Skip to main content

Apple: The Government Misunderstands the Technology”

The battle Apple and the FBI is heading to federal court on March 22nd, determining whether or not the government can force Apple to open up an otherwise deeply-encrypted iPhone used by terrorist Syed Rizwan Farook leading up to the San Bernardino shootings.


The lead up to the hearing has been an unending game of back-and-forth between Apple and the government, and Apple has just lobbed the ball back to the other side of the court one last time prior to the hearing.

Last week, the FBI had filed with the court, describing Apple’s court-borne resistance to complying with its unlock order as ‘corrosive rhetoric’. Apple responded immediately, characterizing the FBI’s filing as “an indictment”. Basically, both sides had gotten to the openly hostile portion of these proceedings. During a call last week about the filing, Apple executives, including general counsel Bruce Sewell, spoke in a way that can be best characterized as surprised and outraged. The FBI’s tone shift from legal argument to character assassination in its filings had clearly taken Apple off guard.

The tone of today’s filing and subsequent call was much more cold and precise. Apple got some time to consider the best way to respond and went with dissecting the FBI’s technical arguments in a series of precise testimonies by its experts.

Where the FBI filing last week relied on invective, Apple’s this week relies on poking holes in critical sections of the FBI’s technical narrative.

The details of the reply

The gist of their final reply is summed up well in the following:

This Court should reject that request, because the All Writs Act does not authorize such relief, and the Constitution forbids it

In the reply and a brief press conference hosted just after its publishing, Apple focused on five main assertions:
  1. That the government is misinterpreting the All Writs act as a “virtually unlimited authority empowering courts to issue any and all orders the government requests in the pursuit of justice.” (pg. 3 of the below doc) and that “the founders would be appalled” by this interpretation.
  2. That there are no prior cases that support the government’s argument or interpretation of the All Writs act
  3. That making these demands “shows the government misunderstands the technology and the nature of the cyber-threat landscape” (pg. 19 of the below document)
  4. That, despite what the government has suggested in previous replies, Apple has never marketed their devices as being able to “thwart law enforcement”
  5. That, despite what the government has suggested in previous replies, Apple does not grant foreign governments any additional access to Apple user’s protected data.

Technical caveats

Unsurprisingly, in its filing, Apple mentions that the FBI shot itself in the foot when it had San Bernardino county officials change the iCloud password of the device. In doing so, the FBI removed a critical pathway to getting the information it says it wants to see if Apple unlocks the phone.

But, along the way, Apple also pokes holes in two technical arguments that the FBI has been trying to make. First, that the iCloud backups are encrypted with the device passcode. They are not, as pretty much any security expert or even reporter on this case knows.

Apple’s Erik Neuenschwander, the wielder of the rapier in this filing, slices up some FBI spam:

The statement that even if the device did perform an iCloud backup “the user data would still be encrypted with the encryption key formed from the 256 bit UID and the user’s passcode” is incorrect. Data backed up to iCloud is not encrypted with a user’s passcode.

He also points out that Apple does not log keystrokes in its keyboard, as claimed by the FBI:

As noted above, I also reviewed the Supplemental Pluhar Declaration. I believe that declaration contains several mistakes. For example, in paragraph 10(a), Agent Pluhar claims that the device’s keyboard cache would not backup to iCloud and that such keyboard cache “contains a list of keystrokes typed by the user on the touchscreen.” This is false. The keyboard cache in iOS 9 does not contain a list of keystrokes typed by the user, or anything similar.

Embarrassingly, the FBI also appears to think that because Mail, Photos and Notes were turned off on the device, that this also toggles what gets backed up via iCloud Backup. It does not.



Apple spends the majority of its supplemental material dismantling various technical arguments put forth by the FBI. But the core of the filing itself rests on the limits of the FBI’s request and the limitations of the All Writs Act in general.

Some legal highlights

Here are what we read as some of the most important highlights of their reply (their full reply is embedded in the bottom of this post.):

Page 1, line 18

Thus, according to the government, short of kidnapping or breaking an express law, the courts can order private parties to do virtually anything the Justice Department and FBI can dream up. The Founders would be appalled.

Page 2, line 18:

It has become crystal clear that this case is not about a “modest” order and a “single iPhone,” Opp. 1, as the FBI Director himself admitted when testifying before Congress two weeks ago.

Page 15, line 18:

Forcing Apple to create new software that degrades its security features is unprecedented and unlike any burden ever imposed under the All Writs Act. The government’s assertion that the phone companies in Mountain Bell and In re Application of the U.S. for an Order Authorizing the Installation of a Pen Register or Touch-Tone Decoder and a Terminating Trap (Penn Bell), 610 F.2d 1148 (3d. Cir. 1979), were conscripted to “write” code, akin to the request here (Opp. 18–19), mischaracterizes the actual assistance required in those cases. The government seizes on the word “programmed” in those cases and superficially equates it to the process of creating new software. Opp. 18–19. But the “programming” in those cases—back in 1979 and 1980—consisted of a “technician” using a “teletypewriter” in Mountain Bell (Dkt. 149-1 [Wilkison Decl.] Ex. 6 at 7), and “t[ook] less than one minute”

Page 16, line 10:

This case stands light years from Mountain Bell. The government seeks to commandeer Apple to design, create, test, and validate a new operating system that does not exist, and that Apple believes—with overwhelming support from the technology community and security experts—is too dangerous to create.

