A court order that compels the iPhone-maker to write and then sign new code may violate the First Amendment.
by David B. Rivkin, Jr., and Andrew M. Grossman, in USA Today
February 19, 2016
It would be one thing if Apple could carry out a court order that it unlock an iPhone used by the San Bernardino terrorists simply by waving a magic wand. But encryption isn’t magic; the order requires Apple to write and digitally sign a security-degraded version of its iOS operating system. That raises serious First Amendment concerns because the order amounts to a government-compelled speech.
The FBI picked this fight to set a precedent. For years, it’s been locked in a “crypto war” with Silicon Valley over how to provide law enforcement access to users’ data. So far, Apple, Google, and other companies have rebuffed demands to implement government back doors that defeat encryption and other security measures, arguing that such bypasses weaken security and facilitate abuses by criminals, corporate spies and foreign governments.
Apparently unable to identify a true ticking-time-bomb scenario to bring to court, the FBI settled for the next best thing: obtaining encrypted data off the workplace phone of shooter Syed Farook. The phone’s encryption is keyed to a passcode, and Apple’s software erases data after ten incorrect passcode attempts. So the government, relying on an aggressive reading of the 1789 All Writs Act, obtained an order directing Apple to “bypass or disable the auto-erase function” and make it possible to cycle through all possible passcodes.
While the FBI has previously obtained warrants requiring Apple to extract unencrypted data from devices running older software, this appears to be the first time that it has sought to conscript a company to write new software to circumvent security features. If it prevails, such a precedent will govern future cases. Read more »