Why Apple Is Fighting Not To Unlock iPhones For The Government

Comment

Image Credits: Justin Sullivan

Yesterday, the FBI filed an order compelling Apple to unlock an iPhone used by Syed Farook, one of the attackers in the San Bernardino shooting incident late last year which left 14 people dead.

Shortly thereafter, Apple CEO Tim Cook published a bold statement indicating that Apple planned to fight the order. Apple was joined by the Electronic Frontier Foundation, which said it would aid  in the fight.

We’ve already covered the nuts and bolts of the request, as well as Cook’s response and the White House’s response to that response. You can read those for a primer. There has been a lot of ink spilled and there will likely be a lot more, but there are a few questions that I think deserve a closer look — and there is a broader point to be made that will likely get obfuscated by people pursuing technical details rather than implications.

This current order is all about Apple refusing to unlock a single device for the FBI. It is not to be confused with the related, but bigger, battle over the government forcing tech companies to weaken their encryption by introducing a ‘secret’ key that only they have.

The key question of the day is this: Why is Apple fighting not to unlock a terrorist’s iPhone, instead of waiting to fight their big battle over encryption back doors? Let’s dissect it.

The Ask

The government wants Apple to create a ‘one-off’ version of iOS that it could install on this device with three key changes:

  1. Disable or bypass the auto-erase function of iOS. This erases your phone if too many wrong passwords are input. A commonly enabled setting on corporate phones — which the iPhone 5c owned by the government agency for which Farook worked — is.
  2. Remove the delay on password inputs so that the FBI can ‘guess’ the passcode on the phone quicker, without it locking them out for minutes or hours, which is what iOS does to stop any random thief from doing this kind of thing. The inputs would be lowered to around 80 milliseconds, which would allow the password to be guessed in under an hour if it were 4 digits and significantly longer if it were more.
  3. Allow the FBI to submit passcode via the physical port on the phone, or a wireless protocol like Bluetooth or WiFi.

The final condition there is the scariest, and the one that Apple objects to the most. Don’t get me wrong. Cook’s letter clearly states that Apple is opposed to all of the conditions, but that last one is different. It is asking Apple to add a vulnerability to its software and devices, not just ‘remove’ a roadblock.

There is a possibility that Apple could drag this out with the FBI for a very long time, arguing about reasonable demands or the costs of this to Apple (which could be prohibitive as signing firmware is an incredibly non-trivial process). One outcome could be that Apple grinds down the asks until they just disable the auto-erase function, which is an operating system option that already exists, and leave the rest of it to the FBI to figure out.

But that final ask is what the entire objection hinges on. The All Writs Act, passed in 1789 (yes, a 200-year-old law,) is being used to force Apple to comply. The fact that the act is being used to try to make Apple do a lot of work to modify iOS and to add functionality that would significantly weaken its products and their security will likely be at the core of Apple’s defense when this gets to the courts. It’s a huge ballooning of the scope of the AWA, and it sets a precedent for allowing the government to force Apple or other companies to modify their systems to allow access to your private data.

And herein lies the rub. There has been some chatter about whether these kinds of changes would even be possible with Apple’s newer devices. Those devices come equipped with Apple’s proprietary Secure Enclave, a portion of the core processing chip where private encryption keys are stored and used to secure data and to enable features like Touch ID. Apple says that the things that the FBI is asking for are also possible on newer devices with the Secure Enclave. The technical solutions to the asks would be different (no specifics were provided) than they are on the iPhone 5c (and other older iPhones), but not impossible.

If I had to bet, Apple is probably working double time to lock it down even tighter. Its reply to the next order of this type is likely to be two words long. You pick the two.

The point is that the FBI is asking Apple to crack its own safe. It doesn’t matter how good the locks are if you modify them to be weak after installing them. And once the precedent is set then the opportunity is there for similar requests to be made of all billion or so active iOS devices. Hence the importance of this fight for Apple.

This is why the debate around this particular order should not focus overmuch on the technical aspects — but on the fact that the government would be weakening the security of a private company’s product, potentially impacting the civil liberties of American citizens and foreign nationals worldwide that use those products.

Reasonable Compliance

Apple has complied with government information requests for years, and likely did so in this case. It is technically possible, for instance, to retrieve data from iCloud backups of devices. Farook’s device was last backed up in October 19th of 2015, which means that the FBI already has access to that data. The agency can use other avenues (and likely has) to gather data about calls by issuing information requests to cell carriers, for instance.

“From my crude testing in the past on an iPhone 5, a four digit passcode should be possible to brute force in less than an hour. A six digit passcode should be possible to brute force in less than a day,” says Will Strafach, ex-jailbreaker and CEO of mobile security firm Sudo Security Group. “I have not tested times for passcodes with numbers, letters or symbols, but it is fairly easy to understand why it would take substantially longer. With numeric passcodes, it’s 10,000 possibilities if four digit and 1,000,000 possibilities if six digit. But introducing symbols and letters drastically will increase the possibilities, considering you could even use multiple keyboards (for example: an English phrase, an Arabic phrase, and then. some numbers and symbols).”

