Cluelessness Regarding What’s At Stake In The Apple Versus FBI Fight

BY Herschel Smith
8 years, 10 months ago

techdirt:

I guess this isn’t that surprising, but as the big legal fight heated up this week between Apple and the Justice Department over whether or not Apple can be forced to create a backdoor to let the FBI access the contents of Syed Farook’s iPhone, all of the major Presidential candidates have weighed in… and they’re all wrong. Donald Trump is getting the most attention. Starting earlier this week he kept saying that Apple should just do what the FBI wants, and then he kicked it up a notch this afternoon saying that everyone should boycott Apple until it gives in to the FBI. Apparently, Trump doesn’t even have the first clue about the actual issue at stake, in terms of what a court can compel a company to do, and what it means for our overall security.

This isn’t another Trump-bashing post.  I’ve had my share, and it’s so easy.  But in this case, every other presidential candidate – every other presidential candidate – is close to being as bad on the issue, and lacks even a basic clue as to what’s at stake.

There is also misunderstanding within the field who purports to comprehend the technology of the issue.  This post at Zero Hedge is an example.

On the surface, this appears like valiant attempt by the CEO of the world’s most valuable company to stand up against the Big Brother state made so famous in the aftermath of the Edward Snowden revelations.

However, a quick peek beneath the surface reveals something far less noble and makes Tim Cook seem like you average, if very cunning, smartphone salesman.

According to the The Daily Beast’s Shane Harris, in a similar case in New York last year, Apple acknowledged that it could extract such data if it wanted to. But the real shocker is that according to prosecutors in that case, Apple has unlocked phones for authorities at least 70 times since 2008. (Apple doesn’t dispute this figure.)

As Harris observantly adds, “in other words, Apple’s stance in the San Bernardino case may not be quite the principled defense that Cook claims it is.”

To this, my oldest son Josh sends the following.

He doesn’t understand the subject matter. He’s in over his head and backing in to a predisposition.

Apple was unlocking phones years ago, when security feature such as system-wide encryption hadn’t been implemented. It was a different kind of “unlocking.” This isn’t a fight over keys to a single device. This is a fight over encryption, which the government doesn’t want any of us to have, because the government is run by political science and history majors.

Of note is the fact that any device from the 4th generation forward (beginning with 5s) is impossible – IMPOSSIBLE – to decrypt without the actual key, because Apple has moved encryption duties to a separate System On A Chip (SoC) that runs its own OS, is married to the device by UUID, and totally inaccessible.

The phone the FBI is freaking out over is a 5c, not a 5s.

The FBI doesn’t need the phone. They have what they need already. This is about encryption. The government needs an event they can point to and blame for encryption, and they’ve chosen this one.

This is the politics of control and power. To categorize it as a publicity stunt is disingenuous to the point of being dangerous.

Note that we’ve discussed here and here the weaknesses in random number generators and the ability to hone in on keys, but Apple has a feature that cuts the entire system off and erases data if this approach is tried beyond just a few random numbers.

Concerning this report, Josh also send the following.

The phone was in the possession of the San Bernardino County Department of Public Health in the hours after the attack. An idiot IT worker with the department performed a remote reset of the iCloud account attached to the device.

This disabled an assortment of services and functions on the phone, including automatic backups to iCloud, which the FBI seems to think would have been helpful, even though they’re also encrypted.

They’re fixating.

Bottom line.  The fedgov has not asked for Apple to break into this phone.  They have asked Apple to develop an approach that allows them to completely bypass all security, thus making them malleable to a FISA court ruling for any or all phones in the future.

All of your worst suspicions are true.  This is the government at its most totalitarian.


Comments

  1. On February 23, 2016 at 12:06 am, gamegetter II said:

    John McAfee- the guy who started the McAfee anti-virus software made an offer to the FBI to hack the phone free of charge,wrote an op-ed about how if the FBI gets the encryption “backdoor” there will be no more privacy,etc,etc.
    Maybe the San Bernadino county idiot IT worker knew exactly what he or she was doing because they were aware of who the shooters were.

    The FBI wasn’t even looking for others who were possibly involved until recently.
    If the phone’s not a 5s and is a 5c,and there’s no threat to encryption-then who’s not giving up the whole story besides the FBI?

  2. On February 23, 2016 at 1:06 pm, Josh said:

    Both the 5c and 5s (and beyond) are encrypted, but every phone after the 5c has encryption duties offloaded to a separate SoC. This illuminates the point: most existing phones and all future iPhones are impossible (or impractical enough as to be impossible) to decrypt. The government does not like this, and they want to compel an Americam company to create something that does not exist.

