We Now Return You To Your Regularly Scheduled Cyberpunk Dystopia

Comment

Image Credits:

Jon Evans

Contributor

Jon Evans is the CTO of the engineering consultancy HappyFunCorp; the award-winning author of six novels, one graphic novel, and a book of travel writing; and TechCrunch’s weekend columnist since 2010.

More posts from Jon Evans

Apple will lose this battle with the US government. Maybe not this year, or next, but soon enough, and for the rest of our lives. It is folly to pretend otherwise. Most ordinary people, and most powerful people, don’t care about abstruse theoretical arguments against back doors and weakened security. They care about—or want to exploit—the raw visceral fear of terrorist violence.

This isn’t a case about a single phone. Rather, as Amy Davidson says in the New Yorker:

the government is attempting to circumvent the constitutionally serious character of the many questions about encryption and privacy. It is demanding, in effect, that the courts build a back door to the back-door debate.

Or as Julian Sanchez puts it in Time,

If the FBI wins, it could open the door to massive surveillance … The high stakes of Apple’s resistance to the FBI’s order: not whether the federal government can read one dead terrorism suspect’s phone, but whether technology companies can be conscripted to undermine global trust in our computing devices. That’s a staggeringly high price to pay for any investigation.

Of course Apple should win. I admire what Tim Cook is doing immensely. But in the long run they will lose. If they’re victorious in the courts–IANAL and make no prediction–then Congress will come after them the day after the next major terrorist attack hits America. (And there will be another major terrorist attack on America, eventually. Sorry. It will probably involve drones.)

Anyone who thinks Congress won’t bludgeon the tech industry into compliance when that happens doesn’t remember what America was like from September 12, 2001, all the way through the catastrophic invasion of Iraq and beyond. Imagine if one of the men who brought down the World Trade Center had left a locked phone behind.

Even today, opinion polls make it very clear that most Americans favor surveillance and intrusive government over security and encryption: “56 percent of Americans favor and 28 percent oppose the ability of the government to conduct surveillance on Internet communications without needing to get a warrant. That includes such surveillance on U.S. citizens,” to quote the AP. Again, that’s warrantless surveillance. Fulfilling a warrant to get information from a known terrorist’s phone? Forget about it.

https://twitter.com/mims/status/700455901778599942

(This goes for people who should know better, too. In the aftermath of the Tsarnaev brothers’ attack on Boston, Farhad Manjoo, now of the New York Times, wrote a piece entitled “We Need More Cameras, And We Need Them Now: The Case For Surveillance.” He went on: “Abuses and slippery-slope fears could be contained by regulations that circumscribe how the government can use footage obtained from security cameras.” Oh, regulations. Whew. Problem solved!)

The government knows all this. That’s almost certainly why they’ve chosen this as a test case. Not because the contents of the phone are likely to be valuable. On the contrary. Those contents are (very likely) unavailable only because a government employee changed its password after the attacks. Even so, its call and text metadata have already been strip-mined, and found useless.

Rather, this appears to be part of a deliberate — and, as I’ve written before, completely pointless, futile, and self-destructive — strategy to undermine encryption. “This is one of the worst set of facts possible for Apple. That’s why the government picked this case,” to quote University of Miami professor Michael Froomkin. Bloomberg reports:

In a secret meeting convened by the White House around Thanksgiving, senior national security officials ordered agencies across the U.S. government to find ways to counter encryption software and gain access to the most heavily protected user data on the most secure consumer devices

As a result, Apple itself faces a paralyzing paradox:

Apple cannot simultaneously treat itself (compelled by governments) as a threat, maintain its iron-fisted control of all software that runs on iOS devices, and protect its users’ security. Pick any two: you can’t have all three. If Apple itself can be compelled to be the enemy, right down to the firmware, then only third-party software can secure iOS users … but Apple forbids sideloading, tries to prevent jailbreaking and bar custom firmware, and gatekeeps all third-party software, so it could conceivably be compelled to forbid–or corrupt–any third-party encryption tools.

