesday to help the FBI break into an iPhone belonging to one of the attackers in the San Bernardino shooting that killed 14 people.

US Magistrate Judge Sheri Pym ordered Apple to provide "reasonable technical assistance" to the FBI, including by disabling an auto-erase feature after too many unsuccessful attempts are made to unlock the iPhone 5C.

Federal prosecutors had filed a motion requesting Apple's help after the FBI failed to crack the phone's code.

By disabling the security features, the FBI will now be able to attempt as many different password combinations as needed before gaining access.

The phone was the property of the San Bernardino County Department of Public Health, which employed one of the shooters, Syed Farook.

The county agreed to the search of the phone.

Farook, a US citizen, and his Pakistani wife Tashfeen Malik stormed a holiday work party in December and shot up their victims.

Apple did not immediately respond to requests for comment.

Pym, the judge, ordered that Apple provide software that would only run on the device in question, or any other technological means to access its data.

The technology giant now has five days to comply with the order or seek relief if it determines that complying would be "unreasonably burdensome," Pym said.

"We have made a solemn commitment to the victims and their families that we will leave no stone unturned as we gather as much information and evidence as possible," US Attorney Eileen Decker said in a statement.

"The application filed today in federal court is another step -- a potentially important step -- in the process of learning everything we possibly can about the attack in San Bernardino."

FBI Director James Comey revealed last week that investigators had not been able to crack open the phone two months into the investigation.

"It affects our counterterrorism work," he said.

Comey stressed the US government's concerns that commercially-available encryption benefits criminals.

Tech companies, intent on securing the trust of consumers after government spying revelations made by Edward Snowden, have been reluctant to be seen as helping authorities spy on users.

Apple's challenge of a court order to unlock an iPhone used by one of the San Bernardino killers opens up a new front in the long-running battle between technology companies and the government over encryption.

The standoff brings the sensitive issue, which has been at a stalemate in Congress, into the courts, and has abruptly shifted the policy debate on encryption.

A California magistrate on Tuesday ordered Apple to provide "reasonable technical assistance" to the US Federal Bureau of Investigation to break into an iPhone used by one of the shooters in the deadly December rampage that killed 14 people and has been linked to supporters of the Islamic State organization.

Apple quickly said it would fight the judge's order. Chief executive Tim Cook called it "an unprecedented step which threatens the security of our customers," and said the order "has implications far beyond the legal case at hand."

Apple, Google and other technology firms in recent years have stepped up encryption -- allowing only the customers to have "keys" to unlock their devices -- claiming improved security and privacy is needed to maintain confidence in the digital world.

That drive for privacy has prompted sharp objections from law enforcement and intelligence officials, who claim that criminals and extremists are able to hide their illicit activities thanks to device encryption.

"This is a clever move by the FBI to move from the legislative arena, where they were not winning, to the courts," said Joseph Hall, chief technologist at the Center for Democracy & Technology, a digital rights group.

- Raising privacy hackles -

The order raised hackles among privacy advocates, which see the potential to unleash unbridled surveillance in the United States and elsewhere.

"If the FBI can force Apple to hack into its customers' devices, then so too can every repressive regime in the rest of the world," said Alex Abdo of the American Civil Liberties Union.

But Apple also came under attack for thwarting a critical security investigation.

"Apple chose to protect a dead ISIS terrorist's privacy over the security of the American people," said Senator Tom Cotton of Arkansas, using an acronym for the Islamic State group.

"Regrettably, the position Tim Cook and Apple have taken shows that they are unwilling to compromise and that legislation is likely the only way to resolve this issue."

New York City police commissioner William Bratton welcomed the order and added, "We cannot give those seeking to harm us additional tools to keep their activity secret. I reiterate my call on Congress to act immediately in passing legislation to provide law enforcement the tools we need to keep America safe."

White House spokesman John Earnest said the White House supports the request by the FBI and Department of Justice.

"They are not asking Apple to redesign its product or to create a new backdoor to one of their products," Earnest told reporters.

"They're simply asking for something that would have an impact on this one device."

- Debate on 1789 law -

The case is likely to work its way through the courts, which will need to consider a number of both technical and legal questions.