Page 17, footnotes:

The government accuses Apple of developing the passcode-based encryption features at issue in this case for marketing purposes. E.g., Opp. 1, 22. This is a reckless and unfounded allegation. Since passcode-based encryption was first introduced in October 2014, Apple has produced 627 separate ads in the United States and approximately 1,793 ads worldwide. These ads have generated 99 and 253 billion impressions, respectively. Not a single one advertised or promoted the ability of Apple’s software to block law enforcement requests for access to the contents of Apple devices.

The idea that Apple enhances its security to confound law enforcement is nonsense. Apple’s “chain of trust” process—which follows accepted industry best practices—is designed to secure its mobile platform against the never-ending threat from hackers and cyber-criminals.

Page 18, line 10:

Here, if Apple is forced to create software in this case, other law enforcement agencies will seek similar orders to help them hack thousands of other phones, as FBI Director Comey confirmed when he said he would “of course” use the All Writs Act to “return to the courts in future cases to demand that Apple and other private companies assist . . . in unlocking secure devices.”




Apple is set to head to court next week and we’ll bring you updates then. As of now, the company has garnered support in the form of a ruling by Judge Orenstein of New York in a similar (though different) iPhone unlocking case. Orenstein also believes that the All Writs Act is too broad, and needs hard limits when applied. A host of other tech companies have backed Apple’s play and even former heads of the NSA and Homeland Security have stepped in on Apple’s side.

Many of those experts – like former U.S. counterterrorism official and presidential security advisor Richard A. Clarke — note that the FBI could very likely simply reach out to the NSA for assistance in unlocking the phone. But it has not, which makes this more about setting a precedent than it does getting into an iPhone which the FBI even admits may not hold anything relevant.

Comments

Popular posts from this blog

Hong Kong Lunar New Year Celebrations Erupt in Violence as Police Clear Food Stalls

Hong Kong's Lunar New Year celebrations have descended into chaos as police leared illegal food stalls set up on a busy junction for Lunar New Year celebrations, leaving dozens injured or arrested. Riot police used batons and pepper spray and fired warning shots into the air early on Tuesday after authorities tried to move illegal street vendors from a district in the city. Protesters hurled bricks at police as scuffles broke out, while other demonstrators set fire to rubbish bins in the streets of Mong Kok, a gritty neighbourhood across the harbour from the heart of the Asian financial centre. A police statement said that three men aged 27 to 35 were arrested for assaulting a police officer and obstructing police, while another three police officers received hospital treatment. Broadcaster RTHK said later that 24 people had been arrested. The scuffles broke out after police moved in to clear "hawkers", or illegal vendors who sell local delicacies, trinkets and ...

Trump Allowed Military To Set Up The Number of Troops in Afghanistan

The President of the United States, Donald Trump, has given the Secretary of Defense, Jim Mattis, an authority to to set troops deployed in Afghanistan. As reported by Reuters, the decision also allowed an opportunity for the secretary to increase the number of personnel in Afghanistan that are currently 8,400. The decision was taken shortly after Mattis warned Congress that the Afganistan troops which is backed by U.S. could not defeat the Taliban after 15 years of fighting. "We never win in Afghanistan. We will fix this as soon as possible," said Mattis said the Senate Armed Forces Committee, Tuesday (13/6), as quoted Reuters. Earlier, the General of U.S. Army, John Nicholson, also said that he needs "a few thousand" soldiers deployed in Afghanistan, as additional. Some officials said, U.S. estimated around 3,000-5,000 soldiers was needed for the air force crew and helped training the Afghanistan troops. However, other officials question the advantag...

Kit Harington Confirms He Filmed New Game of Thrones Scenes, But Only As A Dead Body

We're hardly waiting for it, Game of Thrones. We all know Jon Snow will be back in some shape or form this season, and at this point we're ready for the show to just come back already and stop teasing us. Enough with the cagey interviews, the oh-look-everyone-is-dead promos, and all the other taunting we've had to put up with for the past year. Just give us our beautiful show and let us be shocked in peace! Kit Harington, the portrayer of the dead guy in question, is the one who's confusing us this time. Instead of just saying "you'll have to wait and see," or some other kind of spoiler-free stock answer about future plot points (like he gave last time he was asked), Harington is now just feeding us lies. In an interview with Time Out London that was supposed to be about the West End play he's in, Harington claimed he's done with Game of Thrones. "Look, I'm not in the show anymore. I'm definitely not in the new series,...