Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Tuesday March 01 2016, @04:09AM   Printer-friendly
from the waiting-for-All-Writs-Act,-Act-2 dept.

Apple has achieved a legal victory in a Brooklyn case that attempted to use the All Writs Act, similar to the case of a San Bernardino shooter's locked iPhone:

A magistrate judge in the U.S. District Court in New York has handed Apple a legal victory in a Brooklyn drug case where federal investigators asked for help getting into a locked iPhone.

Though the ruling isn't precedent-setting or binding on other courts, it hits on a similar overarching theme of government access to encrypted data, as The Washington Post reports:

"The two cases involve different versions of iPhone's operating system and vastly different requests for technical help, but they both turn on whether a law from 1789 known as the All Writs Act can be applied to cases in which the government cannot get at encrypted data stored on suspects' devices."

NPR's Joel Rose previously outlined the premise of this Brooklyn case, which predated the legal clash over an iPhone used by one of the San Bernardino shooters:

"Jun Feng pleaded guilty to selling methamphetamine last year. As part of its investigation, the government obtained a search warrant for Feng's iPhone. But the phone was locked by a passcode, so prosecutors asked a judge for an order compelling Apple to bypass it."

That order was based on the same law as the San Bernardino court order compelling Apple's help in unlocking the iPhone used by Syed Rizwan Farook before the Dec. 2 attack, in which he and his wife killed 14 people.

The Justice Department will appeal the case. FBI Director James Comey and Apple General Counsel Bruce Sewell will appear at a House Judiciary Committee hearing on Tuesday to testify on encryption.

The Verge, The Register.


Original Submission

Related Stories

Apple Lawyer and FBI Director Appear Before Congress 18 comments

Apple's general counsel Bruce Sewell and FBI Director James Comey appeared before the U.S. House of Representatives Judiciary Committee on Tuesday to explain their positions on a court order that would force Apple to unlock the iPhone belonging to one of the San Bernardino shooters. Comey sang a different tune before Congress:

Federal Bureau of Investigation Director James Comey told a congressional panel on Tuesday that a court order forcing Apple Inc to give the FBI data from an iPhone belonging to one of the San Bernardino shooters would be "potentially precedential" in other cases where the agency might request similar cooperation from technology companies. The remarks are a slight change to Comey's statement last week that forcing Apple to unlock the phone was "unlikely to be a trailblazer" for setting a precedent for other cases. [...] Comey acknowledged on Tuesday that the FBI would seek to use the same statute it is trying to apply in the San Bernardino case to compel Apple to unlock other phones, "if (the statute) is available to us."

Members of the U.S. House of Representatives Judiciary Committee seized on Comey's statement that the case could set a legal precedent allowing the agency access to any encrypted device. "Given... that Congress has explicitly denied you that authority so far, can you appreciate our frustration that this case appears to be little more than an end run around this committee?" asked the committee's ranking minority member, Michigan Representative John Conyers. Comey responded that the FBI was not asking to expand the government's surveillance authority, but rather to maintain its ability to obtain electronic information under legal authorities that Congress has already provided.

Sewell argued that unlocking the iPhone would weaken the security of all of them, and that the issue should be settled by Congress:

"We can all agree this is not about access to just one iPhone," Sewell, Apple's general counsel, said in his prepared opening remarks. "The FBI is asking Apple to weaken the security of our products." Sewell also argued that the debate should be had by Congress and elected leaders, rather than a warrant requested under the All Writs Act, a 1789 law that is central to the cases in California and New York.

Sewell also said that Apple is capable of creating new software that removes some security functionality, that being forced to write code is a First Amendment issue, and that Apple hasn't gotten similar demands from China or any other country, but expects to if Apple is forced to comply with the court order.

Previously: New York Judge Sides with Apple Rather than FBI in Dispute over a Locked iPhone


Original Submission

Apple Speaks Out Against Australian Anti-Encryption Law; Police Advised Not to Trigger Face ID 31 comments

Apple argues stronger encryption will thwart criminals in letter to Australian government

Apple has long been a proponent for strong on-device encryption, most notably for its iPhones and the iOS operating system. This has often frustrated law enforcement agencies both in the US and overseas, many of which claim the company's encryption tools and policies are letting criminals avoid capture by masking communications and securing data from the hands of investigators.