Interestingly, Magistrate Judge Sheri Pym's order is based on the 1789 All Writs Act, which lays out broad authority for the courts to help enforcement of the law.

Steve Vladeck, an American University law professor and co-editor of the Just Security blog, said the order stretches the interpretation of the centuries-old law.

"If the government can compel Apple to develop software (to get around encryption) what can't it do," Vladeck told AFP.

"There is no history of court orders compelling companies to do research and design."

Legal scholar Jonathan Turley of the George Washington University said in a blog post that Pym "seems to believe that she can order companies to become unwilling participants in surveillance research and development."

"I fail to see her legal basis for such an extraordinary order against a private company," Turley wrote.

Berin Szoka, president of the libertarian think tank TechFreedom, said the order goes against "bedrock principles of law and privacy."

"If forcing Apple to hack its own devices qualifies as 'reasonable technical assistance,' there is no practical limit to what law enforcement could force private companies to do to compromise the security of their systems," Szoka said in a statement.

Darren Hayes, a Pace University professor of computer forensics, argued that Apple and other tech companies may have gone too far by using encryption that, in theory, makes it impossible for the firms to hand over evidence even if served with a legal warrant.

"I think that the public, once they become more educated about what is happening, might change their stance about Apple," said Hayes, who has worked as a consultant to law enforcement.

"This case is sensitive for the US public and I don't think it's particularly good public relations for Apple" to refuse to help the investigation, Hayes added.

One key question is whether Apple has the ability to provide the assistance sought by the FBI.

"Apple does not have the keys to your device -- they are burned onto your chip," Hall said.

But he said it may be possible to get around that encryption with software modifications.

"Apple has never been forthcoming about the deep details of its system," Hall said.

Hayes said that no one knows for sure if Apple can circumvent the encryption, but noted "the fact that they're arguing this makes me think they may be able to do it."

rl/jm

APPLE INC.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Teen arrested in Britain linked to hack of US spy chiefs
Washington (AFP) Feb 12, 2016
British police said Friday they had arrested a teenager on hacking charges, as media reports said the youth was suspected of cracking the personal accounts of top US intelligence officials. The news followed a series of bold hacking attacks for which credit was claimed by someone with the screen name "Cracka" who targeted top officials at the CIA, FBI, Homeland Security, the White House and ... read more


CYBER WARS
US missile system in S. Korea would hurt China's interests

US deploys more Patriot missiles in S. Korea

AMEC receives contract to support Aegis Ashore in Poland

S. Korea, US to discuss deployment of US missile system

CYBER WARS
Saudi says it intercepted Scud missile from Yemen

Saab, Indian firm in joint venture for missile programs

Saudi Patriot 'intercepts' Scud fired from Yemen capital

Russia sends brand new cruise missile ship to Syria: report

CYBER WARS
Japan man guilty of flying drone to prime minister's office

DARPA's Fast Lightweight Autonomy program takes flight

Aerospace Corporation Demos Counter-Drone Technology for Security Organizations

Drones give scientists a new self-service approach

CYBER WARS
ViaSat tapped to provide tactical terminals for Apache helicopters

Harris wins place on military communications contract

General Dynamics MUOS-Manpack radio supports government testing of MUOS network

Raytheon to produce, test Navy Multiband Terminals

CYBER WARS
Court denies Lockheed Martin JLTV injunction request

Israel Aerospace Industries unveils new loitering munitions

NATO allies sign air-to-ground munitions pact

Swedish Army takes delivery of Archer artillery systems

CYBER WARS
Orbital ATK establishes Singapore regional office

Russia's Kurganmashzavod filing for bankruptcy

Russia proposes licensed production of T-90S tanks in Iran

CACI completes acquisition of L-3 NSS Inc.

CYBER WARS
China the focus as Obama hosts South East Asian leaders

Obama hosts South East Asian leaders at desert retreat

Obama, Southeast Asian leaders seek united front on China

NATO, Montenegro begin membership talks

CYBER WARS
Scientists find a new way to make nanowire lasers

Scientists take key step toward custom-made nanoscale chemical factories

Nanoscale cavity strongly links quantum particles

New type of nanowires, built with natural gas heating









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.