For over two decades, the battle between privacy-minded technologists and the U.S. government has primarily been over encryption. In the 1990s, in what became known as the Crypto Wars, the U.S. tried to limit powerful encryption — calling it as dangerous to export as sophisticated munitions — and eventually lost.
After the 2013 Snowden revelations, as mainstream technology companies started spreading encryption by putting it in popular consumer products, the wars erupted again. Law enforcement officials, led by FBI Director James Comey, loudly insisted that U.S. companies should build backdoors to break the encryption just for them.
That won’t happen because what these law enforcement officials are asking for isn’t possible (any backdoor can be used by hackers, too) and wouldn’t be effective (because encryption is widely available globally now). They’ve succeeded in slowing the spread of unbreakable encryption by intimidating tech companies that might otherwise be rolling it out faster, but not much else.
Indeed, as almost everyone else acknowledges, unbreakable encryption is here to stay.
Tech privacy advocates continue to remain vigilant about encryption, actively pointing out the inadequacies and impossibilities of the anti-encryption movement, and jumping on any sign of backsliding.
But even as they have stayed focused on defending encryption, the government has been shifting its focus to something else.
The ongoing, very public dispute between Apple and the FBI, in fact, marks a key inflection point — at least as far as the public’s understanding of the issue.
You might say we’re entering the Post-Crypto phase of the Crypto Wars.
Think about it: The more we learn about the FBI’s demand that Apple help it hack into a password-protected iPhone, the more it looks like part of a concerted, long-term effort by the government to find new ways around unbreakable encryption — rather than try to break it.
The Court Order
The court order Apple is fighting would require it to come up with a new way to hack into an iPhone 5c belonging to San Bernardino killer Syed Rizwan Farook.
The fact is that Apple couldn’t break the encryption scrambling the phone’s data if it tried. But the FBI doesn’t have to worry about that if it can just open the phone with the right password.
As Apple CEO Tim Cook put it, in his rebellious public response to the court order: “The ‘key’ to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it.”
And it’s those protections that are now under siege.
This is not a sudden move for the government. As Bloomberg News recently reported, President Obama’s National Security Council last fall shaped a secret “decision memo” requesting government agencies to find both technical and legal ways to skirt encryption instead of break it.
They were instructed to figure out how much each option would cost, whether there were any laws that might need changing — and to report back.
According to a Washington Post story in September, an Obama administration working group spent months coming up with a list of technological methods to defeat encryption. One idea — particularly abhorrent to computer security professionals — was to force companies to send malware to suspects’ phones using automatic software updates.
And despite Comey’s constant complaint that law enforcement is “going dark” because of encryption, the FBI has been developing and purchasing viruses, Trojan horses, and other forms of malware to help break into digital devices — and in that way get around unbreakable encryption — for years.
They don’t like to talk about it. The FBI “routinely identifies, evaluates, and tests potential exploits in the interest of cybersecurity,” FBI spokesperson Christopher Allen wrote in an email to The Intercept in September.
But the public record shows that the FBI has been physically hacking into computers since at least 2001, when it put a keystroke-logger on “Little Nicky” Scarfo’s computer during an investigation of the American Mafia.
These days, the FBI uses its own brand of malware called the Computer and IP Address Verifier (CIPAV). In 2007, agents tricked a high school kid in Washington into downloading it and exposing his identity when he was making bomb threats. The FBI has consulted with outside shops, too, including the Italian firm Hacking Team — whose emails were leaked last summer, exposing its business dealings.
“I think that for many within law enforcement, the priority is to access data, point blank. That could mean installing backdoors directly into encryption standards or finding some kind of workaround,” Andrea Castillo, the technology policy program manager for the Mercatus Center at George Mason University, wrote in an email to The Intercept.
“The first strategy failed in the court of public opinion, so it appears that they are now attempting more covert methods to get around encryption. Unfortunately, there are major security risks with both approaches,” she said.
National Security Agency Director Adm. Mike Rogers seems to already be pivoting away from the idea that we need to get rid of unbreakable encryption. He said in January that encryption is here to stay — and that “spending time arguing” about it is “a waste of time.” When pushed by Yahoo News’ Michael Isikoff on whether or not encryption is a crippling threat to the intelligence community, he deflected, suggesting that it’s a bigger issue for domestic local law enforcement.
And documents in the Snowden archive show the NSA has spent years actively trying to hack Apple products and mobile devices. Its efforts to hack the iPhone date back to 2006, before it was even unveiled.
A Big Con?
“Over the past few months, I’ve been wondering why it is the FBI has been pushing so hard in the public forum to advocate for backdoors when almost everyone, from technologists to the tech industry to civil society to Congress, has been opposed to such an approach,” Ryan Hagemann, technology and civil liberties policy analyst for the Niskanen Center, wrote in an email to The Intercept.
“I think what we’re seeing unfold here is part of a multi-pronged strategy by law enforcement, possibly with the tacit approval and support of the intelligence community.”
Hagemann said what the FBI is pursuing is much more dangerous than any legislative route. “I think we should be more fearful of the strategy the FBI is using in the courts to push their ill-advised and Constitutionally dubious agenda.”
Julian Sanchez, a senior fellow at the Cato Institute, recently proposed that the government’s strategy all along has been to use the push for backdoors into encryption as “a feint.”
Writing for the national security law blog Just Security, Sanchez speculated that “the threat of a costly fight over legislation, even if unlikely to become law, may be largely geared toward getting Silicon Valley, or at least a critical mass of companies, to adopt a more cooperative posture. ” That means “quietly finding ways to accommodate the government.”
Sanchez concluded that when the government finally admits the obvious — and gives up on fighting unbreakable encryption — it will demand some sort of “compromise” legislation.
Sanchez imagined “privacy groups celebrating a victory” when that happens, “while intel officials snicker into their sleeves at a ‘defeat’ according to plan.”
Related:
Apple vs FBI: Here’s why Google, Facebook, Microsoft and others are supporting Tim Cook
By Karrishma Modhy / 29 Feb 2016 , 12:20
[Closing para]
Although this is a battle between Apple and the FBI, at a broader level, it’s actually the beginning of something horrendous. As Cook said, ‘it’s about the future.’ As Apple pointed out, the government’s request, “Just this once” and “Just this phone”, wouldn’t end with the San Bernandino case. Online social networking platforms thrive on user privacy, which is critical for users as well. If a law enabling government access to user information is eventually passed, it could potentially trigger the downfall of such massive digital services as Facebook, Twitter, and myriad others.
http://tech.firstpost.com/news-analysis/apple-vs-fbi-heres-why-google-facebook-microsoft-and-others-are-supporting-tim-cook-301498.html
Bully hacking
This piece is too simplistic.