    Now take Google, who just re-launched Jibe, an implementation of the RCS messaging protocol. RCS was developed to standards defined by a constortium of telecom providers. RCS does NOT provide end-to-end encryption, and never will.

    Shocking, I know…

  3. On February 23, 2016 at 8:20 am, Publicola said:

    I’m surprised no one has mentioned the 13th amendment angle.

    The .gov is basically demanding a private company to perform a service for it against that company’s will. Since this is not the result of a criminal conviction, or even an award in a civil suit, this smacks of involuntary servitude.

    Course judges have been deferential to government in similar matters (jury duty, the draft, filling out paperwork, etc) but I think a very strong 13th amendment argument could be made. Or perhaps should be made.

    I have heard several news reports trying to make a big deal out of Apple having unlocked phones before, without mentioning that the previous unlocking involved earlier phones with different security systems. I’d almost think it was misinformation of a conspiratorial nature, except I know how earnestly ignorant most reporters are about devices as mechanically simple as firearms.

  4. On February 23, 2016 at 10:28 am, Blake said:

    The 13th amendment went out the window when health care and marriage became a “right.”

  5. On February 25, 2016 at 7:42 pm, Ned Weatherby said:

    Exactly. One is supposed to obtain a “license” from the government (permission) to get married. This is one of the repugnant parts of 501(C)(3) religious corporations.

  6. On March 20, 2016 at 3:20 pm, MyLyingEyes said:

    Since the FBI is willing to pay Apple for its time the 13th Amendment doesn’t seem to have any relevance. All writs compel someone to do something.

  7. On February 23, 2016 at 10:28 am, Ned Weatherby said:

    Exactly right bottom line, Herschel. And now, “everyman’s outsider” Trump, calls for a boycott, illustrating that he is little more than a crony uber statist, ever willing to give the government more power. Add to that the Frank Drebin/ Inspector Clouseau matter of TPTB managing to disable the phone all by their little lonesome selves, and it becomes even worse.

  8. On February 23, 2016 at 11:53 am, Fred said:

    This is the exact type of case that baby Bush wanted to be able to
    investigate through non law enforcement means – terrorists on US soil
    with foreign ties, communicating with other network assets and/or
    handlers.
    @ gamegetter is asking the write question; “who’s not giving up the whole story”. Josh is completely right and Mr. Smith your bottom line is correct. There is an agency whose sole purpose is the securing of US data and collection of foreign data. Both aspects include encryption. It is the national subject matter expert on encryption and encryption technology. It could get the data requested by the FBI with a 48hr turn around. The FBI DOES NOT WANT THE DATA!!! It very likely has the data already, obtained not through criminal investigation but through national security channels. The FBI would like to avoid the firestorm of revealing it’s source for acquiring the data in court so it is pressing Apple in order that it may cover illegal (without warrant) information gathering through this other agency.
    Why not just handle this case in a national security court? The FBI wants the ability to hack phones plain and simple. Use of the secret courts would also require an admission by the administration that Jihad is an international security threat in the US.
    Here is, at least, a partial answer to @ gamegetter and maybe some blanks filled in.

  9. On March 20, 2016 at 3:24 pm, MyLyingEyes said:

    The FBI director also mentioned a murder case, in Louisiana iirc. There is no reason why warrants should reach the contents of insecure phones only in national security cases.

  10. On February 23, 2016 at 2:06 pm, UNCLEELMO said:

    Bill Gates (Microsoft founder) has publicly stated that Apple should give the FBI (of LaVoy Finicum fame) what they want.

    That’s all I need to know to form an opinion on this subject.

  11. On February 23, 2016 at 2:26 pm, Herschel Smith said:

    I just saw that. God, what an awful man. But anyone who develops software that bad must by definition take awful views on everything else.

  12. On February 23, 2016 at 3:12 pm, Archer said:

    Here’s a good write-up of exactly what the FBI is demanding of Apple, compared to the assistance Apple has provided in the past: http://www.zdziarski.com/blog/?p=5645

    In short, Apple has been “unlocking” phones for investigators forever. It’s not been an issue, and I believe they’ve made the offer to try it on this phone. That’s not what’s being demanded. The FBI is asking for a “tool” to break into phones, in the form of a modified iOS (I’ve seen this dubbed “FBiOS”, heh!), and the court turned that request into a demand.

