Arab Times

FBI-Apple case resolution prolongs battle

‘Clash of values, interests will continue’ Unlocking iPhone

-

SAN FRANCISCO, March 31, (AP): The FBI’s victory in breaking into a San Bernardino killer’s iPhone without Apple’s help merely prolongs a battle over how far the government can go to examine private messages, photos and other files.

“There’s a clash of values and interests that I think will continue,” said Ed Black, head of Computer and Communicat­ions Industry Associatio­n, a trade group whose members include Google, Facebook and Microsoft.

Federal prosecutor­s have appealed a court ruling that said Apple doesn’t have to help them extract data from another iPhone in a New York drug case. Speaking in general, the Justice Department said it will continue seeking digital evidence, “either with cooperatio­n from relevant parties or through the court system when cooperatio­n fails.”

After finding its own way to access files on the San Bernardino iPhone, the Justice Department said it no longer needs a court order to force Apple to remove safeguards against guessing that iPhone’s passcode. That means Magistrate Sheri Pym won’t be ruling on whether a centuries-old law, known as the All Writs Act, provided legal authority for compelling Apple’s assistance.

Some in the tech industry worry that authoritie­s will now try to pursue a smaller company — one without the financial and legal resources that Apple had — to win a favorable legal precedent that authoritie­s could then use to pressure other firms — including heavyweigh­ts like Apple.

“When you’re a company of five people, you don’t have a general counsel’s office. You have a card table that everyone sits and codes at,” said Morgan Reed, executive director of a tech industry group known as ACT, which represents software applicatio­n developers.

Although the Justice Department repeatedly insisted that its request for Apple’s help applied only to the San Bernardino iPhone, Apple said having to rewrite its iPhone software would make all phones less secure and open the door to more demands from government authoritie­s, both in the United States and other countries.

Tech companies say they turn over the customer data they have, when faced with a legal court order. But many companies are increasing­ly using encryption and other safeguards that put at least some customer data out of WASHINGTON, March 31, (RTRS): The FBI may be allowed to withhold informatio­n about how it broke into an iPhone belonging to a gunman in the December San Bernardino shootings, despite a US government policy of disclosing technology security flaws discovered by federal agencies.

Under the US vulnerabil­ities equities process, the government is supposed to err in favor of disclosing security issues so companies can devise fixes to protect data. The policy has exceptions for law enforcemen­t, and there are no hard rules about when and how it must be applied.

Apple Inc has said it would like the government to share how it cracked the iPhone security protection­s. But the Federal Bureau of Investigat­ion, which has been frustrated by its inability to access data on encrypted phones belonging to

their reach. Companies say they’re determined to protect customers’ privacy against unwarrante­d intrusion.

On the flip side, today’s popular smartphone­s contain a wealth of informatio­n about their users — who they talk to, where they travel, what they view online — which authoritie­s can use to prosecute suspects, unravel plots and identify accomplice­s.

Investigat­ion

“Every case is now a cyber investigat­ion,” said Ed McAndrew, a former federal cybercrime­s prosecutor now in private practice. “You’re going to have electronic devices and technology and online storage in virtually every case.”

State and federal authoritie­s in several jurisdicti­ons have confirmed they would like to get access to encrypted smartphone­s seized in a variety of criminal investigat­ions. In at least a dozen pending cases, the government has cited the same All Writs Act as legal authority to compel Apple’s cooperatio­n.

The FBI might be able to apply the same forensic technique it used with the San Bernardino iPhone, but it’s not clear if that will work with newer iPhones that have added security fea- criminal suspects, might prefer to keep secret the technique it used to gain access to gunman Syed Farook’s phone.

The referee is likely to be a White House group formed during the Obama administra­tion to review computer security flaws discovered by federal agencies and decide whether they should be disclosed.

Experts said government policy on such reviews was not clear-cut, so it was hard to predict whether a review would be required. “There are no hard and fast rules,” said White House cybersecur­ity coordinato­r Michael Daniel, in a 2014 blog post about the process.

If a review is conducted, many security researcher­s expect that the White House group will not require the FBI to disclose the vulnerabil­ity it exploited.

Some experts said the FBI might be able to avoid a review entirely if,

tures, said Jonathan Zdziarski, an independen­t computer forensics expert. The San Bernardino iPhone was a 5C model, which largely had 2012 hardware, although it had a recent version of the iPhone software.

Late Wednesday, the FBI agreed to help an Arkansas prosecutor unlock an iPhone and iPod belonging to two teenagers accused of killing a couple. What is unclear is whether the FBI — which already had the ability to get data from some phones — is using the same techniques as in San Bernardino.

Meanwhile, the government’s authority under the All Writs Act remains in dispute. Any decision in the pending New York case will likely be appealed again, said Fred Cate, a law professor and fellow at the Indiana University Center for Applied Cybersecur­ity Research. “There’s no question that will be up in the air until the Supreme Court rules on it,” he added.

In the San Bernardino case, most of Apple’s biggest competitor­s — including Google, Facebook and Microsoft — filed court briefs on Apple’s behalf. Representa­tives from those companies didn’t respond to requests for comment this week. But Black, the trade group head, said companies recognize the im- for instance, it got past the phone’s encryption using a contractor’s proprietar­y technology.

Explaining the policy in 2014, the Office of the Director of National Security said the government should disclose vulnerabil­ities “unless there is a clear national security or law enforcemen­t need.”

The interagenc­y review process also considers whether others are likely to find the vulnerabil­ity. It tends to focus on flaws in major networks and software, rather than individual devices.

During a press call, a senior Justice Department official declined to disclose whether the method used on Farook’s phone would work on other phones or would be shared with state and local law enforcemen­t.

Apple declined to comment beyond saying it would like the government to provide informatio­n about the technique used.

portance access to informatio­n is to law enforcemen­t and national security.

But he said many in the tech industry believe authoritie­s went too far by trying to force Apple to write software that would override the security features of its own products.

Members of Congress have discussed legislatio­n on both ends of the spectrum — either to require tech companies’ cooperatio­n or to limit law enforcemen­t authority to compel companies’ help. The latest case could spur Congress to act, though Black and others don’t believe that likely given legislativ­e gridlock on other issues.

That means these battles are likely to recur in court instead.

In a statement this week, the Justice Department said, “It remains a priority for the government to ensure that law enforcemen­t can obtain crucial digital informatio­n to protect national security and public safety.”

Apple responded by saying it will assist law enforcemen­t in at least some ways as it has in the past. But the company added, “we will continue to increase the security of our products as the threats and attacks on our data become more frequent and more sophistica­ted.”

Newspapers in English

Newspapers from Kuwait