You need to explain the technical makeup of the Iphone. The IOS is not only attack vector, there is underlying code.
To me, this smacks of FBI getting a free pass for stuff it has already being doing. This is nothing but a PR jig between the FBI and Apple.
Look ahead 20 years (or less). People will have mobile communication technology implanted. It will be even more pervasive than today.
Are you sure you wish for the FBI/NSA/ETC to be able to hack you? Physically? That is what’s at stake here.
These fascists should be told to take an unequivocal hike.
FBI has evolved into GESTAPO/KGB like organization. First they excelled in spying, provoking, instigating, coercing in the name of upholding the law and catch ever illusory criminals, and then deteriorated into a mafia, peddling delegalization of previously legal activities, and prosecute retroactively, suspect and third party threats and intimidation (kidnapping, arrest on bogus changes of a family member), straight extortion, and finally making up charges or introducing secret charges, under a veil of national security to end up with brutal force, murder sanctioned by law they wrote themselves. All that while an open blatant theft of national treasure is going on in front of their eyes.
Having said that this recent Apple episode is nothing but propaganda on both sides. On one side, FBI started disgusting campaign of fear and loathing, even CR on Boomberg invited fear mongers who suggested that is if the iPhone is not unlocked a ticking bomb will go off somewhere and Apple would be responsible for it and that if Cook’s family member was kidnapped he would have ordered unlocking immediately, a Gestapo/KGB style threats and baseless Orwellian insinuations of nonsense.
The law said that police may have evidences that are relevant to the case and accessible to law enforcement, previously mostly interpreted as destroyed or damaged beyond repair. Now they have to add to it another category, as inaccessible due to encryption that’s it. No need to change any laws. If a phone (in protected box) was thrown into Mariana trench, FBI will sound ridiculous requiring navy to look for it, knowing exactly that the iPhone is there, and evidences are there. FBI has no right to ALL the evidences only those that can be collated with reasonable effort. It is all so nonsensical that brain screams.
Apple on the other side is just promoting his toughness again US government in order to keep its share in Chinese market that would be devastated if Apple complies with the order.
All of that while FBI/NSA already have a hack, as Snowden himself pointed out, a back door to get any info from iPhone they wanted but they screwed it up and that’s why they want Apple to build another back door.
A comedy of absurd, nothing more than openly revoking our civil rights and human rights of privacy.
Does anyone happen to have access to a link of meme hillary with a mustache? Lol!
FBI has evolved into GESTAPO/KGB like organization. – stigira man
… But in their world and by their accounts … it’s all good … loves wins. Lol!
#Oscars: VP Joe Biden introduces @LadyGaga for performance of ‘Til It Happens to You’
stigira man: The FBI is an interconnected agency within the “military industrial/geopolitical/hollywood/media/edutainment” organizational cult.
@ggreenwald makes the case for protecting your privacy, even if you don’t have “anything to hide.” n.pr/1t7BGxW
https://mobile.twitter.com/TEDRadioHour/status/704169349003780096
Right on video Joanne. FBI Stingray technology has complete access to cell, including mic and lens. Regarding military, which is very very advanced Agencies are using RF weapons on innocent civilians the state has deem dissidents. No trial. Judge, jury and executioner.
May I suggest a book: The Origins of Totalitarianism” by Hannah Arendt, just change a few of the players and add 70 years and there you go. The problem is the lie and collapse after the lie falls apart. The parallels are scary, all we need is a financial coup or an attack or two and it’s game over. The fact we have a charismatic asshole leading the poles should be most disconcerting. Now the thing is, what the FBI is really after? Is it for the public to concede some privacy in the name of all powerful “security”? Public opinion is all important in how propaganda is expounded and digested by the masses. So I think the FBI want’s the masses to concede their false sense of security to garner a (“fake”) real sense of security by disabling encryption protocols. Good fucking luck, let them use good old fashioned techniques to fight crime and let the citizens have a modicum of privacy, for now at least,anyway.
Meanwhile, the ghost of King George lll envisions knighting Sir James Comey and kissing him on both cheeks.
Social communication = Social Dominance.
Investigate the FBI Again.
COINTELPRO 2.0
The big picture in this FBI attack on encryption has to do with mass surveillance and not with any genuine attempt to protect society from terrorists and criminals. It’s part of the growing police state designed to protect the neoliberal ruling class from any hint of popular resistance or protest. It’s about intimidating and controlling the 99% With or without encryption, they collect everything about us and store it in their massive servers for future use against those whom they deem too independent or rebellious.
This attitude is captured elegantly in the song “I’ve got a little list,” sung to the aristocrats by Koko, the Lord High Executioner in Gilbert & Sullivan’s operetta The Mikado
https://www.youtube.com/watch?v=DOzNAKPCR80
They are compiling lists on everybody, regardless of what we are doing today
If somebody should become too unmanageable sometime in the future, they’ll just pore through the list to dig up dirt on that person to discredit or arrest him or her
Whistleblowers like Snowden are portrayed as dangerous not because they threaten security, but because they reveal the dirty secrets of the police state
Very astute, Dr Farr. … One mid-aged maid been schooled 14 years, am I.
If David Cameron can stick his dick in pig an still be Prime Minister of England, what difference does it make if THEY have dirt on someone? Facebook photos? HAH!
http://time.com/4043311/david-cameron-pig-gate-scandal/
This article does a good job of summarizing the primary argument. We also dug up a good summary by Steve Kovach, (plus some others) who says it boils down to three issues:
The government is effectively requiring Apple to develop a new “GovtOS”
The All Writs Act does not grant courts blanket authority
The government’s demands violate Apple’s constitutional rights
We also have uncovered several technical experts who believe that the FBI has already cracked this phone and this case is just a “thin edge of the wedge”
All of our information is linked back out to references for those interested in a full technical and legal review.
https://articles.azstec.com/fbi-vs-apple/
IF you can not crack it in ten tries – it erases everything….START OVER…
but to spent millions and millions when you have no idea if anything at all is on it – is stupid
Now that time has elapsed the information in all probably is useless……….which makes it even dumber-
All true William. The FBI could also take the phone to the NSA and have it compromised if they chose to (and its legal for them to do so).
The obvious conclusion is that, to the FBI, this isn’t about what’s on the phone at all.