Now, in a letter to the Australian government, Apple says it thinks encryption is in fact a benefit and public good that will only strength our protections against cyberattacks and terrorism. In Apple's eyes, encryption makes everyone's devices harder to hack and less vulnerable to take-overs, viruses, and other malicious attacks that could undermine personal and corporate security, as well as public infrastructure and services. Apple is specifically responding to the Australian Parliament's Assistance and Access Bill, which was introduced late last month and is designed to help the government more easily access the devices and data of criminals during active investigations.

Letter here (#53), or at Scribd and DocumentCloud.

Also at Ars Technica, Engadget, 9to5Mac, and AppleInsider.

Police told to avoid looking at recent iPhones to avoid lockouts

Police have yet to completely wrap their heads around modern iPhones like the X and XS, and that's clearer than ever thanks to a leak. Motherboard has obtained a presentation slide from forensics company Elcomsoft telling law enforcement to avoid looking at iPhones with Face ID. If they gaze at it too many times (five), the company said, they risk being locked out much like Apple's Craig Federighi was during the iPhone X launch event. They'd then have to enter a passcode that they likely can't obtain under the US Constitution's Fifth Amendment, which protects suspects from having to provide self-incriminating testimony.

Also at 9to5Mac.

Related:


Original Submission

Apple Denies FBI Request to Unlock Shooter’s iPhone 26 comments

Apple Denies FBI Request to Unlock Shooter's iPhone:

Apple once again is drawing the line at breaking into a password-protected iPhone for a criminal investigation, refusing a request by the Federal Bureau of Investigation (FBI) to help unlock the iPhones of a shooter responsible for an attack in Florida.

The company late Monday said it won't help the FBI crack two iPhones belonging to Mohammed Saeed Alshamrani, a Saudi-born Air Force cadet and suspect in a shooting that killed three people in December at the Naval Air Station in Pensacola, Fla.

The decision is reminiscent of a scenario that happened during the investigation of a 2015 California shooting, and could pit federal law enforcement against Apple in court once again to argue over data privacy in the case of criminal investigations.

While Apple said it's helping in the FBI's investigation of the Pensacola shooting—refuting criticism to the contrary—the company said it won't help the FBI unlock two phones the agency said belonged to Alshamrani.

"We reject the characterization that Apple has not provided substantive assistance in the Pensacola investigation," the company said in a statement emailed to Threatpost. "Our responses to their many requests since the attack have been timely, thorough and are ongoing."

[...] The FBI sent a letter to Apple's general counsel last week asking the company to help the agency crack the iPhones, as their attempts until that point to guess the "relevant passcodes" had been unsuccessful, according to the letter, which was obtained by NBC News.

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Tuesday March 01 2016, @05:33AM

    by Anonymous Coward on Tuesday March 01 2016, @05:33AM (#311950)

    Strange there are so many cases at once. Is this an attempt to drain apple's legal fund?

    • (Score: 4, Insightful) by Tork on Tuesday March 01 2016, @05:50AM

      by Tork (3914) Subscriber Badge on Tuesday March 01 2016, @05:50AM (#311954)
      Nah, they're using the AOL CD strategy. Trying to find one judge that'll buy their pitch.
      --
      🏳️‍🌈 Proud Ally 🏳️‍🌈
      • (Score: 0) by Anonymous Coward on Tuesday March 01 2016, @06:05AM

        by Anonymous Coward on Tuesday March 01 2016, @06:05AM (#311959)

        Could be that too, something is up since there are so many cases in parallel. I take it there is no concern about legal resources that can be devoted to this issue then.

      • (Score: 0) by Anonymous Coward on Tuesday March 01 2016, @09:07AM

        by Anonymous Coward on Tuesday March 01 2016, @09:07AM (#312035)

        This is like playing Russian roulette with a gun in each hand. //o== (o.o) ==o\\

    • (Score: 0) by Anonymous Coward on Tuesday March 01 2016, @05:51AM

      by Anonymous Coward on Tuesday March 01 2016, @05:51AM (#311955)

      You afraid the Justice Dept will go bankrupt and Apple will buy justice wholesale?
      Dontcha worry, it's already happening.

      • (Score: 0) by Anonymous Coward on Tuesday March 01 2016, @05:58AM

        by Anonymous Coward on Tuesday March 01 2016, @05:58AM (#311957)

        But Apple didn't initiate these cases. If your theory is correct, the government must have accidently/purposefully scientologied itself.

