USA TODAY International Edition

Another view: Do we need to weaken iPhone encryption?

- Darren Hayes Darren Hayes is an associate professor of Informatio­n Technology at Pace University.

Apple has historical­ly assisted law enforcemen­t, in possession of a warrant, with unlocking iPhones. Over time, that process changed whereby Apple would instead provide law enforcemen­t with the evidence.

The case of the shooter in Pensacola, Florida, is interestin­g because iPhone unlocking solutions are available to law enforcemen­t; GrayKey, from Grayshift, is one example.

While many law enforcemen­t agencies and prosecutor­s may be content with reverting back to the old system of being provided with the evidence, the Department of Justice appears to be requesting some type of special access to decrypt the iPhone. There is no precedent to force a company to break its own encryption — hence the reemergenc­e of the All Writs Act.

It begs the question: Do we really want to weaken encryption?

In a post- Snowden era, Apple, and other corporatio­ns, appear less willing to cooperate with government requests. Apple has removed itself from the decryption process.

Apple could still assist law enforcemen­t by disabling security protocols on an individual iPhone to allow unlimited attempts to guess the password, making access to a phones data easier for the FBI.

Apple has not explicitly said it has opposed the idea of assisting law enforcemen­t. In fact, Apple CEO Tim Cook previously hinted that congressio­nal legislatio­n may be the way forward for the two companies to formalize their cooperatio­n.

We need congressio­nal legislatio­n to provide guidance about how companies must comply with court- approved warrants. Asking Apple to revert to providing evidence to investigat­ors, without requesting an encryption backdoor, might be the best compromise.

Newspapers in English

Newspapers from United States