It’s a nice apple-add though. All jihadi’s buy i-phone 5c now. Next step possessing an i-phone 5c puts you on the drone terror-list, ouch.
I’m going to make another pitch for a high quality C++ encryption library. It has to be Boost/STL level quality or better. People here take for granted that unbreakable encryption is a given. I even had one of the writers point me to a C++ library he thought was sufficient. It wasn’t.
What confidence do you have that any of the current encryption libraries are actually unbreakable or secure from tampering or trojans? Boost Libraries are peer reviewed. The only higher standard I know of are STL Libraries which are peer reviewed to the nth degree.
It has to be put out there and used in a variety of environments before you can have confidence in it. There are only a few people I know of who have taken Boost Library on to become a part of the STL, Jens Maurer, Steven Watanabe
It is the programming equivalent of climbing mount Everest.
This is what a high quality library looks like: http://www.boost.org/doc/libs/1_46_1/doc/html/boost_random.html
History and Acknowledgements
In November 1999, Jeet Sukumaran proposed a framework based on virtual functions, and later sketched a template-based approach. Ed Brey pointed out that Microsoft Visual C++ does not support in-class member initializations and suggested the enum workaround. Dave Abrahams highlighted quantization issues.
The first public release of this random number library materialized in March 2000 after extensive discussions on the boost mailing list. Many thanks to Beman Dawes for his original min_rand class, portability fixes, documentation suggestions, and general guidance. Harry Erwin sent a header file which provided additional insight into the requirements. Ed Brey and Beman Dawes wanted an iterator-like interface.
Beman Dawes managed the formal review, during which Matthias Troyer, Csaba Szepesvari, and Thomas Holenstein gave detailed comments. The reviewed version became an official part of boost on 17 June 2000.
Gary Powell contributed suggestions for code cleanliness. Dave Abrahams and Howard Hinnant suggested to move the basic generator templates from namespace boost::detail to boost::random.
Ed Brey asked to remove superfluous warnings and helped with uint64_t handling. Andreas Scherer tested with MSVC. Matthias Troyer contributed a lagged Fibonacci generator. Michael Stevens found a bug in the copy semantics of normal_distribution and suggested documentation improvements.
We’re *at least* two years away from a top-of-the line C++ crypto library. Right now, there isn’t enough of an incentive for large projects to write C++ code. Big projects like VLC,and ffmpeg, along with core libraries like OpenSSL, are proof of this. For more on why, see Niall Douglas’s “Large Code Base Change Ripple Management in C++”. There are several things that C++ needs before we have a tip-top, whole-community reviewed, (maybe even) formally verified, C++ crypto library:
I lost my longer post (grr!!!!!) so I’ll try to type it again as several posts. Before I list the reasons, imma email TheIntercept and suggest a confirmation dialog before letting me accidentally hit “Cancel”. Again, grr.
So where was I…
1. C++’s type safety isn’t yet good enough to pull developers in large projects away from C. Concepts (and some form of constraints) are coming in C++1z, which help quite a bit, but they aren’t quite powerful enough to overcome the “negative” incentives to stay with C. OSR has a crypto library of some sort that heavily uses SAL to statically check usage, but that’s only useful on MSVC, and is still very C-like. (see their article, named something like:”SAL: Don’t hate me because I’m beautiful”)
(more to come in the next post)
2. C++1z *might* get some form of operator sizeof that works with the kind of dynamically sized “chunk”/”block” allocations that are common in performance-critical code, where a dynamically sized array is allocated at the end of a struct/class (i.e. `int arrayInts[];`/`int arrayInts[1];`). This thereby itself is amazingly useful, and (because it may even need constexpr) is unlikely to be “backported” to C. This would help with memory safety issues, and generally lead to cleaner code. Microsoft’s SAL has a kinda-functional version of this for static analysis in the _Field_size_ annotation.
3. Modules. This is a big part of Niall Douglas’s paper. C++ modules is a “killer feature” that’s coming in C++1z, that will tremendously cut compile times, may enable generation of faster code, and hopefully fixes all sorts of ODR fiascos. C programmers are most definitely staying away from C++ as long as templates nuke C++ compile times. Modules are also an important part of the next reason.
4. C++ still lacks a standard ABI. This is also a part of that paper. This is why library writers need to use “extern C” on all of their interfaces, and (as I understand it) a big pain for getting Modules to work.
5. We still don’t have the kind of static analysis tools that the aforementioned reasons make much easier to build. I think you can totally build these for C, but I bet they’ll require much less effort to USE in C++. These are several years off, but very aggressively sought after. In a perfect world these would do most of what a thorough peer review process hopes to accomplish, or maybe even more. In a very small capacity, I’m working on these myself.
Large code base change ripple management: http://arxiv.org/abs/1405.3323
SAL Annotations: Don’t Hate Me Because I’m Beautiful:
https://www.osr.com/blog/2015/02/23/sal-annotations-dont-hate-im-beautiful/
(this is the last post of that “thread”)
The first thing to do is get a project named, and lined up for acceptance into the Boost Libraries. Get a project going and announce it as a candidate for the Boost library. You can save a lot of development time by following the Boost Random library development. Naming conventions, unit tests, etc. a lot of design decisions are already laid out. Don’t re-invent the wheel.
A little bit of money from sponsors would push things along nicely. Accelerate development.
The con is that this would significantly stop terrorism. The terrorist would just fine alternative ways to commit acts of violence. Was there terrorism before all this technology? Actually, this would be counter-productive, because it would cause a decrease in using technology by the terrorist and would create a vacuum in the intelligence community. The terrorists would become more close knit in their dealings with each other.
Exactly, the British intelligence agency since the end of the Cold War no longer required the services of many of their on the ground agents and instead created a reliance on technology to conduct their ‘intelligence’ operations. After 9/11 that was suppose to change but the agency stated it would take 10 years to develop the level of on the ground agents it had before. And, since 9/11 efforts have been made to ensure all agencies in the US cooperate and work together.
“Sanchez imagined “privacy groups celebrating a victory” when that happens, “while intel officials snicker into their sleeves at a ‘defeat’ according to plan.””
This is exactly what happened when the govt let the (landline only) phone record collection be “dismantled” (and the intelligence agencies were oddly silent about) and replaced it with monitoring of landline and cell phone number monitoring – with the not so bright privacy groups declaring victory and the surveillance brigade smiling in the background.
http://www.theguardian.com/us-news/2015/jan/29/obama-end-nsa-phone-records-collection-privacy-board
Nothing to see here, the FBI is just doing it’s job of dismantling your 1st Amendment protections. Is it time for the challenged conservative troglodytes to resist government intrusion, or will they keep ignoring threats to the 1st Amendment simply because it doesn’t mention guns? …and then what comes next? I imagine just a spectacular array of flavors for this new kind of crazy.