“If Apple, the government, or anyone else has master access to your device, to a service, or communications, that is a security flaw,” to quote the Securosis blog. If you maintain absolute control over a platform, then you are a security risk, whether you like it or not.

An excellent David Schuetz technical blog post summarizes this problem:

What is true, though, is that once Apple has built the capability, it would be trivial to re-apply it to any future device, and they could quickly find themselves needing a team to unlock devices for law enforcement from all around the world … [and even if this attack is mitigated] a normal OS update to an unlocked phone can change this at any time, restoring the attack for future use.

And so, as Nicholas Weaver puts it on Lawfare:

Let us assume that the FBI wins in court and gains this precedent. This does indeed solve the “going dark” problem as now the FBI can go to Apple, Cisco, Microsoft, or Google with a warrant and say “push out an update to this target” … Almost immediately, the NSA is going to secretly request the same authority through the Foreign Intelligence Surveillance Court … How many honestly believe the FISC wouldn’t rule in the NSA’s favor after the FBI succeeds in getting the authority? … Every other foreign law enforcement and intelligence agency would demand the same access, pointing to the same precedent

Hey, at least there’s one bright side here:

https://twitter.com/JZdziarski/status/700829160403505152

But, to quote Securosis again:

The FBI, DOJ, and others are debating if secure products and services should be legal. They hide this in language around warrants and lawful access, and scream about terrorists and child pornographers. What they don’t say, what they never admit, is that it is physically impossible to build in back doors for law enforcement without creating security vulnerabilities.

…Seems like a good time to drop in this old perennial.

The godfather of cyberpunk himself once said:

I submit that a variant of the same applies here; that people who are more frightened of terrorism than of grinding bureaucratic authoritarian oppression have not yet developed a fully adult concept of scary either. But from a results-oriented point of view, that doesn’t matter. What matters is that we live in a world in which people respond to the most visceral threats, not the most dangerous ones.

That disastrously bad threat modeling is, in a nutshell, why Apple–and, by extension, the tech industry–will ultimately lose its / our battle against government intrusion, surveillance, and compromised security. To protect ourselves, we will need better solutions, ones that do not require the centralization of control in any collective, corporate, or government entity. No matter how well-intentioned they may be.

More TechCrunch

Since he was very young, Bar Mor knew that he would inevitably do something with real estate. His family was involved in all types of real estate projects, from ground-up…

Agora raises $34B Series B to keep building the Carta for real estate

Poshmark, the social commerce site that lets people buy and sell new and used items to each other, launched a paid marketing tool on Thursday, giving sellers the ability to…

Poshmark’s ‘Promoted Closet’ tool lets sellers boost all their listings at once

Google is launching a Gemini add-on for educational institutes through Google Workspace.

Google adds Gemini to its Education suite

More money for the generative AI boom: Y Combinator-backed developer infrastructure startup Recall.ai announced Thursday it’s raised a $10 million Series A funding round, bringing its total raised to over $12M.…

YC-backed Recall.ai gets $10M Series A to help companies use virtual meeting data

Engineers Adam Keating and Jeremy Andrews were tired of using spreadsheets and screenshots to collab with teammates — so they launched a startup, Colab, to build a better way. The…

Colab’s collaborative tools for engineers line up $21M in new funding

Reddit announced on Wednesday that it is reintroducing its awards system after shutting down the program last year. The company said that most of the mechanisms related to awards will…

Reddit reintroduces its awards system

Sigma Computing, a startup building a range of data analytics and business intelligence tools, has raised $200 million in a fresh VC round.

