Privacy vs Security at Heart of Apple Phone Decrypt Order

JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 80 C   %# , #&')*)-0-(0%()(C   ((((((((((((((((((((((((((((((((((((((((((((((((((( " }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?TY@KʃھSģ33I~Q4^彽f#O)OO.FN:E/d?iㅡ2=*Y.??M-)H;0'UOr>fO7Qzb*,[GܷN4cZ`L}|q[J,kxc~N1i[{V}?:d'vj7ry[wECE} >Х?"ԫ{GUva迭4I \j? _EE}d?G*+i){z DŽH- œ6ʻsy4\]"Rۏ/XGOv K&,_Cԟ߁4rzޮ<,OZ|-{D/zvD>̟sqqbQo |TD6{פ/q]c)O,s5?NϰjQM=blצE^Zd>Hd4Y 70H9ߕ 5i>hdosKQŷ#;1hyy?j)-f'>[&A[Y"1t]8t&tb0>lGRYsc)~h:[A~aty8?ƁlGVOWh p0xQf<PqܟI 5?{AX:ݬ]׭hQ?*,Kg )@OOU7L!?5m}W<ɛ$G)FDzd.ؚj6QU7m}{iWGou_zGv́MWV8Go?ER~2.qWGa3W$o'4sG(\qJ<5&9UdⓂ0hAs.LȩXm4!\r*Azʕbܲ<7o\"xnoViwgJ.c?in(?¶qn( x~ӻK㬿jr)d2Ff;JtYwG?3ZE; 3a~NX?(4s4hz;Oꟙؤh `~U2V ?UK,e>/O4iV]`bm-TMviR5 {kh(QH'32j`(_S+p(6)L14Jk &2i84RqN<VSpԌ``GfFi4ҸZ=" DZ~1@61M(Ry9@ 0h }dQp F;<)fsҍu8o4liǸiH:Pqp84n&:ii}i٠c>3Fs@ݚQLJ $Ji0P Qy a4zRRMMz5"E(" EP$4ԙZ]޴hѾ ̚Hex:\Kq,o]rAo}ᾓr 4XtK-zgSD\cs?IbOaF>+ɽ%:9U,z_%ooC?ًЭ}I;gv`ܓ=L^%Ԇjfz/k r&ejWCKvluGԖ\^{זb}&(mBҥs6fqY v[@B94UۨU+hϷsQx7W2"$?s :pƜ 5ˏ肺OI/n@V\[YA;ecꤒ]ہR0E:Ծ74iJLpEzaft3oEʯ9Avs1Rw v:#Z/S\[>{ƪK8kuUvk:p-tϲ\_?Z~9Nd^?:F\!<86~tr@y:]Oθ#~t4{G}w{n:̟Ц}u?WlF9 ]O)>j:E} ^#6w֛ߝrk1!ǞkTD'9NkDLS_\5/$_xS6ÔFlwU˔a@OV:SG؟ʛ\P ,tgZS6\>\,olGݛi>y1ިU5c qNcbqZ8)*&kl :? C7F(~ѬOAiL&dѨat,<tqGSLM /֣o\~Iڣ2JW*ƐȌS_y@ 4\,5|Kz'!`TڎygFݓWXsR;!-H£mT=#9Cc?K  z "x*ScunY1UBX48C/juD?ۺңmsUn?¯}v?g4{ǧc9m\b)|֨o/RvG~TY ;gTsOO[ R.xQg݆jᘏyo>OxG.xq(1.vI^5h+Z^r?U*2}XS:3@ꎕz8"?꘺=nƟ,9s.O Y>u\gjEf#d`4r>.1ԇs@Pﺻ&%<*82K 2j3}[tF#6q|pG֣yoNA41@ROپ̎Kx45 YТV ͇28A{rӘG"yʺ+uԘ#+O% 2*~4zAsRdDz!Ze+Pլ4Aӭ{ۚh#k OcfߓKZfk[V_ޔ4}v8gc?