    A “tool”, though, must be built, vetted, and independently tested and verified to work on a multitude of devices. Independent testing and verification, by definition, occurs outside of Apple. The method for accessing the encrypted information is no longer considered or treated as a “trade secret”; it’s published, and therefore able to be reverse engineered. Thus, Apple does not get to maintain control over it or destroy it once the task at hand is completed, as is promised by the court order. That promise cannot be kept, so naturally it will not be kept.

    This goes FAR beyond the court order’s requirement that Apple provide “reasonable technical assistance” to the FBI in obtaining the information on the phone, and the bone offered to Apple to entice/coerce their cooperation is an illusion.

    I believe Apple is correct in disputing a self-contradictory court order.

  13. On March 20, 2016 at 3:35 pm, MyLyingEyes said:

    There is nothing in the order requiring Apple to produce a tool “independently tested and verified to work on a multitude of devices”, still less to turn it over to the FBI or anyone else. Apple need meet none of Zdziarski’s imagined requirements, and if the lack of doing so prevents the results from being admitted in court that’s the FBI’s problem, not Apple’s. There is no warranty of merchantability from Apple to the FBI — they only have to obey the order.

  14. On March 21, 2016 at 10:55 am, Archer said:

    Did you read the article? Forensic analysis is what Zdziarski does; the requirements aren’t “imagined”, and in context make perfect legal sense. Do you really think the FBI won’t try to hold Apple accountable if the results are found inadmissible for lack of verification?

    Also, re-check the “requirements” of the software the court orders Apple to build. It must override iOS security/privacy to allow brute force hacking of the PIN. That’s a given. But it must also allow such brute force hacking to be done wirelessly, over the network or via Bluetooth. If the FBI has the phone and can plug it into a computer to hack the PIN (which only needs to be done once), why on Earth would they need the ability to do the same wirelessly?

    I’ll leave the implications for you to figure out.

  15. On March 21, 2016 at 11:28 am, Herschel Smith said:

    He doesn’t want to figure out implications. He’s a troll.

  16. On February 24, 2016 at 8:56 pm, tireddog said:

    This is an exercise in ‘pull through marketing’. FBI wants encryption gone, Apple pretends to object, gullible public demands end to encryption, demands CONgress do something and the CONgress happily obliges, even before this case winds its way through the courts. Having already claimed that encryption is a CONgressional issue Apple can stand down when the boots drop. The stupid cows will have done govs work for it while Apple retains some cred.

  17. On February 25, 2016 at 7:44 pm, Ned Weatherby said:

    One wishes that premise were not true. Though it likely is.

  18. On March 20, 2016 at 2:52 pm, MyLyingEyes said:

    Um, no, no, and no….

    “They have asked Apple to develop an approach that allows them to completely bypass all security, thus making them malleable to a FISA court ruling for any or all phones in the future.”

    This has nothing to do with a FISA court, and there is nothing to prevent Apple from designing phones which they truly cannot help the FBI to break into.

    This is not remotely about encryption and is not about a backdoor. It’s about certain protections on the front door that Apple CAN remove and therefor will be forced to remove. Whether they’ve fixed this with the Secure Enclave is in some doubt as the firmware for the SE can also be “updated” without unlocking the phone.

    By now you probably know that the iCloud password reset was the FBI’s fault, but this is a red herring of no significance whatsoever. The FBI can compel a bank to open a safe deposit box even if one of their agents dropped a key into the river.

    iCloud backups are not encrypted. (And incomplete, I believe.) That Apple gave the backed up data to the FBI without a fuss should give you pause to think what this is about.

  19. On March 20, 2016 at 10:28 pm, Herschel Smith said:

    Yes, yes and yes. You’re lying, and you know it. Based on your comments here, I think you’re a paid government troll. And shouting it louder than everyone else and making more comments doesn’t mean you’re right.

RSS feed for comments on this post. TrackBack URL

Leave a comment


You are currently reading "Cluelessness Regarding What’s At Stake In The Apple Versus FBI Fight", entry #14831 on The Captain's Journal.

This article is filed under the category(s) FBI and was published February 22nd, 2016 by Herschel Smith.

If you're interested in what else the The Captain's Journal has to say, you might try thumbing through the archives and visiting the main index, or; perhaps you would like to learn more about TCJ.