There are also already tools that the law uses to access passcode-locked iPhones. Many of these tools are bundles of programs that use jailbreak exploits to gain access to the iPhone’s memory, and then a suite of tools to access and analyze the data. These tools are then branded with a security firm’s rubber stamp and sold to law enforcement. When the exploits are repaired by iOS updates or patches, the tools become ineffective.

https://twitter.com/JZdziarski/status/700085957643657220

The idea that a government-issued phone that the FBI says Farook used to talk to co-workers would be used to openly facilitate an act of terrorism is somewhat far-fetched.

Instead, it is being used as a crowbar that essentially forces Apple to oppose the order. Regardless of the outcome, it’s likely that this case will be used to bolster the call for Congressional legislation that forces American companies to weaken their encryption by installing a ‘back door’ for the government.

Which brings us back to a question of philosophy.

Two Lines In the Sand

There are other battles to come in this fight. Encryption of data on iPhones, for instance, is another whole technical gambit, one that Apple has made great efforts to remove from the equation by making it impossible for them to decrypt customer data even if requests were made.

That would require that Apple modify its software and firmware on its devices to enable governmental agencies to bypass encryption. Once that method exists, there is absolutely, positively, no way for it to be kept solely for the use of the government. It also raises the question of how any international user of an iPhone would ever feel safe — especially given what we now know about the government’s electronic surveillance capabilities and its willingness to use them.

Apple is choosing to fight this battle now, rather than later. Cook’s letter draws a line out on the beach, where we’re still talking about allowing brute force cracking of iPhone passwords — rather than right up against the fortress, where we will be fighting for our right to secure encryption.

It’s a gambit with risks, for sure, outlined well by Ben Thompson here. If Apple loses this battle because the court sees a request for a terrorist’s iPhone to be unlocked to be reasonable, then it is going to be that much harder to fight the encryption battle later. But Apple sees this as the line — the modification of one of its products to weaken its security. To Apple, any back door is still a back door, and an unacceptable condition. It doesn’t matter to Apple whether the fight is over a passcode or over encryption. Like I said, it’s a risk, but it’s one that Apple feels it must take.

A Seminal Case

All of the various outcomes of this situation make alterations to the playing field.

The government gets Apple to add a weakness to a product? A precedent for weakening all security.

Apple fighting back successfully? A possible precedent for protecting the users of all smartphones iOS, Android and otherwise.

A potential win in the courts? Precedent to protect security, but also possibly to force Congress to ruin American encryption.

Screen Shot 2016-02-17 at 2.24.27 PM

Apple is taking a bold stance here, but is standing somewhat lonely at the moment among its direct peers. Jan Koum of WhatsApp — who has had his own run-ins with information requests — posted in support of Cook’s letter. And the EFF and the ACLU are both taking Apple’s side as well. Just before this article was published, Google CEO Sundar Pichai tweeted, supporting Apple’s position.

Other tech giants like Amazon, Facebook and Microsoft have yet to weigh in — though they have potentially just as much to lose or gain. Whether this is because they have facilitated these requests without a fight, who knows? For Apple’s part, this isn’t the first time that Cook has taken a strong stance on security and privacy, his speech last year summed up how Apple has used it as a differentiation point before and since.

This is a seminal battle between the biggest tech company on the planet and the most powerful government on the planet. This is why it’s important that we don’t get mired down in technicalities. For Apple, and for us, this is not a question of can we, but a question of should we. A question that will have implications for everyone from journalists to heads of state to private citizens of all countries.

Article updated to correctly identify the phone’s owner, Syed Farook.

Apple vs FBI

More TechCrunch

Ahead of the AI safety summit kicking off in Seoul, South Korea later this week, its co-host the United Kingdom is expanding its own efforts in the field. The AI…

UK opens office in San Francisco to tackle AI risk

Companies are always looking for an edge, and searching for ways to encourage their employees to innovate. One way to do that is by running an internal hackathon around a…

Why companies are turning to internal hackathons

Featured Article

I’m rooting for Melinda French Gates to fix tech’s broken ‘brilliant jerk’ culture

Women in tech still face a shocking level of mistreatment at work. Melinda French Gates is one of the few working to change that.

9 hours ago
I’m rooting for Melinda French Gates to fix tech’s  broken ‘brilliant jerk’ culture

Blue Origin has successfully completed its NS-25 mission, resuming crewed flights for the first time in nearly two years. The mission brought six tourist crew members to the edge of…

Blue Origin successfully launches its first crewed mission since 2022

Creative Artists Agency (CAA), one of the top entertainment and sports talent agencies, is hoping to be at the forefront of AI protection services for celebrities in Hollywood. With many…

Hollywood agency CAA aims to help stars manage their own AI likenesses

Expedia says Rathi Murthy and Sreenivas Rachamadugu, respectively its CTO and senior vice president of core services product & engineering, are no longer employed at the travel booking company. In…

Expedia says two execs dismissed after ‘violation of company policy’

Welcome back to TechCrunch’s Week in Review. This week had two major events from OpenAI and Google. OpenAI’s spring update event saw the reveal of its new model, GPT-4o, which…

OpenAI and Google lay out their competing AI visions

When Jeffrey Wang posted to X asking if anyone wanted to go in on an order of fancy-but-affordable office nap pods, he didn’t expect the post to go viral.