#L6y&f+(܃Zf״G4 Knp) V?4O+#4jPz)JֿmOW)? P-B9)~vUS/00~GںulE|XڎF?"093zFڐ] 1"<X\EuW~a~*,h£|S7d|9m~}-(# (ȟbiSY ,eL?gs qF){Ic~=z-ZIg.EĚ{(#֓Z~z F?Z>xx}GVocdg*)su #DxhuOO"/㬺}f_&4KO!!E~[Pn7O5MD%,I}X$!cbChl{ٯ>+pZ7ۭ7V`r~kÉFc%ffabX0--|9w,1mu WWX U5[+`|ۈ?NO_%j_|A2E`r?6\ƥ cYCQ!RTFzwg~5 #1$tp?DWϾ6ϮxOvӬیfV?A׎^FaAG*dѥמSI\#9=ѱESR]DI[T=AZwcږvbQE;QEIQE-; ((QEQRHHECCW5-MHECC*e* A"y=#H2{+6Z~#txҤJ GUEiF$)+\/AWD `H _#GSZ&`rCYwяoX$뾍{sZׄ`[zEbMiNlZ`TSCE4ri1@o@4cU`RBR>cLE4iFz4Ҟk ElҒ(Fr=L6Te<>^3jlU[f-I0$ݚi4ڐi 1G k)9NE!u5)5"8j6`I.sNK`!MjjB3! ?kSvk&, 毂h@PF=(zLM(5P\ sK5\,L -ԻwQ5zra-R>Df< iu7ak5Î4'Scwpj_u9% 3~ڽkK𝍔)1HQc袓[:G]^]Is,o|\)n=̒,K|^om 5U Q;Ǔ|% ֶcIE~cɰPz>6vG]|)Mkվɶ?C?7^붗h1Y*k2gh1 R~M\ޟ/}m4Hsgt4i"2V; ؙVꎢD?U5J{4^VҖ{HZٲ?o丯8~.%ڏ_[V@5Guw04R֥ʼX%"?UUKHʪ:8k}4]p$l+ӧơ{#r<~Q_[HW|?* 6ثn*H$NxcW|Id6V/R=@=5~%NOO}z%ii =? ʷ O!7لI5V1x3ad­CT6vvο !5E-'SXǃ}dbNm4D% ]cX[D:D)el~5rRrRuEsUTb#x?nHE>f+ngwqNuf[[Ь*ݜKxzi8FF&J;[?Q~Up_ލTw/QE(aJ))EP IJi*FQE ( (S6j&-563־n%w_μg0#E_\Zv\t5ŘdK[Id9+e5cr3{+c-rg&/<ۂO"~lƀnFkZ<KDtj[nbgA9h(PXP4V#G9gqTA*8酳Lϥ" BqҚ\ sH g5 9#KSXL`s@7IƋ3I`c) qE~M(9⟻.cQsC74\5(Lf["\Әg(J(F 6M_ݎfsRnAcM,)04f zyhYW?B)p:_IŋG["?{^BZi GO-8nډJ!R■-R (((( ( (( ))h %)04ƧcSBcn!XѬ84. եrY5vї^ ό.;wWW#qbo?ɦ]KhrSǥ{<5 D5(I= =c4"?<4??xxof4=w4 㗇Tp'ٚv 4rϰh{&Mw?t8S&i||Mau.Y`n:`8uơvCS|Gx+|~LС~<# Jrp>aG$%4+%%u!3q\⹫RWJ P,ƐW붘¡oWWasDde /QV|tM09$漣?Nf@ZN(?Xߝ=R]MS ¹C$3I!ѠΞTS' ,poΦRYb"R?+&ycҴ?Ӻ 3N\DzY%ΚX:W a(iAʱbOY94]û14N3ڋ]Ï(d}\ Mn\,to ?zӃJO\,iB|~njᾇ?zZ1<4}_t WL}M|`š,xRX.yiл$GgE} #L!Da#A,t^漟xHtOͳH4ycz+AJR#((((((((((((( %)450ғUKhG:ST%-{V,e#Hл3*W~#Q{{G='!;}k_'5Y-2lkqHsmg?:tZ+[$yX"$jY: nrv-{pz>֥rI~M=<|58No^5$/xe)z>D|hG:l`''O4{-m Dc:096Qudyݶ ZlFZ}y>f{YI]WT-69ndi\,W,rp< ~*Y'tmGo&1JizU{zÕ,CKɸvHĭח|[u856̦$m.W@=+ocv1TVz3H7k %QRIj|0}t?-wkrc^75vր)⪭YFvDE+7[Zzl_A!_:lsXuǸ'ˡ˷m?{-ߝ[Ji7Cv㪟ήҭhͷ:ғ\ u0Y[f*>NiE[RԆF:W,?