Why Apple Is Fighting Not To Unlock iPhones For The Government

Comment

Image Credits: Justin Sullivan

Yesterday, the FBI filed an order compelling Apple to unlock an iPhone used by Syed Farook, one of the attackers in the San Bernardino shooting incident late last year which left 14 people dead.

Shortly thereafter, Apple CEO Tim Cook published a bold statement indicating that Apple planned to fight the order. Apple was joined by the Electronic Frontier Foundation, which said it would aid  in the fight.

We’ve already covered the nuts and bolts of the request, as well as Cook’s response and the White House’s response to that response. You can read those for a primer. There has been a lot of ink spilled and there will likely be a lot more, but there are a few questions that I think deserve a closer look — and there is a broader point to be made that will likely get obfuscated by people pursuing technical details rather than implications.

This current order is all about Apple refusing to unlock a single device for the FBI. It is not to be confused with the related, but bigger, battle over the government forcing tech companies to weaken their encryption by introducing a ‘secret’ key that only they have.

The key question of the day is this: Why is Apple fighting not to unlock a terrorist’s iPhone, instead of waiting to fight their big battle over encryption back doors? Let’s dissect it.

The Ask

The government wants Apple to create a ‘one-off’ version of iOS that it could install on this device with three key changes:

  1. Disable or bypass the auto-erase function of iOS. This erases your phone if too many wrong passwords are input. A commonly enabled setting on corporate phones — which the iPhone 5c owned by the government agency for which Farook worked — is.
  2. Remove the delay on password inputs so that the FBI can ‘guess’ the passcode on the phone quicker, without it locking them out for minutes or hours, which is what iOS does to stop any random thief from doing this kind of thing. The inputs would be lowered to around 80 milliseconds, which would allow the password to be guessed in under an hour if it were 4 digits and significantly longer if it were more.
  3. Allow the FBI to submit passcode via the physical port on the phone, or a wireless protocol like Bluetooth or WiFi.

The final condition there is the scariest, and the one that Apple objects to the most. Don’t get me wrong. Cook’s letter clearly states that Apple is opposed to all of the conditions, but that last one is different. It is asking Apple to add a vulnerability to its software and devices, not just ‘remove’ a roadblock.

There is a possibility that Apple could drag this out with the FBI for a very long time, arguing about reasonable demands or the costs of this to Apple (which could be prohibitive as signing firmware is an incredibly non-trivial process). One outcome could be that Apple grinds down the asks until they just disable the auto-erase function, which is an operating system option that already exists, and leave the rest of it to the FBI to figure out.

But that final ask is what the entire objection hinges on. The All Writs Act, passed in 1789 (yes, a 200-year-old law,) is being used to force Apple to comply. The fact that the act is being used to try to make Apple do a lot of work to modify iOS and to add functionality that would significantly weaken its products and their security will likely be at the core of Apple’s defense when this gets to the courts. It’s a huge ballooning of the scope of the AWA, and it sets a precedent for allowing the government to force Apple or other companies to modify their systems to allow access to your private data.

And herein lies the rub. There has been some chatter about whether these kinds of changes would even be possible with Apple’s newer devices. Those devices come equipped with Apple’s proprietary Secure Enclave, a portion of the core processing chip where private encryption keys are stored and used to secure data and to enable features like Touch ID. Apple says that the things that the FBI is asking for are also possible on newer devices with the Secure Enclave. The technical solutions to the asks would be different (no specifics were provided) than they are on the iPhone 5c (and other older iPhones), but not impossible.

If I had to bet, Apple is probably working double time to lock it down even tighter. Its reply to the next order of this type is likely to be two words long. You pick the two.

The point is that the FBI is asking Apple to crack its own safe. It doesn’t matter how good the locks are if you modify them to be weak after installing them. And once the precedent is set then the opportunity is there for similar requests to be made of all billion or so active iOS devices. Hence the importance of this fight for Apple.

This is why the debate around this particular order should not focus overmuch on the technical aspects — but on the fact that the government would be weakening the security of a private company’s product, potentially impacting the civil liberties of American citizens and foreign nationals worldwide that use those products.

Reasonable Compliance

Apple has complied with government information requests for years, and likely did so in this case. It is technically possible, for instance, to retrieve data from iCloud backups of devices. Farook’s device was last backed up in October 19th of 2015, which means that the FBI already has access to that data. The agency can use other avenues (and likely has) to gather data about calls by issuing information requests to cell carriers, for instance.

“From my crude testing in the past on an iPhone 5, a four digit passcode should be possible to brute force in less than an hour. A six digit passcode should be possible to brute force in less than a day,” says Will Strafach, ex-jailbreaker and CEO of mobile security firm Sudo Security Group. “I have not tested times for passcodes with numbers, letters or symbols, but it is fairly easy to understand why it would take substantially longer. With numeric passcodes, it’s 10,000 possibilities if four digit and 1,000,000 possibilities if six digit. But introducing symbols and letters drastically will increase the possibilities, considering you could even use multiple keyboards (for example: an English phrase, an Arabic phrase, and then. some numbers and symbols).”