If only the Fathers had had the foresight to combine the 1st and 2nd Amendments, so that we couldn’t have guns without speech.
The Best Way the Apple case to wind up at the SCOTUS is as the Beloved Child Prodigy of the Starkly Unanimous Riley vs. California.
I’ll assume most of us have noticed how reticent DOJ and FBI advocates, current and former prosecutors, investigators, and admins are to make passing reference to (let alone cite) the 2014 Riley vs California SCOTUS decision on LEO access to smartphone data on or off your device. Its been almost two years and nary a peep.
I believe the clear discomfort of the DOJ and FBI with the Rileys SCOTUS decision may, in part, explain the “spaghetti at the wall” quality of all those recently released “All Writ” Apple DOJ filings.
The All Writs Act authorizes the US federal courts to “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
Read another way the All Writs Act of 1789 (part of the same legislation which formed the effing federal judiciary) seemingly encourages activist judges Populating the Lower Courts to willfully disregard the decisions of the Supreme Court of the United States (SCOTUS) at the behest of the Department of Justice and the Federal Bureau of Investigation (Executive Branch).
Symposium: In Riley v. California, a unanimous Supreme Court sets out Fourth Amendment for digital age
http://www.scotusblog.com/2014/06/symposium-in-riley-v-california-a-unanimous-supreme-court-sets-out-fourth-amendment-for-digital-age/
The Court’s unanimous decision in the cellphone privacy cases brought the Fourth Amendment into the digital age. The opinion by the Chief Justice rests on a simple truth: “Cell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee’s person.” The outcome follows logically from the text of the Fourth Amendment: “get a warrant” before searching a cell phone seized after an arrest. But that is only the starting point. The Court’s opinion is Riley v. California signals a Court more prepared to engage in the challenges of the digital age ahead.
The Court’s conclusion that data is different will affect not only digital search cases, but also the NSA’s bulk record collection program, access to cloud-based data, and the third-party doctrine. If the sheer volume of sensitive data stored on cellphones makes them different in kind than physical notes or address books, the same can be said about laptops, tablets, and servers. The Second Circuit has already held that officers must delete seized data that is not within the scope of a search warrant, and the reasoning in Riley supports that conclusion.
The Court identified several quantitative differences that underscore the decision to afford cell phones and other “digital containers” greater Fourth Amendment protection than their physical analogs. First, the “immense storage capacity” of cellphones allows “millions of pages of text, thousands of pictures, or hundreds of videos” to be stored and transported. Second, cellphones facilitate the collection and aggregation “in one place of many distinct types of information,” as well as data dating back “to the purchase of the phone, or even earlier.” Chief Justice Roberts explained, “there is an element of pervasiveness that characterizes cell phones but not physical records.”
But it was not just the quantity of records at issue in Riley that justified increased Fourth Amendment protection, it was also a qualitative difference in the digital records created and stored on cell phones. This data includes “private information never found in a home in any form.” The Eleventh Circuit reached a similar conclusion when it held recently that cellphone location records are protected by the Fourth Amendment.
The Court also notes that cellphones are not only a repository of sensitive personal data, they are also a portal to private records stored on remote servers. The physical container analogy used by the Government to justify the search-incident-to-arrest rule “crumbles entirely when a cell phone is used to access data located elsewhere, at the tap of a screen.” And this problem is compounded by the fact that “[c]ell phone users often may not know whether particular information is stored on the device or in the cloud, and it generally makes little difference. See Brief for Electronic Privacy Information Center in No. 13-132, at 12-14, 20.”
The Court rejected outright the government’s proposal that agencies “‘develop protocols to address’ concerns raised by cloud computing.” The Chief Justice stated plainly that “the Founders did not fight a revolution to gain the right to government agency protocols.” No doubt that sentence will be quoted in the current challenges to the NSA’s bulk collection program, which the government has defended based on its own, self-imposed privacy safeguards.
The Court’s analysis of the qualitative differences with data implies (1) that files stored in the cloud are deserving of the same (if not more) protection than physical “papers and effects,” and (2) that certain types of information are deserving of special protection. This should not be surprising, since we have already given heightened protection to one special category of information: the contents of communications. But in Riley the Court also explicitly rejected the government’s argument that call logs and other “metadata” are not deserving of Fourth Amendment protection.
The Court’s argument takes clear aim at the third-party rule – that “non-content” records like call logs, location data, and other metadata held by third parties can be collected by the government without a warrant. Like the data stored on cell phones, metadata can reveal “an individual’s private interests and concerns … can also reveal where a person has been” and there is an “element of pervasiveness” in the collection of all metadata records about an individual. Citing Justice Sotomayor’s concurrence in United States v. Jones, the GPS tracking case from the October Term 2011, the Chief Justice wrote:
Although the data stored on a cell phone is distinguished from physical records by quantity alone, certain types of data are also qualitatively different. An Internet search and browsing history, for example, can be found on an Internet-enabled phone and could reveal an individual’s private interests or concerns—perhaps a search for certain symptoms of disease, coupled with frequent visits to WebMD. Data on a cell phone can also reveal where a person has been. Historic location information is a standard feature on many smart phones and can reconstruct someone’s specific movements down to the minute, not only around town but also within a particular building.
This does not bode well for the government in the continued litigation over the NSA’s surveillance of Americans. In defending the NSA’s massive collection of the telephone records of all Americans, the government has argued that the collection of this metadata is “materially indistinguishable” from the collection of a single telephone number permitted by the Court in Smith v. Maryland, a case decided in the era of the rotary dial phone. Addressing the government’s claim that there is little difference between the search of cellphone data and the physical search the Court had previously allowed following an arrest, Roberts said, “That is like saying a ride on horseback is materially indistinguishable from a flight to the moon. Both are ways of getting from point A to point B, but little else justifies lumping them together.”
The Smith issue was not squarely presented because the government did not argue in either case that a search had not occurred. But Roberts did point to the distinguishing facts when that case is squarely presented: “Moreover, call logs typically contain more than just phone numbers; they include any identifying information that an individual might add, such as the label ‘my house’ in Wurie’s case.” A brief field trip to Bluffdale, Utah, the home of the NSA’s new massive computing facility, will no doubt reveal that we are long past the era of horseback and also the rotary phone.