With AI startups booming, nap pods and Silicon Valley hustle culture are back

OpenAI’s Superalignment team, responsible for developing ways to govern and steer “superintelligent” AI systems, was promised 20% of the company’s compute resources, according to a person from that team. But…

OpenAI created a team to control ‘superintelligent’ AI — then let it wither, source says

A new crop of early-stage startups — along with some recent VC investments — illustrates a niche emerging in the autonomous vehicle technology sector. Unlike the companies bringing robotaxis to…

VCs and the military are fueling self-driving startups that don’t need roads

When the founders of Sagetap, Sahil Khanna and Kevin Hughes, started working at early-stage enterprise software startups, they were surprised to find that the companies they worked at were trying…

Deal Dive: Sagetap looks to bring enterprise software sales into the 21st century

Keeping up with an industry as fast-moving as AI is a tall order. So until an AI can do it for you, here’s a handy roundup of recent stories in the world…

This Week in AI: OpenAI moves away from safety

After Apple loosened its App Store guidelines to permit game emulators, the retro game emulator Delta — an app 10 years in the making — hit the top of the…

Adobe comes after indie game emulator Delta for copying its logo

Meta is once again taking on its competitors by developing a feature that borrows concepts from others — in this case, BeReal and Snapchat. The company is developing a feature…

Meta’s latest experiment borrows from BeReal’s and Snapchat’s core ideas

Welcome to Startups Weekly! We’ve been drowning in AI news this week, with Google’s I/O setting the pace. And Elon Musk rages against the machine.

Startups Weekly: It’s the dawning of the age of AI — plus,  Musk is raging against the machine

IndieBio’s Bay Area incubator is about to debut its 15th cohort of biotech startups. We took special note of a few, which were making some major, bordering on ludicrous, claims…

IndieBio’s SF incubator lineup is making some wild biotech promises

YouTube TV has announced that its multiview feature for watching four streams at once is now available on Android phones and tablets. The Android launch comes two months after YouTube…

YouTube TV’s ‘multiview’ feature is now available on Android phones and tablets

Featured Article

Two Santa Cruz students uncover security bug that could let millions do their laundry for free

CSC ServiceWorks provides laundry machines to thousands of residential homes and universities, but the company ignored requests to fix a security bug.

2 days ago
Two Santa Cruz students uncover security bug that could let millions do their laundry for free

TechCrunch Disrupt 2024 is just around the corner, and the buzz is palpable. But what if we told you there’s a chance for you to not just attend, but also…

Harness the TechCrunch Effect: Host a Side Event at Disrupt 2024

Decks are all about telling a compelling story and Goodcarbon does a good job on that front. But there’s important information missing too.

Pitch Deck Teardown: Goodcarbon’s $5.5M seed deck

Slack is making it difficult for its customers if they want the company to stop using its data for model training.

Slack under attack over sneaky AI training policy

A Texas-based company that provides health insurance and benefit plans disclosed a data breach affecting almost 2.5 million people, some of whom had their Social Security number stolen. WebTPA said…

Healthcare company WebTPA discloses breach affecting 2.5 million people

Featured Article

Microsoft dodges UK antitrust scrutiny over its Mistral AI stake

Microsoft won’t be facing antitrust scrutiny in the U.K. over its recent investment into French AI startup Mistral AI.

2 days ago
Microsoft dodges UK antitrust scrutiny over its Mistral AI stake

Ember has partnered with HSBC in the U.K. so that the bank’s business customers can access Ember’s services from their online accounts.

Embedded finance is still trendy as accounting automation startup Ember partners with HSBC UK

Kudos uses AI to figure out consumer spending habits so it can then provide more personalized financial advice, like maximizing rewards and utilizing credit effectively.

Kudos lands $10M for an AI smart wallet that picks the best credit card for purchases

The EU’s warning comes after Microsoft failed to respond to a legally binding request for information that focused on its generative AI tools.

EU warns Microsoft it could be fined billions over missing GenAI risk info

The prospects for troubled banking-as-a-service startup Synapse have gone from bad to worse this week after a United States Trustee filed an emergency motion on Wednesday.  The trustee is asking…

A US Trustee wants troubled fintech Synapse to be liquidated via Chapter 7 bankruptcy, cites ‘gross mismanagement’

U.K.-based Seraphim Space is spinning up its 13th accelerator program, with nine participating companies working on a range of tech from propulsion to in-space manufacturing and space situational awareness. The…

Seraphim’s latest space accelerator welcomes nine companies

OpenAI has reached a deal with Reddit to use the social news site’s data for training AI models. In a blog post on OpenAI’s press relations site, the company said…

OpenAI inks deal to train AI on Reddit data

X users will now be able to discover posts from new Communities that are trending directly from an Explore tab within the section.

X pushes more users to Communities