*Vy/VY8P!6І5ECYR:;x"5_ʪFؼ5"µ; iZC qnxD--$Rmg^Hx_"ׇ%̛?9o{߆셞,|3~()åbQE ( ( ( ( ( ( ( ( ( ( ( ( (4֧S 5៴g4C Lj=vltegp@bqS ?G'<[{gϕnb_O5U9LQJ g mDT}c`O(UW]g<-XNҭi?EQݘQk+6k4Q{9'xO&eusdoA裰z);|6Ҽ `%[U]_qF)SR)`QEP&)hbRqF)REKDV=KJ/M:9Z2P܆?Z 3zB>ҽbqy^_%gYv0p.:xՑGPqkn}+~#z}&YUI]2d8iJsL$il{Tiel6׆<+ZTũ !@űSH:]4yEN LhW޴5gny4_grn)UVux ,eL#4ri1@H}+DxV͎k/؍C:].3U~Jko hgH ?lRRH)kQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@c}FI3hOgrk8b`xe1z&Vaѝ~Jxٵ)1B[e~@,h $= {1FkaēQmgRi+h/x}o@oP7`# {W`>k)p5d`-%Si( ZJ)RQH(WĿzُ55D5nT~1Kcg߫ăW"濳!>Y#~pWlQP#lxj?2`G^?ª_ovRJ?Iqό X'BOPGZ^b]r?v^:ƽ U9rqQ~Zz|i 5)5 =j\ B2hfii2)d⑆(M=H3phoJsmN^hM9^50dR{ e"yXt=)$O!< ɧpҖކ fycLW8H,3ÚW'fZr٧\k:l7@^ҵa\[UARR%Ę\A۫E2l?>S7{њ|aS3Fh 7S ΂ègލԹ3LFz9Í|Q/Omn_|hq'?p?(kw&[4y t}5Nk~K|9є]w#\>68lm_H~paaעmJ_ Kr5"CG2ƾH4^bX\_`|8&=n?y6;cVzWGd;N,G~Z3%iPr INVȨف:L CR6fV';6hfj@)L'ҁ֋6jD q4j J\7Gfr c7 PF H `<3[#h`E/ZP3H1ali0KhsќsQR;&988qȠ clUl^z҈2Q@ Uٶ Z=Mk!^84ȏ7{XrQE@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@!4a@ҟF_[dx<z&Q*:XnMy ~]ͷP2&ù_=\D9ctLݙH?z.#fR?SPTū #ڇٮe&c~lǺ J=HguDW,Jإ&ZaJ<{?|D !i෌+a.Z_}n</^^(<`Okl?҉> xķklGj9i0^GE˟¾E^ w!?*qա+mZUlF0S]x7ȝšxkN r=umKOh"j"%BR[xʩ8hҬY?P>k$wocӼ{gEo>(Ͻu|mУ<^8_y|[kv7AhːSoؗ9ZM9*79^EkI^9}kR:a[³{w?ۑڨ@T7K+9nOe'y֝88 dW\jFKd8jR?50ca7M \H5P8",9& ԰AFtrE5GqEX> jzits EiF'`iignC&‹{P5u1M:{ 9µw ۻWzihHCb;;Rx|FӷIK@L^H V3  3֔HÃS9G;`9?0IM0Lh⚶*9N.dZ6IX+;N (sAɣ,S{x4c_1=cc yޮyuf:kwQB>ptҽW2f='5BHZ((((((((((((((CҩyS:l늸zTF>q񍡇Y[Y@?A(PW G|wo{~h\ȟ|Yʣ]܊}bA6NkIu NJP ү>\ѨkXԢҲPNA>T4QvJ}!-$Z/Vz\qW'!?2-kD֌dPHpէ.GS*R]uH>+py+0 ( ( ( ( ( ( ( ( ( ( ( ( ( CKHzPTƦnU'ӱxg|=nsma|[I`޼\x&|R*Fl{⵻qv'jUv]7е٠#-Sҹҥ5-QVYOEMݨ>) W"oX[[?,d^u3S8+0Zj}4I$Ldަ_*}WR%ʜu]rfKOFh3JgBE+ )PݟN9%LZk`;hPM9g&i9C_aA ^+O}Śle+k .4 'JǰxZ ftF((Q@h(3Fh ( 3Ef((4QEQEf((N4;,F.3F00j#%hk4ۮ4gE53uo@Di>\[sh^B>g:qRݶ*9ُNSL q4.]KewŴ9c`5O< }*g}o#޳ 6ĉZ|MN!