26th MEU (10)
Abu Muqawama (12)
ACOG (2)
ACOGs (1)
Afghan National Army (36)
Afghan National Police (17)
Afghanistan (704)
Afghanistan SOFA (4)
Agriculture in COIN (3)
AGW (1)
Air Force (40)
Air Power (10)
al Qaeda (83)
Ali al-Sistani (1)
America (22)
Ammunition (285)
Animals (297)
Ansar al Sunna (15)
Anthropology (3)
Antonin Scalia (1)
AR-15s (379)
Arghandab River Valley (1)
Arlington Cemetery (2)
Army (87)
Assassinations (2)
Assault Weapon Ban (29)
Australian Army (7)
Azerbaijan (4)
Backpacking (3)
Badr Organization (8)
Baitullah Mehsud (21)
Basra (17)
BATFE (230)
Battle of Bari Alai (2)
Battle of Wanat (18)
Battle Space Weight (3)
Bin Laden (7)
Blogroll (3)
Blogs (24)
Body Armor (23)
Books (3)
Border War (18)
Brady Campaign (1)
Britain (38)
British Army (35)
Camping (5)
Canada (17)
Castle Doctrine (1)
Caucasus (6)
CENTCOM (7)
Center For a New American Security (8)
Charity (3)
China (16)
Christmas (16)
CIA (30)
Civilian National Security Force (3)
Col. Gian Gentile (9)
Combat Outposts (3)
Combat Video (2)
Concerned Citizens (6)
Constabulary Actions (3)
Coolness Factor (3)
COP Keating (4)
Corruption in COIN (4)
Council on Foreign Relations (1)
Counterinsurgency (218)
DADT (2)
David Rohde (1)
Defense Contractors (2)
Department of Defense (210)
Department of Homeland Security (26)
Disaster Preparedness (5)
Distributed Operations (5)
Dogs (15)
Donald Trump (27)
Drone Campaign (4)
EFV (3)
Egypt (12)
El Salvador (1)
Embassy Security (1)
Enemy Spotters (1)
Expeditionary Warfare (17)
F-22 (2)
F-35 (1)
Fallujah (17)
Far East (3)
Fathers and Sons (2)
Favorite (1)
Fazlullah (3)
FBI (39)
Featured (190)
Federal Firearms Laws (18)
Financing the Taliban (2)
Firearms (1,803)
Football (1)
Force Projection (35)
Force Protection (4)
Force Transformation (1)
Foreign Policy (27)
Fukushima Reactor Accident (6)
Ganjgal (1)
Garmsir (1)
general (15)
General Amos (1)
General James Mattis (1)
General McChrystal (44)
General McKiernan (6)
General Rodriguez (3)
General Suleimani (9)
Georgia (19)
GITMO (2)
Google (1)
Gulbuddin Hekmatyar (1)
Gun Control (1,675)
Guns (2,343)
Guns In National Parks (3)
Haditha Roundup (10)
Haiti (2)
HAMAS (7)
Haqqani Network (9)
Hate Mail (8)
Hekmatyar (1)
Heroism (5)
Hezbollah (12)
High Capacity Magazines (16)
High Value Targets (9)
Homecoming (1)
Homeland Security (3)
Horses (2)
Humor (72)
Hunting (43)
ICOS (1)
IEDs (7)
Immigration (115)
India (10)
Infantry (4)
Information Warfare (4)
Infrastructure (4)
Intelligence (23)
Intelligence Bulletin (6)
Iran (171)
Iraq (379)
Iraq SOFA (23)
Islamic Facism (64)
Islamists (98)
Israel (19)
Jaish al Mahdi (21)
Jalalabad (1)
Japan (3)
Jihadists (81)
John Nagl (5)
Joint Intelligence Centers (1)
JRTN (1)
Kabul (1)
Kajaki Dam (1)
Kamdesh (9)
Kandahar (12)
Karachi (7)
Kashmir (2)
Khost Province (1)
Khyber (11)
Knife Blogging (7)
Korea (4)
Korengal Valley (3)
Kunar Province (20)
Kurdistan (3)
Language in COIN (5)
Language in Statecraft (1)
Language Interpreters (2)
Lashkar-e-Taiba (2)
Law Enforcement (6)
Lawfare (14)
Leadership (6)
Lebanon (6)
Leon Panetta (2)
Let Them Fight (2)
Libya (14)
Lines of Effort (3)
Littoral Combat (8)
Logistics (50)