There are also already tools that the law uses to access passcode-locked iPhones. Many of these tools are bundles of programs that use jailbreak exploits to gain access to the iPhone’s memory, and then a suite of tools to access and analyze the data. These tools are then branded with a security firm’s rubber stamp and sold to law enforcement. When the exploits are repaired by iOS updates or patches, the tools become ineffective.

https://twitter.com/JZdziarski/status/700085957643657220

The idea that a government-issued phone that the FBI says Farook used to talk to co-workers would be used to openly facilitate an act of terrorism is somewhat far-fetched.

Instead, it is being used as a crowbar that essentially forces Apple to oppose the order. Regardless of the outcome, it’s likely that this case will be used to bolster the call for Congressional legislation that forces American companies to weaken their encryption by installing a ‘back door’ for the government.

Which brings us back to a question of philosophy.

Two Lines In the Sand

There are other battles to come in this fight. Encryption of data on iPhones, for instance, is another whole technical gambit, one that Apple has made great efforts to remove from the equation by making it impossible for them to decrypt customer data even if requests were made.

That would require that Apple modify its software and firmware on its devices to enable governmental agencies to bypass encryption. Once that method exists, there is absolutely, positively, no way for it to be kept solely for the use of the government. It also raises the question of how any international user of an iPhone would ever feel safe — especially given what we now know about the government’s electronic surveillance capabilities and its willingness to use them.

Apple is choosing to fight this battle now, rather than later. Cook’s letter draws a line out on the beach, where we’re still talking about allowing brute force cracking of iPhone passwords — rather than right up against the fortress, where we will be fighting for our right to secure encryption.

It’s a gambit with risks, for sure, outlined well by Ben Thompson here. If Apple loses this battle because the court sees a request for a terrorist’s iPhone to be unlocked to be reasonable, then it is going to be that much harder to fight the encryption battle later. But Apple sees this as the line — the modification of one of its products to weaken its security. To Apple, any back door is still a back door, and an unacceptable condition. It doesn’t matter to Apple whether the fight is over a passcode or over encryption. Like I said, it’s a risk, but it’s one that Apple feels it must take.

A Seminal Case

All of the various outcomes of this situation make alterations to the playing field.

The government gets Apple to add a weakness to a product? A precedent for weakening all security.

Apple fighting back successfully? A possible precedent for protecting the users of all smartphones iOS, Android and otherwise.

A potential win in the courts? Precedent to protect security, but also possibly to force Congress to ruin American encryption.

Screen Shot 2016-02-17 at 2.24.27 PM

Apple is taking a bold stance here, but is standing somewhat lonely at the moment among its direct peers. Jan Koum of WhatsApp — who has had his own run-ins with information requests — posted in support of Cook’s letter. And the EFF and the ACLU are both taking Apple’s side as well. Just before this article was published, Google CEO Sundar Pichai tweeted, supporting Apple’s position.

Other tech giants like Amazon, Facebook and Microsoft have yet to weigh in — though they have potentially just as much to lose or gain. Whether this is because they have facilitated these requests without a fight, who knows? For Apple’s part, this isn’t the first time that Cook has taken a strong stance on security and privacy, his speech last year summed up how Apple has used it as a differentiation point before and since.

This is a seminal battle between the biggest tech company on the planet and the most powerful government on the planet. This is why it’s important that we don’t get mired down in technicalities. For Apple, and for us, this is not a question of can we, but a question of should we. A question that will have implications for everyone from journalists to heads of state to private citizens of all countries.

Article updated to correctly identify the phone’s owner, Syed Farook.

Apple vs FBI

More TechCrunch

Since he was very young, Bar Mor knew that he would inevitably do something with real estate. His family was involved in all types of real estate projects, from ground-up…

Agora raises $34B Series B to keep building the Carta for real estate

Poshmark, the social commerce site that lets people buy and sell new and used items to each other, launched a paid marketing tool on Thursday, giving sellers the ability to…

Poshmark’s ‘Promoted Closet’ tool lets sellers boost all their listings at once

Google is launching a Gemini add-on for educational institutes through Google Workspace.

Google adds Gemini to its Education suite

More money for the generative AI boom: Y Combinator-backed developer infrastructure startup Recall.ai announced Thursday it’s raised a $10 million Series A funding round, bringing its total raised to over $12M.…

YC-backed Recall.ai gets $10M Series A to help companies use virtual meeting data

Engineers Adam Keating and Jeremy Andrews were tired of using spreadsheets and screenshots to collab with teammates — so they launched a startup, Colab, to build a better way. The…

Colab’s collaborative tools for engineers line up $21M in new funding

Reddit announced on Wednesday that it is reintroducing its awards system after shutting down the program last year. The company said that most of the mechanisms related to awards will…

Reddit reintroduces its awards system

Sigma Computing, a startup building a range of data analytics and business intelligence tools, has raised $200 million in a fresh VC round.