@xc6 c[05{ZiAAOZ)L qKS&4XuO nu>tܶ$5Ӧ&B齲ıЏ#2ӮIհ=>gkZN&{zڐ񯢁T2+O7#=k4.)ݨYl??Һk>?ԟqmd 4n.C15 e$#+h/ ^ W+]3WPuTJ2qwCj qMmCAdj1{V8kԌэ* R08RzZm81MA80ښN($ci=3L}i7H`,{╛fE0=(xr]4;DFͿr)g&K1FPGAil1ޣHGR1 ~p2iȠ攭#5 qҀ7<ŤTԂht5  Jq_d|0K9\#ѿ$ٛ+=R Z((((((((((((((4u!TdTHXdW_YRFyͱxh{oһ*6UaiMΝ-/q'\.W`G;U] 0a޼'ǿ-$wIƛpNv`nqUʞsNYִ֡]CE{=B("RgVAL֊OAѠ-Kɸ Oֽ̹ : /u4*l?sԡJ|F}F/ά'oC}WMo>K è?G՗r Cӗ??%_&?IKV]ÙicxopuCKZDeh+(>mN/ 7MNξ&RQ6:R} +?_%_c7nwe\!h^%o^^_+m&:U;iw(xhv}x4FE?Sqs¾PR)\ta9Tfպ6[+[䑊K;Eyf#"ҺEJ>՞Ԩ;|)wۜ63J5)yFԂЃt1d=4]:KRދ;)1RVI^kV:vOuC?y5b" 4ۈ2X> wxt߇O:W;Vv(Z(Q@Q@Q@Q@%-RR@Q@ KEQ@%-RR@Q@Q@ E-CKALdFj&D0{wqhs:f&i_ M-i?{qKֱ<\^$bLSHv샅q8u 53Rx&tmLQG*Zn9nn$&H$PRdTy搶(P<*޴uFNzScc@ uJKc6L$vsKс4j+.rG1\Fdz+57G?F~ "Ԁ&u"/5:*4TsP& QqJG) SQNb=$94ZNdHU5:;R@!&iH4S XRBh/J 撀Xi 1HN:S 40H1-v1-1iu&0iIȤv@ 2JaȤSGZ S@nzS0iQaQkR iqANϡ>]-00?Ɲ?55_)_KKBjiʾӮ#ojz"hh(P3Ef((EQEQEQEQE4Q@Q@3EPh4R12&4ƧL5h+:ld#jgWŸF|I⫫rֱ&z?{9?}زx:?c{ķQ^srafQEQEQEQEQEQEQEQEQEQEQEQEQERZC@ LsOf.b_R|zU1/=Rwp@4BJ(5V`I ENu0iY"FNc:֋1UJG45AҦzf=%Vl 3i&oJISfK <1Y+f.k3kMjjv k3dџ zq_x[}XFi [s𯮼1&:&_Uz\ȍ6(((((((((((((48\ɥ&WáO#TxP:qW h|9L3WƗS_Muu!yMt]/uה;"Vn}Ww8X֒B]ʷfmӐ9_2~]&, cӵe..㢷e@R\R(Nñ@G'hցEV( 4E&"E,PCNZ&|ñH Ҥpjicr0XkcbiiUZ;U \sr,:;Sϋtղp/!+ 'x1Os&OOUxE?𯯣r(rMN#=.o]+쥄 cSr##Ze֯ $R*!V X_tK\y@n}3_Fg<8~Q&3@>-Q6̱S+ Ï:-1viC;k<|c<-3⾪5MCyѿƺ)ssU:#|b> ˬM?`?#m?(Ovw)q)Ȳ_lbjh'/Z,7z9 '͒jYZAGj">#)Y5+t۽>1̝Af\?|kqeZT2洂PV' @}Mךagb'3˗=+Hric9QʑJ~SG3Ʒ[NQ+D&xX( 9AC_V2/aMm%U"!%ǥ.gqBG!=(XJ@9Aڏ-W)s):cȫM(U11\|Es ǧU^b"Ti6,krGQ2֑b+H3cozcy!/A<kol >knm6azVԧgI\T$&á&75}:+i\.)?CWfl(((((LI3@ E&h-f(Ƞ8.i>oJ`+ !䕂F,RB!ԯaĞ{ȟ!K3iVrN.Ot{v?(ӴHu!?Thؖ$y&^d7qMRF7WkE6C;HvxT``/OJ͔_|ZЦ Ń$ ɖ3֓u4i!)JAS@0i#ޜ)Jv9犏4@FNcM4[^n4-V V!#rqYǸdPpM&_"&ݻF_*̞i'` O}y_E{k8hd^t+'thj%44!3?FLh\75|{_/~ڒ~1?C+%z9OqAbOA[ԖoO^5DsBYc/LLInG'Q HK?