Space Industry and Business News  
CYBER WARS
FBI-Apple standoff puts encryption on front burner
By Rob Lever
Washington (AFP) Feb 17, 2016


Apple ordered to hack San Bernardino shooter's iPhone
San Francisco (AFP) Feb 17, 2016 - An American judge ordered Apple on Tuesday to help the FBI break into an iPhone belonging to one of the attackers in the San Bernardino shooting that killed 14 people.

US Magistrate Judge Sheri Pym ordered Apple to provide "reasonable technical assistance" to the FBI, including by disabling an auto-erase feature after too many unsuccessful attempts are made to unlock the iPhone 5C.

Federal prosecutors had filed a motion requesting Apple's help after the FBI failed to crack the phone's code.

By disabling the security features, the FBI will now be able to attempt as many different password combinations as needed before gaining access.

The phone was the property of the San Bernardino County Department of Public Health, which employed one of the shooters, Syed Farook.

The county agreed to the search of the phone.

Farook, a US citizen, and his Pakistani wife Tashfeen Malik stormed a holiday work party in December and shot up their victims.

Apple did not immediately respond to requests for comment.

Pym, the judge, ordered that Apple provide software that would only run on the device in question, or any other technological means to access its data.

The technology giant now has five days to comply with the order or seek relief if it determines that complying would be "unreasonably burdensome," Pym said.

"We have made a solemn commitment to the victims and their families that we will leave no stone unturned as we gather as much information and evidence as possible," US Attorney Eileen Decker said in a statement.

"The application filed today in federal court is another step -- a potentially important step -- in the process of learning everything we possibly can about the attack in San Bernardino."

FBI Director James Comey revealed last week that investigators had not been able to crack open the phone two months into the investigation.

"It affects our counterterrorism work," he said.

Comey stressed the US government's concerns that commercially-available encryption benefits criminals.

Tech companies, intent on securing the trust of consumers after government spying revelations made by Edward Snowden, have been reluctant to be seen as helping authorities spy on users.

Apple's challenge of a court order to unlock an iPhone used by one of the San Bernardino killers opens up a new front in the long-running battle between technology companies and the government over encryption.

The standoff brings the sensitive issue, which has been at a stalemate in Congress, into the courts, and has abruptly shifted the policy debate on encryption.

A California magistrate on Tuesday ordered Apple to provide "reasonable technical assistance" to the US Federal Bureau of Investigation to break into an iPhone used by one of the shooters in the deadly December rampage that killed 14 people and has been linked to supporters of the Islamic State organization.

Apple quickly said it would fight the judge's order. Chief executive Tim Cook called it "an unprecedented step which threatens the security of our customers," and said the order "has implications far beyond the legal case at hand."

Apple, Google and other technology firms in recent years have stepped up encryption -- allowing only the customers to have "keys" to unlock their devices -- claiming improved security and privacy is needed to maintain confidence in the digital world.

That drive for privacy has prompted sharp objections from law enforcement and intelligence officials, who claim that criminals and extremists are able to hide their illicit activities thanks to device encryption.

"This is a clever move by the FBI to move from the legislative arena, where they were not winning, to the courts," said Joseph Hall, chief technologist at the Center for Democracy & Technology, a digital rights group.

- Raising privacy hackles -

The order raised hackles among privacy advocates, which see the potential to unleash unbridled surveillance in the United States and elsewhere.

"If the FBI can force Apple to hack into its customers' devices, then so too can every repressive regime in the rest of the world," said Alex Abdo of the American Civil Liberties Union.

But Apple also came under attack for thwarting a critical security investigation.

"Apple chose to protect a dead ISIS terrorist's privacy over the security of the American people," said Senator Tom Cotton of Arkansas, using an acronym for the Islamic State group.

"Regrettably, the position Tim Cook and Apple have taken shows that they are unwilling to compromise and that legislation is likely the only way to resolve this issue."

New York City police commissioner William Bratton welcomed the order and added, "We cannot give those seeking to harm us additional tools to keep their activity secret. I reiterate my call on Congress to act immediately in passing legislation to provide law enforcement the tools we need to keep America safe."

White House spokesman John Earnest said the White House supports the request by the FBI and Department of Justice.

"They are not asking Apple to redesign its product or to create a new backdoor to one of their products," Earnest told reporters.

"They're simply asking for something that would have an impact on this one device."