Sigma is building a suite of collaborative data analytics tools

European Union enforcers of the bloc’s online governance regime, the Digital Services Act (DSA), said Thursday they’re closely monitoring disinformation campaigns on the Elon Musk-owned social network X (formerly Twitter)…

EU ‘closely’ monitoring X in wake of Fico shooting as DSA disinfo probe rumbles on

Wind is the largest source of renewable energy in the U.S., according to the U.S. Energy Information Administration, but wind farms come with an environmental cost as wind turbines can…

Spoor uses AI to save birds from wind turbines

The key to taking on legacy players in the financial technology industry may be to go where they have not gone before. That’s what Chicago-based Aeropay is doing. The provider…

Cannabis and gaming payments startup Aeropay is now offering an alternative to Mastercard and Visa

Facebook and Instagram are under formal investigation in the European Union over child protection concerns, the Commission announced Thursday. The proceedings follow a raft of requests for information to parent…

EU opens child safety probes of Facebook and Instagram, citing addictive design concerns

Bedrock Materials is developing a new type of sodium-ion battery, which promises to be dramatically cheaper than lithium-ion.

Forget EVs: Why Bedrock Materials is targeting gas-powered cars for its first sodium-ion batteries

Private equity giant Thoma Bravo has announced that its security information and event management (SIEM) company LogRhythm will be merging with Exabeam, a rival cybersecurity company backed by the likes…

Thoma Bravo’s LogRhythm merges with Exabeam in more cybersecurity consolidation

Consumer protection groups around the European Union have filed coordinated complaints against Temu, accusing the Chinese-owned ultra low-cost e-commerce platform of a raft of breaches related to the bloc’s Digital…

Temu accused of breaching EU’s DSA in bundle of consumer complaints

Here are quick hits of the biggest news from the keynote as they are announced.

Google I/O 2024: Here’s everything Google just announced

The AI industry moves faster than the rest of the technology sector, which means it outpaces the federal government by several orders of magnitude.

Senate study proposes ‘at least’ $32B yearly for AI programs

The FBI along with a coalition of international law enforcement agencies seized the notorious cybercrime forum BreachForums on Wednesday.  For years, BreachForums has been a popular English-language forum for hackers…

FBI seizes hacking forum BreachForums — again

The announcement signifies a significant shake-up in the streaming giant’s advertising approach.

Netflix to take on Google and Amazon by building its own ad server

It’s tough to say that a $100 billion business finds itself at a critical juncture, but that’s the case with Amazon Web Services, the cloud arm of Amazon, and the…

Matt Garman taking over as CEO with AWS at crossroads

Back in February, Google paused its AI-powered chatbot Gemini’s ability to generate images of people after users complained of historical inaccuracies. Told to depict “a Roman legion,” for example, Gemini would show…

Google still hasn’t fixed Gemini’s biased image generator

A feature Google demoed at its I/O confab yesterday, using its generative AI technology to scan voice calls in real time for conversational patterns associated with financial scams, has sent…

Google’s call-scanning AI could dial up censorship by default, privacy experts warn

Google’s going all in on AI — and it wants you to know it. During the company’s keynote at its I/O developer conference on Tuesday, Google mentioned “AI” more than…

The top AI announcements from Google I/O

Uber is taking a shuttle product it developed for commuters in India and Egypt and converting it for an American audience. The ride-hail and delivery giant announced Wednesday at its…

Uber has a new way to solve the concert traffic problem

Google is preparing to launch a new system to help address the problem of malware on Android. Its new live threat detection service leverages Google Play Protect’s on-device AI to…

Google takes aim at Android malware with an AI-powered live threat detection service

Users will be able to access the AR content by first searching for a location in Google Maps.

Google Maps is getting geospatial AR content later this year

The heat pump startup unveiled its first products and revealed details about performance, pricing and availability.

Quilt heat pump sports sleek design from veterans of Apple, Tesla and Nest

The space is available from the launcher and can be locked as a second layer of authentication.

Google’s new Private Space feature is like Incognito Mode for Android

Gemini, the company’s family of generative AI models, will enhance the smart TV operating system so it can generate descriptions for movies and TV shows.

Google TV to launch AI-generated movie descriptions

When triggered, the AI-powered feature will automatically lock the device down.

Android’s new Theft Detection Lock helps deter smartphone snatch and grabs

The company said it is increasing the on-device capability of its Google Play Protect system to detect fraudulent apps trying to breach sensitive permissions.

Google adds live threat detection and screen-sharing protection to Android