كco/:VC]Qikg^YFn H)ZC =cȠf4POZMLoq\TW\^<FOQIiUuiZRr)BiuȧLZv PG<7Gj/"OkW-7^s[k[H$<|Oq sPEz5F NcGQ6sHw3Mpߺ@{kG[/uX$Dz|nRm5FSOb~QKṪپvA.Uԑc |б'޾-MɘQYG"D-$%yR R$v~q3c#hmeMb5KE[)1mb;Uf|ob|R~#x/?¨]\n5;F|B>g}'Gʈ9sA_>x⾫$v/%-ec(W3$$[fW };TE]bIrhcI5t TRh裆Lؤ ՖD~p1J4uXcKp0mGpjh 9K1RCXRȞ-~1k {?$VR+&DYԦ1>)Zlxm|=Z?gS՚R(+ ru_k]lfG} \_xwUx&5@$;nF(41uz8dW Yu=C[%!i K~e<ϱp`9}~xqWn"X$ImaǹNy=+5=^= PÐ<$ߐޕ&l'o!.`U*3ru3еOoԉZ立kcČn ?A}ߎ?egߑ[εNo׼֛}LogCk1| 2t|C4?^_{\?w"@݇ Ea>{?Fyϐ !sbnOxw'^.e8:֭:XQGrxj^.P9z WmY2;O j7 ֥e1%l~rRMvY᭙H6Ɲ'ƭd5xr7:W eE'?SRs>2kl8FVn!x䅶+?[*#k]*|}{xN,sҫ~\j:t2<"kSiOđUOB$a4psZ:?s~U72v 3h#ʑ4ps0L|=GL.gp)vZCM^:x ˨\zըn`:p$r*ծ?Jj Zc\1khiK} F|O Tfֵ'#VyGOus3oZSpVp 4{Q`(z:r)@@\)zpE_2F~ Ȗ|q=&NHE'-g5]H<,rjgMMY>WrK4 H?u{(sNU}S$Fnpjȸ5*4m$|c ;H H Dh?8>6taJB%E. ޵M6;9R !Iұ2M E2wSўL1O85ёFNθC)k#{]%֙otűWg*Ȥ{W~9ķam54ɌX igڦQEUQ@U-%D'+ElN952 (c:7zMoZi;&ՔHgELU:>b;R 99MGJD>:DRRHO'׮y@ed)*+m J􌬑~_j$ackN{z:EqhQ69lޭ]Rx+P}>vJ1.;\:kkKH.1_..?Z9glA̮;ҵ8U$='N! s(yG#V u=0*yM0Lp R4d ,M')@ƨu3ԮL=*9 j6ژ@,Vnip;+ PK5R[LYYfsڤCYL\YjA$?}IS=jxAė:fg.R@Oq^5.<9;(?uS }O~ uOJ0Sc*H95+"Sr)ȍRk=fl?7')CnԚ?%-Kcj1zNp(`(3K;V8!)T4W!W F¢3&㏄/I} *'ȵM.e sNp5t|O&7a͜@V;I;V9JJJj^~jM'Ґ@ :Ɠ4rh l(Q]@UoԄQfbG4OJ\y1N$4g#+-GN4-2Ejffx$nbH\^åSBE1(2dޔQ@ƿJd]袐db.}.M##ӭW>'lne÷ C1 XqŒvi%fCz+Q F8Q@ӟ˜z7"(b6((@LEPNQLcDx`JE #QE08Pڒ((i()3EqMlE0"84RQ2/R\Sڢފ*XkWPO?(eE[AE*acɩ+->8@(r^-?]ߢEg]~UqtrNgo'Z(EQ|xkNx4~C?VrZHuQpdRQE;)h0 J( L("(pj&4QRЯ#I*Fxw%MRHl}0|jzSQ]Wd .G/WҊ)݅\i$sE\ ͒*e`QE !qޢuhʴSe(QER
Warning: fopen(https://newsweekme.com/wp-content/uploads/2016/02/2016-02-17T094755Z_2016013529_GF10000312045_RTRMADP_3_CALIFORNIA-SHOOTING-TIMCOOK-780x439.jpg): failed to open stream: HTTP wrapper does not support writeable connections in /home/newsweekme/public_html/wp-includes/class-wp-image-editor.php on line 428