The Riley decision also points to a reconceptualization of searches in the digital age that may move the home from the center of the Fourth Amendment universe. As the Court explained, “Indeed, a cell phone search would typically expose to the government far more than the most exhaustive search of a house: A phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form unless the phone is.” Justice Kagan hinted at this result in her concurrence in Florida v Jardines, the dog sniff case from last Term. Joined by Justices Ginsburg and Sotomayor, Kagan imagined the search of a home from the front door using high-powered binoculars. The violation of privacy described is both the trespass on private property and the invasion of a reasonable expectation of privacy. And once the records of the home are digitized, uploaded, and stored on a small device that everyone carries, it is the person’s data and not the person’s domicile that may be paramount.
There is also in the Court’s Riley opinion a subtle but significant shout-out to Justice Brandeis and his famous dissent in Olmstead, the 1928 wiretap act. In that case, Brandeis rejected the Court’s limited application of the Fourth Amendment, which found no warrant requirement for the interception of telephone communication. Brandeis argued that the Constitution must be adapted to the demand of the modern age, suggesting that “[t]he progress of science in furnishing the Government with means of espionage is not likely to stop with wiretapping.” It was not just the tapping of the telephone that concerned Justice Brandeis. He also anticipated many of the modern investigative techniques, such as the phony cellphone towers known as “Stingray” and the government’s surreptitious access to private files stored on remote cloud servers. “Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home.”
Chief Justice Roberts paid homage to Brandeis in Riley with this excerpt, discussed in the 1886 opinion Boyd v. United States:
Our cases have recognized that the Fourth Amendment was the founding generation’s response to the reviled “general warrants” and “writs of assistance” of the colonial era, which allowed British officers to rummage through homes in an unrestrained search for evidence of criminal activity. Opposition to such searches was in fact one of the driving forces behind the Revolution itself. In 1761, the patriot James Otis delivered a speech in Boston denouncing the use of writs of assistance. A young John Adams was there, and he would later write that “[e]very man of a crowded audience appeared to me to go away, as I did, ready to take arms against writs of assistance.”
Brandeis revered the Boyd decision, which held that a government subpoena for private business records violated both the Fourth and Fifth Amendment. He wrote in the Olmstead dissent that Boyd “will be remembered as long as civil liberty lives in the United States.”
It is no small matter that the Chief Justice pulled this reference from the Olmstead dissent. In words that also echoed the Olmstead dissent, Roberts concluded for a unanimous Court in Riley, “The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought.”
[1] Marc Rotenberg is President of the Electronic Privacy Information Center (EPIC) in Washington, DC. He teaches Information Privacy Law at Georgetown University Law Center. He has authored more than fifty amicus briefs on emerging privacy issues for federal and state courts. Alan Butler is EPIC Appellate Advocacy Counsel. Rotenberg and Butler co-authored the amicus brief for EPIC in Riley v. California.
Posted in Riley v. California, U.S. v. Wurie, Cell phone privacy symposium, Merits Cases
Recommended Citation: Marc Rotenberg and Alan Butler , Symposium: In Riley v. California, a unanimous Supreme Court sets out Fourth Amendment for digital age, SCOTUSblog (Jun. 26, 2014, 6:07 PM),
Syed Rizwan Farook and his wife are the ACCUSED killers.
That Mclaughlin and Froomkin want to repeat a verdict which
was created without a real investigation
by the people who killed Farook and his wife
as if it is a proven fact
is shoddy journalism.
Is it too difficult to include the word “accused” in your reporting
or do you need to believe the words of the authoritarian killers
who have mangled the case?
Is this something that’s truly necessary?” Snowden asked. “Or is it a measure of convenience?”
would those supportive of compelling Apple to harm their product by providing access to the encryption keys similarly support compelling doctors to harm a patient? And reporters, if you talk to DOJ or the FBI about Apple, please ask them why the FBI hasn’t sought the NSA’s help nor mentioned anything about it?
Snowden told the crowd he would return if U.S. authorities guaranteed a fair trial. “They responded with a letter from the attorney general that promised I would not be tortured,” he said.
The crowd laughed.
“So let’s say that’s still a work in progress.”
___________________________________________________
The ziomasonsatanists and their puppets must begin the precedent of calling things by its name. why?
~Torture=enhancement interrogations techniques?
~encryption=know it all to store it all & use it to harm you covertly.
~the land of the free= worst than all the kosher stalinist, kosher bolchevist, kosher hitlerianism, kosher satanjewhoo combined.
– natural or organic=poison of monsanto gmo wanna be false food products and toxic pesticides.
– Alejandro Grace Ararat.
https://youtu.be/M94ZO6jYU6c
No one seems to be asking the far more pertinent question: “Why does your government want to do this?” followed by “Why are the people who you pay to serve you all allowed to behave in this manner, totally contrarily to what is in your best interests?”
These guys seem to be setting the tune and you are all dancing along. You really are a nation of morons led by pigs.
Everybody spy’s on me, the cops and the corporations and the crooks; it sucks. I do worry most about the secret police and about the terrorists after I worry about getting hit by lightening. However, the cops can get a warrant and kick down my door but they can’t get into my phone? What am I missing here? They can trump up some charges and put me in jail but they can’t get into my phone; how come the phone is more important than me? Just saying!
The reason they kick down your door is because you have a lock on it. So why should you be able to lock your door, but not your iPhone? Some people argue that a law banning locks would allow not only the police but also thieves to enter your home. In other words, it would lower everyone’s security just for the sake of making police work a bit easier.
However, my own theory is that the FBI wishes to lose this case, since they have a lot more to gain if Apple wins.
Maestro!
ELECTRONIC FRONTIER FOUNDATION
DEFENDING YOUR RIGHTS IN THE DIGITAL WORLD
Riley v. California and United States v. Wurie
EFF and the Center for Democracy and Technology (“CDT”) have asked the U.S. Supreme Court to crack down on warrantless searches of cell phones, arguing in two cases before the court that changing technology demands new guidelines for when the data on someone’s phone can be accessed and reviewed by investigators.
The amicus briefs were filed in Riley v. California and United States v. Wurie. In both cases, after arresting a suspect, law enforcement officers searched the arrestee’s cell phone without obtaining a warrant from a judge. Historically, police have been allowed some searches “incident to arrest” in order to protect officers’ safety and preserve evidence. However, EFF and CDT argue that once a cell phone has been seized, the police need a search warrant to search the data on the phone.