Sigma is building a suite of collaborative data analytics tools

European Union enforcers of the bloc’s online governance regime, the Digital Services Act (DSA), said Thursday they’re closely monitoring disinformation campaigns on the Elon Musk-owned social network X (formerly Twitter)…

EU ‘closely’ monitoring X in wake of Fico shooting as DSA disinfo probe rumbles on

Wind is the largest source of renewable energy in the U.S., according to the U.S. Energy Information Administration, but wind farms come with an environmental cost as wind turbines can…

Spoor uses AI to save birds from wind turbines

The key to taking on legacy players in the financial technology industry may be to go where they have not gone before. That’s what Chicago-based Aeropay is doing. The provider…

Cannabis and gaming payments startup Aeropay is now offering an alternative to Mastercard and Visa

Facebook and Instagram are under formal investigation in the European Union over child protection concerns, the Commission announced Thursday. The proceedings follow a raft of requests for information to parent…

EU opens child safety probes of Facebook and Instagram, citing addictive design concerns

Bedrock Materials is developing a new type of sodium-ion battery, which promises to be dramatically cheaper than lithium-ion.

Forget EVs: Why Bedrock Materials is targeting gas-powered cars for its first sodium-ion batteries

Private equity giant Thoma Bravo has announced that its security information and event management (SIEM) company LogRhythm will be merging with Exabeam, a rival cybersecurity company backed by the likes…

Thoma Bravo’s LogRhythm merges with Exabeam in more cybersecurity consolidation

Consumer protection groups around the European Union have filed coordinated complaints against Temu, accusing the Chinese-owned ultra low-cost e-commerce platform of a raft of breaches related to the bloc’s Digital…

Temu accused of breaching EU’s DSA in bundle of consumer complaints

Here are quick hits of the biggest news from the keynote as they are announced.

Google I/O 2024: Here’s everything Google just announced

The AI industry moves faster than the rest of the technology sector, which means it outpaces the federal government by several orders of magnitude.

Senate study proposes ‘at least’ $32B yearly for AI programs

The FBI along with a coalition of international law enforcement agencies seized the notorious cybercrime forum BreachForums on Wednesday.  For years, BreachForums has been a popular English-language forum for hackers…

FBI seizes hacking forum BreachForums — again

The announcement signifies a significant shake-up in the streaming giant’s advertising approach.

Netflix to take on Google and Amazon by building its own ad server

It’s tough to say that a $100 billion business finds itself at a critical juncture, but that’s the case with Amazon Web Services, the cloud arm of Amazon, and the…

Matt Garman taking over as CEO with AWS at crossroads

Back in February, Google paused its AI-powered chatbot Gemini’s ability to generate images of people after users complained of historical inaccuracies. Told to depict “a Roman legion,” for example, Gemini would show…

Google still hasn’t fixed Gemini’s biased image generator

A feature Google demoed at its I/O confab yesterday, using its generative AI technology to scan voice calls in real time for conversational patterns associated with financial scams, has sent…

Google’s call-scanning AI could dial up censorship by default, privacy experts warn

Google’s going all in on AI — and it wants you to know it. During the company’s keynote at its I/O developer conference on Tuesday, Google mentioned “AI” more than…

The top AI announcements from Google I/O

Uber is taking a shuttle product it developed for commuters in India and Egypt and converting it for an American audience. The ride-hail and delivery giant announced Wednesday at its…

Uber has a new way to solve the concert traffic problem

Google is preparing to launch a new system to help address the problem of malware on Android. Its new live threat detection service leverages Google Play Protect’s on-device AI to…

Google takes aim at Android malware with an AI-powered live threat detection service

Users will be able to access the AR content by first searching for a location in Google Maps.

Google Maps is getting geospatial AR content later this year

The heat pump startup unveiled its first products and revealed details about performance, pricing and availability.

Quilt heat pump sports sleek design from veterans of Apple, Tesla and Nest

The space is available from the launcher and can be locked as a second layer of authentication.

Google’s new Private Space feature is like Incognito Mode for Android

Gemini, the company’s family of generative AI models, will enhance the smart TV operating system so it can generate descriptions for movies and TV shows.

Google TV to launch AI-generated movie descriptions

When triggered, the AI-powered feature will automatically lock the device down.

Android’s new Theft Detection Lock helps deter smartphone snatch and grabs

The company said it is increasing the on-device capability of its Google Play Protect system to detect fraudulent apps trying to breach sensitive permissions.

Google adds live threat detection and screen-sharing protection to Android