How far can the U.S. government can go in forcing technology companies to help security and intelligence investigations?The Apple REUTERS/Michaela Rehle/Files

By Jim Finkle and Joseph Menn

Feb 17 – A court order demanding that Apple Inc help the U.S. government unlock the encrypted iPhone of one of the San Bernardino shooters is shaping up as a crucial test case of how far the government can go in forcing technology companies to help security and intelligence investigations.

Law enforcement agencies have for years faced off against tech firms and privacy advocates over their ability to monitor digital communications, and the government to date has largely lost the battle.

But the specific circumstances of the San Bernardino case, a young married couple who sympathized with Daesh militants and killed 14 people and wounded 22 others in a shooting rampage at a holiday party, could give government officials the legal precedent they need to reverse the tide.

A federal judge in Los Angeles on Tuesday ordered Apple to provide “reasonable technical assistance” to investigators seeking to read the data on an iPhone 5C that had been used by Rizwan Farook, who along with his wife, Tashfeen Malik, carried out the shootings.

The government argues that the iPhone is a crucial piece of evidence. But civil liberties groups warn that forcing companies to crack their own encryption endangers the technical integrity of the Internet and threatens not just the privacy of customers but potentially that of citizens of any country.

On Wednesday, Republican lawmakers and presidential candidates came out strongly on the side of law enforcement, raising the possibility of another legislative effort to require tech companies to put “backdoors” in their products.

White House spokesman Josh Earnest said the Department of Justice was asking Apple for access to just one device, a central part of the government’s argument, which Apple Chief Executive Officer Tim Cook has said was “simply not true.”

“They are not asking Apple to redesign its product or to create a new backdoor to one of their products,” Earnest told reporters at a daily briefing.

The Department of Justice stressed in a statement on Wednesday that its request was “narrowly tailored,” and chided Apple. “It is unfortunate that Apple continues to refuse to assist the department in obtaining access to the phone of one of the terrorists involved in a major terror attack on U.S. soil.”