In June 2014, the Supreme Court unanimously ruled that the search incident to arrest exception does not extend to a cell phone and that police need to get a search warrant in order to search an arrestee’s phone after arrest.
Case status:
Victory
EPIC
Riley v. California
Concerning the Constitutionality of a Warrantless Cell Phone Search Incident to Arrest
The Supreme Court held in a unanimous decision by Chief Justice Roberts, that police generally require a warrant in order to search cell phones, even when it occurs during an otherwise lawful arrest. The Chief Justice explained that analogizing a search of data on the cell phone to a search of physical items is akin to “saying a ride on horseback is materially indistinguishable from a flight to the moon. Both are ways of getting from Point A to Point B but little else justified lumping them together.” The Court also emphasized that “the fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought. Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple–get a warrant.”
EPIC’s amicus brief, joined by twenty-four legal scholars and technical experts from the EPIC Advisory Board, was cited twice in the Court’s opinion, on pages 20 and 21 and the Court also adopted other portions of the brief without explicit reference. The Court stated:
Mobile application software on a cell phone, or “apps” offer a range of tools for managing detailed information about all aspects of a person’s life. There are apps for Democratic Party news and Republican Party news; apps for alcohol, drug, and gambling addictions; apps for sharing prayer requests; apps for tracking pregnancy symptoms; apps for planning your budget; apps for every conceivable hobby or pastime; apps for improving your romantic life. There are popular apps for buying or selling just about anything, and the records of such transactions may be accessible on the phone indefinitely. There are over a million apps available in each of the two major app stores; the phrase “there’s an app for that” is now part of the popular lexicon. The average smart phone user has installed 33 apps, which together can form a revealing montage of the user’s life. See Brief for Electronic Privacy Information Center as Amicus Curiae in No. 13-132, p. 9.
To further complicate the scope of the privacy interests at stake, the data a user views on many modern cell phones may not in fact be stored on the device itself. Treating a cell phone as a container whose contents may be searched incident to an arrest is a bit strained as an initial matter. See New York v. Belton, 453 U. S. 454, 460, n. 4 (1981) (describing a “container” as “any object capable of holding another object”). But the analogy crumbles entirely when a cell phone is used to access data located elsewhere, at the tap of a screen. That is what cell phones, with increasing frequency, are designed to do by taking advantage of “cloud computing.” Cloud computing is the capacity of Internet-connected devices to display data stored on remote servers rather than on the device itself. Cell phone users often may not know whether particular information is stored on the device or in the cloud, and it generally makes little difference. See Brief for Electronic Privacy Information Center in No. 13-132, at 12-14, 20. Moreover, the same type of data may be stored locally on the device for one user and in the cloud for a
I think that the government just ought to create a website called
giveusallyourdata.gov and then those who “have nothing to hide” can just share everything!
Rival Phone Makers Reluctant To Support Apple In FBI Battle
Only one Asian phone company has publicly backed Apple in its fight with FBI.
02/26/2016 12:56 pm ET
MUMBAI/SINGAPORE (Reuters) – As Apple Inc resists the U.S. government in a high profile stand-off over privacy, rival device makers are, for now, keeping a low profile.
Most are Asian companies – the region produces eight of every 10 smartphones sold around the world – and operate in a complex legal, political and security landscape.
Only China’s Huawei has publicly backed Apple CEO Tim Cook in his fight to resist demands to unlock an encrypted iPhone belonging to one of those who went on a shooting rampage in San Bernardino, California in December.
“We put a lot of investment into privacy, and security protection is key. It is very important for the consumer,” Richard Yu, chief executive of Huawei’s consumer business group, told reporters at the Mobile World Congress earlier this week.
But Yu stopped short of saying explicitly that Huawei would adopt the same stance. “Some things the government requires from vendors we cannot do,” he said, citing an example of unlocking an encrypted Android device. “These are important things for the consumer, for privacy protection.”
(cont.)
http://www.huffingtonpost.com/entry/apples-rivals-keep-low-profile_us_56d082b5e4b03260bf7693b4
That’s ironic, because the U.S. Govt. has long suspected Huawei of covertly consenting to Chinese intelligence agenices’ requests. That’s why Huawei Telecom can’t supply any equipment to the U.S. Govt.
It is nothing but propaganda on both sides. On one side, FBI started disgusting campaign of fear and loathing, even CR on Boomberg invited fear mongers who suggested that is if the iPhone is not unlocked a ticking bomb will go off somewhere and Apple would be responsible for it and that if Cook’s family member was kidnapped he would have ordered unlocking immediately, a Gestapo/KGB style threats and baseless Orwellian insinuations of nonsense.
The law said that police may have evidences that are relevant to the case and accessible to law enforcement, previously mostly interpreted as destroyed or damaged beyond repair. Now they have to add to it another category, as inaccessible due to encryption that’s it. No need to change any laws. If a phone (in protected box) was thrown into Mariana trench, FBI will sound ridiculous requiring navy to look for it, knowing exactly that the iPhone is there, and evidences are there. FBI has no right to ALL the evidences only those that can be collated with reasonable effort. It is all so nonsensical that brain screams.
Apple on the other side is just promoting his toughness again US government in order to keep its share in Chinese market that would be devastated if Apple complies with the order.
All of that while FBI/NSA already have a hack, as Snowden himself pointed out, a back door to get any info from iPhone they wanted but they screwed it up and that’s why they want Apple to build another back door.
A comedy of absurd, nothing more than revoking our privacy rights.
All people who are aware already know that allowing FBI, Sheriffs or PDs access to communications will do zero to stop crime and or terrorism, as the criminals will simply stop using such devices. This means that only law abiding people will become targets of the Jack Booted Thugs of law enforcement. So if you know any of the jack a$$e$ who support such decisions, then please do us the favor of kicking them in the shins.
Suggested weekend reading:
Buyer’s Remorse, by Bill Press
Dark Money, by Jane Mayer
No Such Thing as a Free Gift, Linsey McGoey
The Devil’s Chessboard, by David Talbot
Don’t forget the history of the Rothschild family.
I don’t trust Comey. Among his past employers is Lockheed Martin who was hired awhile back by Walmart to monitor their employees for union organizing activities.
Now with those encrypted iPhones they use, this can prove difficult.
Not unheard of for Lockheed Martin to contact a past employee (former Senior Counsel Comey, Lockheed Martin) to get the goods on Apple’s encryption scheme.
Nope, don’t trust Comey one bit . . .