        • (Score: 2) by c0lo on Tuesday March 01 2016, @07:34AM

          by c0lo (156) Subscriber Badge on Tuesday March 01 2016, @07:34AM (#311998) Journal

          the government must have accidently/purposefully scientologied itself.

          Correct. "Accidentally"** to be precise.

          ** demo: straight application of the Hanlon's razor in the conditions established by Mikey's additive theorem [utah.edu]
          The stupidity of a group equals the sum of the stupidity of its members. Large groups, such as governments (or corporations), are capable of acts of stupidity far in excess of any individual member of the group.

          --
          https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    • (Score: 3, Funny) by looorg on Tuesday March 01 2016, @02:16PM

      by looorg (578) on Tuesday March 01 2016, @02:16PM (#312116)

      Like that will ever happen. If the funds get low you'll see a new IPhone for sale within a month - Iphone X - Justice Edition!

  • (Score: 3, Disagree) by zeigerpuppy on Tuesday March 01 2016, @06:10AM

    by zeigerpuppy (1298) on Tuesday March 01 2016, @06:10AM (#311962)

    Of course apple will be shown to be fighting the good fight.
    This is all about reviving trust and helping them out to pay for damage caused to their image.
    While in the background the unwarranted data taps will continue unabated.
    Pure theatre, worthy of popcorn

    • (Score: 0) by Anonymous Coward on Tuesday March 01 2016, @08:03AM

      by Anonymous Coward on Tuesday March 01 2016, @08:03AM (#312008)

      That is also my take on it, so much PR spin started flying around after the Snowden docs were released, you'd think maybe they'd have taken their stand before being outed...

      Sadly, even people I would expect to be open to the possibilities of underhanded dealings seem to believe the corporate lords are beholden to the customers and will not violate customer privacy. "They have an image to maintain and will lose all their customers if they cave to the FBI."

      Mmhmmm, since all the other revelations have done so much harm to the sales of M$ and Fruitco.

    • (Score: 3, Interesting) by frojack on Tuesday March 01 2016, @08:04AM

      by frojack (1554) on Tuesday March 01 2016, @08:04AM (#312009) Journal

      Well its one thing for the government to spy on us, but to force others to spy for them is a step too far.
      It may be used against criminals and terrorists today, but it will be routinely used against all of us soon as they can find some judges that think like you.

      You can't get back from there once you go there.

      --
      No, you are mistaken. I've always had this sig.
      • (Score: 3, Disagree) by zeigerpuppy on Tuesday March 01 2016, @12:19PM

        by zeigerpuppy (1298) on Tuesday March 01 2016, @12:19PM (#312080)

        We're already there my friend.
        The FBI has the tools to pop the NAND chip out of the phone
        and read it. They don't need Apple to do anything.
        But you see apple wants people to believe that it is saying no,
        It's good PR.
        Also think about how iCloud works, they already have most of the data on their customers unencrypted anyway.
        Google, Apple, Facebook, Microsoft and others have deals in place with the NSA/FBI/CIA/DEA/5 Eyes to share data.
        Of course they are also not allowed to talk about these deals and it's good for everyone (apart from the public) that they vociferously complain every now and then.
        End to end crypto is the only way to secure your comms and even then it's not easy.
        It's sort of like senior priests saying they didn't see the kiddy fiddlers;
        "Oh that network engineer in the locked cupboard with a ball of fibre, oh don't worry about him, he's from the cable company, just fixing some problems"

        • (Score: 4, Informative) by pTamok on Tuesday March 01 2016, @03:28PM

          by pTamok (3042) on Tuesday March 01 2016, @03:28PM (#312172)

          Sigh,

          'popping the NAND' chip out won't help (much), as the data on the NAND chip is encrypted with a key that made from the unlock code/passcode mixed with (entangled) a large number encoded in the cpu chip that is unique to each cpu. So the unlock code has to be processed by the particular cpu, as this large number is not known. In this particular model of iPhone, the enforced time delay between successive unlock attempts can, however, be bypassed if a special revision of the iOS is loaded, so that a new passcode could be tried every 50 ms.

