Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

US Argues for ‘Modest’ Apple Help in Attacks Probe

The Justice Department argued Thursday that compelling Apple to help unlock an iPhone in California is a modest demand which may turn up evidence of a terrorist attack.

The Justice Department argued Thursday that compelling Apple to help unlock an iPhone in California is a modest demand which may turn up evidence of a terrorist attack.

The government’s response was the latest in the legal battle which has stirred an intense debate on whether Apple must comply with a court order to help the FBI break into a phone used by one of the shooters in the December terror attacks in San Bernardino, California.

The brief filed in federal court came in response to a challenge by Apple, backed by a broad coalition of technology firms and activists, which said the FBI was seeking a “back door” into all iPhones as part of the probe.

The government brief, in sharp contrast, claimed it is a single case of technical assistance in an important national security investigation.

“The court’s order is modest. It applies to a single iPhone, and it allows Apple to decide the least burdensome means of complying,” the Justice Department lawyers wrote.

“As Apple well knows, the order does not compel it to unlock other iPhones or to give the government a universal ‘master key’ or ‘back door.’ It is a narrow, targeted order… The government and the community need to know what is on the terrorist’s phone, and the government needs Apple’s assistance to find out.”

The government brief said there is ample legal precedent for the request, saying it is similar to requiring telephone companies to install wiretaps under court orders.

Government lawyers wrote that Apple is “fully capable of complying with the court’s order” and has stated that it would need “as few as six of its 100,000 employees for perhaps as little as two weeks.”

Advertisement. Scroll to continue reading.

A ‘marketing decision’

The brief repeated the argument — hotly contested by Apple — that the iPhone maker took a “deliberate marketing decision to engineer its products so that the government cannot search them, even with a warrant.”

It said Apple and its backers “try to alarm this court with issues of network security, encryption, back doors, and privacy,” and called this “a diversion.”

“Apple desperately wants — desperately needs — this case not to be about one isolated iPhone,’” the Justice Department said.

“But there is probable cause to believe there is evidence of a terrorist attack on that phone, and our legal system gives this court the authority to see that it can be searched pursuant to a lawful warrant.”

The brief said Apple is seeking to rally public support with “rhetoric (that) is not only false, but also corrosive of the very institutions that are best able to safeguard our liberty and our rights.”

In a supporting statement, the government filed an affidavit from FBI engineer Stacey Perino, disputing Apple’s claim that software the FBI wants it to create — which would disable the iPhone mechanism to destroy data with repeated passwords attempts — could be used on other devices.

“Because an iPhone requires Apple to have cryptographically ‘signed’ code before an iPhone will run it, and changing a unique device identifier within the (software) would invalidate Apple’s signature, the (software) would not run on other iPhones,” Perino stated.

The brief also raised the possibility the government would demand Apple’s closely guarded software secrets — its source code and private electronic signature — if the company refuses to cooperate.

“The government did not seek to compel Apple to turn those over because it believed such a request would be less palatable to Apple,” the brief said.

“If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple programmers.”

A judge is scheduled to hear oral arguments on March 22 in the case, which has sparked a debate around the globe, even from the top UN human rights official, who argued that forcing Apple to help could weaken overall security for activists around the world.

Apple’s chief Tim Cook claimed the order would force Apple to “hack” its own devices and compromise security for all Apple devices.

Others have argued that weakening the iPhone security would create software that would leak out to malicious actors, and that Apple and other technology firms would be “conscripted” to spy on its customers.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

CISO Strategy

The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks.

Cybercrime

A global cyber espionage campaign has resulted in the networks of many organizations around the world becoming compromised after the attackers managed to breach...

Cybercrime

Spanish Court agreed to extradite Joseph James O’Connor to he U.S., who allegedly took part in the July 2020 hacking of Twitter accounts of...