According to Wiki, FBI Director Comey was also on the “London-based board of directors of HSBC Holdings” around 2010, around the time they were busy laundering some $2 billion in Sinaloa Cartel drug money – this might help explain why Loretta Lynch (Attorney General of the USA) declined to file any criminal charges and instead offered HSBC a “deferred prosecution agreement” for laundering the drug money procured by Joaquin “El Chapo” Guzman. She then had the nerve to call the capture of Guzman “a vindication of the rule of law in our countries”. . . you really can’t make this stuff up.
Just to restate: the head of the FBI worked for the bank that laundered billions in drug cartel money and then that bank was not criminally charged by the US Attorney General but rather given a ‘deferred prosecution agreement’ – how many street level cocaine dealers and cross-border drug mules get one of those? – and now these people want the ability to snoop into everyone’s phone? Just trust us? What is this, a Daily Show skit?
It’s incomprehensible – who do they think they’re fooling? My general belief is that the U.S. federal bureaucracy today is just as corrupt, self-serving and dysfunctional as the Soviet bureaucracy in the days of Leonid Brezhnev was – and this is just more confirmation.
http://articles.latimes.com/1988-06-25/news/mn-4984_1_soviet-union
“Declaring that Brezhnev’s mistakes will take years to correct and can never be forgiven, Soviet historians, political commentators, foreign policy analysts and Communist Party officials condemned him in unprecedented terms and with unremitting severity in a full media assault on a man once hailed here as a ‘second Lenin.'”
And it won’t do a thing to “prevent” crimes. People who want to commit crimes will engage in conspiracies that don’t involve electronic devices, hand written or typed messages can still be encrypted and without the “key” will take a long time to unlock, or communications will be face to face in places they know cannot be monitored.
The whole fight isn’t about what it claims to be about i.e. fighting crime. It’s about mass surveillance for its own sake and crushing dissent.
^ This.
It’s a testament to general gullibility that the PTB even bother to continue to argue in public that this is a significant security or law enforcement issue.
Also, Jenna & Dan, this is, by far, the most incisive piece on this subject in TI to date.
Yes, this is correct. They want real-time access to unencrypted iMessage backups on iCloud guaranteed from Apple for all time. The best solution for law enforcement is to have criminals think their iMessages are secure when they aren’t. A loss would serve to confuse criminals. But this is what they want at a minimum. Of course, they want everything else too.
A sidebar: Donald Trump wants to be able, as President, to sue critics for libel. (But see New York Times Co. v. Sullivan, 376 U.S. 254 (1964) for a historic Court ruling on this.)
http://www.politico.com/blogs/on-media/2016/02/donald-trump-libel-laws-219866
On point here insofar as stories like this might, if interpreted as personal libel against the AG or the sitting President, subject the news source to a lawsuit with all the weight of official authority behind it. That, coupled with the power to monitor anyone’s phones, could mean final blackout.
WHAT??? This is some scary stuff. Don’t folks get it?
No. No they don’t. That is what the MSM seems to be telling us. I believe that far more people get it, but not so much the MSM. So it looks like only the Intercept will cover it…
What I’d like to see is a president so bad, so Tiberian, so Caligulan, that Congress finally realizes that it’s been cuckolded since at least FDR. And gets up off its ass and does something about the upstart executive branch. Trump could be The One.
Imperial presidency indeed (snort).
Yes, well, last night we had Nero, Caligula and Commodus debating who should be Emperor.
Hell of a mud fight I gather too!
The Donald will come in a triumphal procession. And his next wife.
https://www.youtube.com/watch?v=vN-ttCBHyx8
This is why more people need to focus on GNU/Osmocom firmwares. When the tech bubble pops, plenty of the engineers from Qualcomm, Intel and Broadcom should switch their efforts to open and verifiable firmwares.
Sanchez imagined “privacy groups celebrating a victory” when that happens, “while intel officials snicker into their sleeves at a ‘defeat’ according to plan.”
I am afraid that this is more than a conjecture – it is a distraction. At the end law enforcement gets what it wants and the average Joe will continue to think that Apple won.
Sanchez imagined “privacy groups celebrating a victory” when that happens, “while intel officials snicker into their sleeves at a ‘defeat’ according to plan.”
A case in point, the USA Freedom Act.
Consider the nightmare Orwellian mass surveillance strategy that the FBI might be after:
1) Stingrays (cell-site simulators) are widely deployed around the U.S. by local police agencies and regional FBI offices. These devices trick phones into broadcasting their locations to the devices.
2) If the FBI and local police agencies get their hands on a malware program that can fool a phone into thinking it is an automatic security update (an Apple iOS simulator, you might call it), then they could remotely plant that malware on any phone via their Stingray systems.
3) Thus, any phone could be converted into a piece of spyware, not only transmitting all user-entered data, but also acting a remote camera and microphone, transmitting everything back to the FBI or local police via Stingray systems, without the user’s knowledge. Potential for abuse? Really, need one ask?
Note that it’s pretty clear the NSA already has this capacity, if one reads the Snowden files and considers his concerns over journalist Ewen MacAskill having brought his cell phone into the meeting in Hong Kong with Greenwald and Poitras. And see this:
http://www.ibtimes.com/apple-asks-why-hasnt-fbi-asked-nsa-break-iphone-encryption-2325047
The answer is likely that the FBI and local police agencies want this capability themselves, without having to go to the NSA (which would presumably not be willing to give up its own in-house software to local police or FBI agents).
Now, the police and FBI claim that ‘every lead related to the San Bernardino shooting should be pursued’ as their rationale for forcing Apple to build malware that defeats its own device’s security – but that’s not true, either – since they are not investigating within Saudi Arabia, where the two killers were married, they are not trying to track down who was at the wedding and interview them – because of diplomatic opposition, oil-money and arms-trading deals, etc. Instead, they want to use the issue as a Trojan horse, with the real goal being to increase domestic mass surveillance.
Finally, any real terrorist or foreign government spy follows “hide in plain sight” rules, based on constructing a plausible identity (including using a phone) that appears fairly normal and innocuous (i.e. 9/11 hijackers posing as wealthy Saudi playboys learning to fly jets) – such people are not going to be ‘fooled into using supposedly secure devices’ in any case.
All in all it looks like the FBI and local police agencies have a desire to get back the J. Edgar Hoover days – if not the STASI and Gestapo days.
“Quietly finding ways to accommodate” sounds a lot like bending over something – discretely. And only a proper cynic would believe the whole FBI / Apple dust up a possible distraction or feint. So I like Mr. Julian Sanchez, he seems such a diplomatic “fellow.”