- Debate on 1789 law -

The case is likely to work its way through the courts, which will need to consider a number of both technical and legal questions.

Interestingly, Magistrate Judge Sheri Pym's order is based on the 1789 All Writs Act, which lays out broad authority for the courts to help enforcement of the law.

Steve Vladeck, an American University law professor and co-editor of the Just Security blog, said the order stretches the interpretation of the centuries-old law.

"If the government can compel Apple to develop software (to get around encryption) what can't it do," Vladeck told AFP.

"There is no history of court orders compelling companies to do research and design."

Legal scholar Jonathan Turley of the George Washington University said in a blog post that Pym "seems to believe that she can order companies to become unwilling participants in surveillance research and development."

"I fail to see her legal basis for such an extraordinary order against a private company," Turley wrote.

Berin Szoka, president of the libertarian think tank TechFreedom, said the order goes against "bedrock principles of law and privacy."

"If forcing Apple to hack its own devices qualifies as 'reasonable technical assistance,' there is no practical limit to what law enforcement could force private companies to do to compromise the security of their systems," Szoka said in a statement.

Darren Hayes, a Pace University professor of computer forensics, argued that Apple and other tech companies may have gone too far by using encryption that, in theory, makes it impossible for the firms to hand over evidence even if served with a legal warrant.

"I think that the public, once they become more educated about what is happening, might change their stance about Apple," said Hayes, who has worked as a consultant to law enforcement.

"This case is sensitive for the US public and I don't think it's particularly good public relations for Apple" to refuse to help the investigation, Hayes added.

One key question is whether Apple has the ability to provide the assistance sought by the FBI.

"Apple does not have the keys to your device -- they are burned onto your chip," Hall said.

But he said it may be possible to get around that encryption with software modifications.

"Apple has never been forthcoming about the deep details of its system," Hall said.

Hayes said that no one knows for sure if Apple can circumvent the encryption, but noted "the fact that they're arguing this makes me think they may be able to do it."

rl/jm

APPLE INC.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Teen arrested in Britain linked to hack of US spy chiefs
Washington (AFP) Feb 12, 2016
British police said Friday they had arrested a teenager on hacking charges, as media reports said the youth was suspected of cracking the personal accounts of top US intelligence officials. The news followed a series of bold hacking attacks for which credit was claimed by someone with the screen name "Cracka" who targeted top officials at the CIA, FBI, Homeland Security, the White House and ... read more


CYBER WARS
Honeywell developing virtual reality technologies for military

Body temperature triggers newly developed polymer to change shape

Light used to measure the 'big stretch' in spider silk proteins

Making sense of metallic glass

CYBER WARS
ViaSat tapped to provide tactical terminals for Apache helicopters

Harris wins place on military communications contract

General Dynamics MUOS-Manpack radio supports government testing of MUOS network

Raytheon to produce, test Navy Multiband Terminals

CYBER WARS
ULA Launches NROL-45 Payload for the National Reconnaissance Office

SES-9 Launch Targeting Late February

Spaceflight Awarded First GSA Schedule Contract for Satellite Launch Services

SpaceX to carry military payloads as US phases out Russian rocket engines

CYBER WARS
Russia Developing Glonass Satellite And Latest Bird Launched

China to launch nearly 40 Beidou navigation satellites in five years

45th SW supports Air Force GPS IIF-12 launch aboard an Atlas V

United Launch Alliance launches GPS IIF-12 satellite for U.S. Air Force

CYBER WARS
F-35s in test deployment

New JSOW glide bomb hits two moving targets in test

Mexican Air Force adds 6 new T-6C Texan II aircraft to fleet

Kuwait to sign Eurofighter jet deal with Italy: minister

CYBER WARS
Scientists train electrons with microwaves

Chiral magnetic effect generates quantum current

Scientists create ultrathin semiconductor heterostructures for new technologies

New thin film transistor may lead to flexible devices

CYBER WARS
Sentinel-3A poised for liftoff

New Satellite-Based Maps to Aid in Climate Forecasts

Consistency of Earth's magnetic field history surprises scientists

Sentinel-3A fully tanked

CYBER WARS
Benefits associated with the reduction of mercury emissions far outweigh industry cost

India's smog-choked capital to resume car ban in April

Living with contamination: fear and anger in Flint

Romania asks UNESCO to protect planned open-cast goldmine site









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.