Long Guns (1)
Lt. Col. Allen West (2)
Marine Corps (280)
Marines in Bakwa (1)
Marines in Helmand (67)
Marjah (4)
MEDEVAC (2)
Media (68)
Medical (146)
Memorial Day (6)
Mexican Cartels (42)
Mexico (63)
Michael Yon (6)
Micromanaging the Military (7)
Middle East (1)
Military Blogging (26)
Military Contractors (5)
Military Equipment (25)
Militia (9)
Mitt Romney (3)
Monetary Policy (1)
Moqtada al Sadr (2)
Mosul (4)
Mountains (25)
MRAPs (1)
Mullah Baradar (1)
Mullah Fazlullah (1)
Mullah Omar (3)
Musa Qala (4)
Music (25)
Muslim Brotherhood (6)
Nation Building (2)
National Internet IDs (1)
National Rifle Association (97)
NATO (15)
Navy (30)
Navy Corpsman (1)
NCOs (3)
News (1)
NGOs (3)
Nicholas Schmidle (2)
Now Zad (19)
NSA (3)
NSA James L. Jones (6)
Nuclear (63)
Nuristan (8)
Obama Administration (221)
Offshore Balancing (1)
Operation Alljah (7)
Operation Khanjar (14)
Ossetia (7)
Pakistan (165)
Paktya Province (1)
Palestine (5)
Patriotism (7)
Patrolling (1)
Pech River Valley (11)
Personal (73)
Petraeus (14)
Pictures (1)
Piracy (13)
Pistol (4)
Pizzagate (21)
Police (659)
Police in COIN (3)
Policy (15)
Politics (986)
Poppy (2)
PPEs (1)
Prisons in Counterinsurgency (12)
Project Gunrunner (20)
PRTs (1)
Qatar (1)
Quadrennial Defense Review (2)
Quds Force (13)
Quetta Shura (1)
RAND (3)
Recommended Reading (14)
Refueling Tanker (1)
Religion (495)
Religion and Insurgency (19)
Reuters (1)
Rick Perry (4)
Rifles (1)
Roads (4)
Rolling Stone (1)
Ron Paul (1)
ROTC (1)
Rules of Engagement (75)
Rumsfeld (1)
Russia (37)
Sabbatical (1)
Sangin (1)
Saqlawiyah (1)
Satellite Patrols (2)
Saudi Arabia (4)
Scenes from Iraq (1)
Second Amendment (687)
Second Amendment Quick Hits (2)
Secretary Gates (9)
Sharia Law (3)
Shura Ittehad-ul-Mujahiden (1)
SIIC (2)
Sirajuddin Haqqani (1)
Small Wars (72)
Snipers (9)
Sniveling Lackeys (2)
Soft Power (4)
Somalia (8)
Sons of Afghanistan (1)
Sons of Iraq (2)
Special Forces (28)
Squad Rushes (1)
State Department (23)
Statistics (1)
Sunni Insurgency (10)
Support to Infantry Ratio (1)
Supreme Court (63)
Survival (205)
SWAT Raids (57)
Syria (38)
Tactical Drills (38)
Tactical Gear (15)
Taliban (168)
Taliban Massing of Forces (4)
Tarmiyah (1)
TBI (1)
Technology (21)
Tehrik-i-Taliban (78)
Terrain in Combat (1)
Terrorism (96)
Thanksgiving (13)
The Anbar Narrative (23)
The Art of War (5)
The Fallen (1)
The Long War (20)
The Surge (3)
The Wounded (13)
Thomas Barnett (1)
Transnational Insurgencies (5)
Tribes (5)
TSA (25)
TSA Ineptitude (14)
TTPs (4)
U.S. Border Patrol (6)
U.S. Border Security (19)
U.S. Sovereignty (24)
UAVs (2)
UBL (4)
Ukraine (10)
Uncategorized (100)
Universal Background Check (3)
Unrestricted Warfare (4)
USS Iwo Jima (2)
USS San Antonio (1)
Uzbekistan (1)
V-22 Osprey (4)
Veterans (3)
Vietnam (1)
War & Warfare (419)
War & Warfare (41)
War Movies (4)
War Reporting (21)
Wardak Province (1)
Warriors (6)
Waziristan (1)
Weapons and Tactics (79)
West Point (1)
Winter Operations (1)
Women in Combat (21)
WTF? (1)
Yemen (1)

December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006

about · archives · contact · register

Copyright © 2006-2024 Captain's Journal. All rights reserved.