          In principle, the cpu chip could be desoldered, and ablated and the large number read directly from the silicon, but that process is not guaranteed to be successful. If it is not, the data is lost. So the FBI are taking the easy way: asking Apple to produce a version of iOS for this particular phone that by-passes the time delay between unlock events. Note that this cannot be done so simply (if at all) for later iPhones that have a 'Secure Enclave', as the time delay is enforced by the hardware in a more secure fashion.

          Alternatively, the FBI could ask for Apple's software signing key, and produce the software themselves. That would give them unrestricted access to more than just one iPhone.

          • (Score: 2) by zeigerpuppy on Tuesday March 01 2016, @09:12PM

            by zeigerpuppy (1298) on Tuesday March 01 2016, @09:12PM (#312349)

            Apparently the implementation is not particularly secure even in the latest models http://risky.biz [risky.biz] podcast #400 has a reasonably good discussion of this.

            • (Score: 1) by pTamok on Wednesday March 02 2016, @09:32AM

              by pTamok (3042) on Wednesday March 02 2016, @09:32AM (#312547)

              It would have been nice of you to provide a précis, or even an indication of where in the podcast it was mentioned (a little before a quarter of the way in).

              Essentially, the technique described is to desolder some NAND, install a jailbreak on the desoldered NAND, then reattach the NAND. This works even on iPhones which have a Secure Enclave, and is well within the FBI's capabilities. This is apparently easy for people with experience of this sort of thing (and the right heat gun).

              I don't know enough about the details of the physical use of NAND in iPhones, or the layout of software and data in the NAND to say if it is a viable approach. I have to leave it to others who claim it is. It is indeed possible that such a physical vulnerability could exist in current iPhone models, but I suspect that is the kind of thing Apple intend to address in future.

              Some discussion of the NAND setup of iPhones is here:

              https://www.theiphonewiki.com/wiki/NAND [theiphonewiki.com]

              which also links to here:

              http://esec-lab.sogeti.com/posts/2012/06/28/low-level-ios-forensics.html [sogeti.com]

              The first link states

              Although the NAND houses two visible filesystems, it actually has more partitions, including: NVRM (the NVRam store), SCFG (system configuration), BOOT (iBoot + more) and others.

              If some of those partitions are unencrypted, or encrypted with keys that are extractable, or guessable by brute force in reasonable time without using the particular iPhone cpu the NAND was removed from, then there could be an exploitable vulnerability.

  • (Score: 2) by Arik on Tuesday March 01 2016, @04:34PM

    by Arik (4543) on Tuesday March 01 2016, @04:34PM (#312208) Journal
    The Intercept [theintercept.com]
    --
    If laughter is the best medicine, who are the best doctors?
  • (Score: 1) by anubi on Wednesday March 02 2016, @12:58PM

    by anubi (2828) on Wednesday March 02 2016, @12:58PM (#312608) Journal

    Seems some governments can be as much bullies as street gangs when they don't get their way....

    Now, I am of really mixed emotion on all this stuff, but I know we have warned our representatives, bosses, and whoever else we could preach at that ignoring all these privacy issues and all this insecure software that has been getting by on "hold harmless" clauses is only going to drive a lot of research and adoption of very potent encryption.

    Government not only turned a blind eye to abuse of privacy, they even fostered a lot of bad software by using it in government and damn near mandating its use in order to communicate with government.

    Business has to follow suit in order to file forms and whatever in order to maintain permissions to stay in business.

    Now, the chickens are coming home to roost and the governments are finally waking up.

    Just like the recording industry did not wake up until filesharing was commonplace and well ingrained into the public, finally governments have got to realize that what used to be easily monitorable cleartext is now streams of encrypted data - as governments themselves force the issue by ignoring the public's concern over privacy issues.

    That is, if people cannot keep peeping toms out of the neighborhood, they start painting the windows black. Some places deal with it by erecting walls with broken glass embedded on the top, or razor wire.

    Here, A senior Facebook executive was detained in Sao Paulo, Brazil, on Tuesday after the company’s WhatsApp cellphone chat subsidiary told federal authorities it was unable to intercept instant messages in connection with a drug investigation. [washingtonpost.com]

    The case reflects the growing conflict between technology firms and governments around the world over access to customer data. As more companies use strong encryption on their customers’ devices and communication, the information becomes increasingly out of reach for law enforcement, even if officials have obtained warrants.

    --
    "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]