You know one of the reasons I have been so adversarial or confrontational or an ass or whatever you want to consider it to commentors on this excellent site is I feel violated. In a gross way and probably that is why I denied this feeling? Obama’s 2008 campaign, for the first time, I felt a connection with the President. Not like a meeting of the eyes in a big crowd connection but a connection that would materially affect my daily life, my family’s daily life in a positive way. It was as if he sat in my living room and witnessed some of the struggles we have been through and was going to fight the powers that be. The words in his speeches worked really well on me. I had his back if he needed me to watch it.
he turned out to be the worst President in my lifetime. He lied to me. He is making the struggles worse. He is making life more and more connected to a leash that the government gets to yank when it feels like it. Was my head so far up there that I couldn’t see any of this?……. Yup
Being not particularly tech-saavy, I’m a bit confused as to the difference between the inability to break encryption and the ability to get around it.
They want a version of iOS that they can load on the phone and bypass the password attempt limit and the auto-wipe feature of the phone. Available online is consumer data recovery software for the iPhone, the government does not want to waste time.
A simple way to look at is that getting around encryption is getting access to the data where it is stored without encryption, such as on the user’s personal device. (There can be more to it, but that is a start.) That is why the FBI wants to be able to try pass codes quickly on the San Bernardino phone. Eventually they will get access to it if they keep trying. Then they can see and do whatever the rightful user could.
In that particular iphone, the key to decrypt the harddisk with the data on it is stored in a chip. The iOS operating system communicates with that chip.
What the feds want in this case is to order Apple to create a special version of their Operating System which does not have the number of guesses per hour limit, and for Apple to cryptographically sign this new iOS so that it could be uploaded to a phone. The feds then intend to try every combination of password to get into the device.
Apple objects, because: 1) it forces them to create a product that does not exist [compelled labour] and sign something they don’t wish to make, and 2) once this software is created, it can be uploaded to any iPhone of the same make, thus eliminating privacy in all of them for everyone.
(As a side note, the ability for the OS to control the rate at which password guesses can be made, was a security flaw, and has since then been fixed on newer iPhones by moving that functionality onto the chip)
For example, a keystroke logger remotely installed on someone’s computer which records every keystroke in a plain text file is a work-around. Even if the person’s email is then sent as a strongly encrypted file, which can only be deciphered by someone with the right key, it doesn’t matter because the plaintext file was recorded before encryption. The nature of the encryption system is then irrelevant; there’s no need to break the encryption process itself.
Another work-around would be using video surveillance to capture the person entering their passcode, etc.
These kind of tools do exist and might be employed in a targeted investigation of a specific person by the FBI – but they are rather impractical as tools of mass surveillance. (For example, a keystroke logger might be hidden in an email attachment which an unsuspecting person opens – but this requires a rather targeted approach).
What this also means is that the FBI already has all the tools it needs to conduct specific targeted investigations of suspicious individuals (for whom a surveillance warrant has been issued by a judge, based on sworn testimony of FBI agents) – it just takes more work and time.
What they want with this Apple case, however, is a tool of mass surveillance, and that should never be allowed.
Not being particularly tech-savvy myself, I can explain (as opposed to a tech-savvy person who would just confuse the issue). When you exchange messages with someone, you don’t actually do the encryption or decryption – you tell your computer to do it for you. The FBI can also simply tell your computer to do it – providing they have a way to control your computer.
Thank-you one and all. I now have a much clearer picture of what we’re talking about here.
I’m fascinated by the legal implications of all of this. Apple looks like they are going to make a First Amendment claim as part of their fight: essentially that code is speech and is, thus, protected. Jennifer Granick, in this article (http://www.wired.com/2016/02/apple-may-use-first-amendment-defense-fbi-case-just-might-work/) says the stronger First Amendment argument is that the signature is the speech which should be protected because that is essentially Apple saying “this is safe to use.”
All of that is fascinating in itself. But I think there is a broader confluence of of rights here. The First, Fourth, and Fifth Amendment rights we have coalesce in this case. We spend the majority of time talking about what we are allowed to say under the First Amendment. But free expression also implies the right NOT to say things. This interpretation is confirmed in the Fourth Amendment that protects us from unreasonable search and seizure. Our right not to say something is clearly a privacy issue. Furthermore, our Fifth Amendment rights not to incriminate ourselves might apply to information we keep private. These three amendments work together in many ways.
While the government might well argue that any communication that I make in public — and perhaps they might argue that any conversation I have over the cellular network isn’t private — I think it is harder to argue that data stored on my personal device, phone or otherwise, is anything but private. In effect, then, compelling someone to allow the government to acquire data that we have gone to some lengths to protect as private — making moot any argument that there is no reasonable expectation of privacy — is a violation of our Fifth and First Amendment rights as it not only compels, in effect, our speaking against ourselves, but because it compels any expression at all.
I’m not sure of the case law on this and what actual legal footing this is based on, but it sure clarifies for me how pernicious these attempts to violate our privacy are.
@Bodhi –
Not a lawyer, but our points sure resonate with me. Great thoughts.
@Bodhi and everyone –
On point with your post, this was in The Guardian. Scary stuff for sure…
http://www.theguardian.com/commentisfree/2016/feb/26/can-government-force-you-to-unlock-your-phone-fifth-amendment
What if the government grants immunity to phone’s owner for unlocking it?
That would remove self-incrimination.
What is to prevent the FBI from intercepting an email from a family member, installing malware, and sending it on to the recipient to be opened as usual?
What you are referring to is the classic “man-in-the-middle” attack. Google “man in the middle” for technical descriptions of it, as well as means to protect against it. Peruse this forum for a start:
http://www.linuxquestions.org/questions/linux-security-4/can-encryption-beat-a-man-in-the-middle-attack-769809/
People don’t have a right to cyberspace. The common herd can’t be allowed to wander about, muddying up the cyber waters for everyone else.
The FBI wants a ‘front door’ i.e. to pwn your device and decide who gets access. You’ll be permitted to use it, providing you don’t break any laws. Think of it as their device which you are permitted to use, not as your device which they are permitted to access.
Hiding anything will no longer be an option. But if you do as you’re told, then you have nothing to fear.
@Benito. So true. We should just be glad that they are here to protect us from our freedoms.
That sounds great. They’ll be paying for my next computer. Woo-hoo!
They’ll own it, but you’ll still have to pay for it. After all, we live in a right wing dictatorship, not a left wing one.
However, in exchange, people can choose an iPhone with fancier bells and whistles to show off their status. So at least no one has to suffer the injustice of enforced equality.