Most technology security experts, including many who have served in government, have said technical efforts to provide government access to encrypted devices inevitably degrades security for everyone. It is an argument that has been made since the 1990s, when the government tried and failed to force tech companies to incorporate a special chip into their products for surveillance purposes.

“The government suggests this tool could only be used once, on one phone,” Cook said in a statement on Tuesday. “But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices.”

Google Chief Executive Sundar Pichai endorsed Cook’s stance in tweets on Wednesday.

“We build secure products to keep your information safe and we give law enforcement access to data based on valid legal orders,” he wrote. “But that’s wholly different than requiring companies to enable hacking of customer devices & data. Could be a troubling precedent.”

LEGAL FIGHT

Representatives of several tech companies did not respond to requests for comment on the ruling. Not surprisingly, however, trade groups that count thousands of software companies, smartphone makers and network security firms as members decried the government’s position, while law enforcement groups backed the Justice Department.

The industry was “committed to working with law enforcement to keep Americans safe,” the Software & Information Industry Association said, but in the Apple case, “the government’s position is overbroad and unwise.”

The Computing Technology Industry Association said if the order was carried out, “it could give the FBI the power to call for some sort of back end to encryption whenever they see fit.”

If the federal judge, Magistrate Sheri Pym, rejects Apple’s arguments, the Cupertino, California-based company can appeal her order to the district court, and then up the chain to the 9th U.S. Circuit Court of Appeals in San Francisco and ultimately the U.S. Supreme Court.

The 9th Circuit is known to be pro-privacy. “The government ultimately will have an uphill fight,” said Robert Cattanach, a former Justice Department lawyer who advises companies on cyber security issues.

Farook was assigned the phone by the county health department for which he worked, prosecutors said in a court filing on Tuesday. The health department had “given its consent” to authorities to search the device and to Apple to assist investigators in that search, the document said.

San Bernardino County’s top prosecutor, District Attorney Mike Ramos, said Apple’s refusal to unlock the phone was a slap in the face to the victims of the shooting and their families.

“They’d like to know details like any of us in America would like to know. Were there other threats? Were there other individuals involved?” Ramos said in a telephone interview.

‘MASTER KEY’

Dan Guido, an expert in hacking operating systems, said that to unlock the phone, the Federal Bureau of Investigation would need to install an update to Apple’s iOS operating system so investigators could circumvent the security protections, including one that wipes data if an incorrect password is entered too many times.

He said only Apple could provide that software because the phones will only install updates that are digitally signed with a secret cryptographic key.

“That key is one of the most valuable pieces of data the entire company owns,” he said. “Someone with that key can change all the data on all the iPhones.”

The notion of providing that key is anathema to the Electronic Frontier Foundation, an online rights group. “Once this master key is created, governments around the world will surely demand that Apple undermine the security of their citizens as well,” the foundation said in a statement.

Lance James, an expert in forensics who is chief scientist with cyber intelligence company Flashpoint, said Apple could respond to the order without providing crypto keys or specialized tools that could be used to unlock other phones.

Apple technicians could create software that would unlock the phone, allowing the company to create a backup file with all of its contents that they could provide to law enforcement, James said.

American Civil Liberties Union staff attorney Alex Abdo said the government’s request risked a “dangerous” precedent. “The Constitution does not permit the government to force companies to hack into their customers’ devices,” he said.

Apple was a topic of discussion on the presidential campaign trail on Wednesday.

Donald Trump, front-runner for the Republican Party’s nomination to run in the Nov. 8 election, said on Fox News Channel’s Fox & Friends, “I agree 100 percent with the courts. In that case, we should open it (the iPhone) up … We have to use common sense.”

Another Republican candidate, U.S. Senator Marco Rubio of Florida, called it a “tough issue” that would require government to work closely with the tech industry to find a solution. Rubio said he hoped Apple would voluntarily comply with the court order.

Social Streams

Comments

comments

Facebook Comments

Post a comment