Professionalism/Apple, the FBI, Personal Data
From December 2015 to March 2016, the FBI investigated a terrorist attack in San Bernardino, California that left 14 dead and 22 injured. As part of this investigation, the FBI recovered one suspect's locked iPhone. A US District Court ordered Apple to help unlock the phone by circumventing built in security features. Apple refused to comply, resulting in a months-long debate in the public sphere. The FBI ultimately used a third party tool to unlock the phone and dropped its case against Apple. The investigation remains a major event in privacy and security circles.
Background
[edit | edit source]San Bernardino Shooting, iPhone 5C and GovtOS
[edit | edit source]On December 2, 2015, 14 people were killed and 22 were injured during a terrorist attack at the Inland Regional Center in San Bernardino, California [1]. Federal agents recovered Syed Rizwan Farook's work iPhone 5C intact. Agents wanted to use phone data as evidence when investigating the 2015 San Bernardino shooting. A four digit passcode locked the iPhone, preventing entry. The iPhone would delete all its data after ten incorrect password inputs. FBI agents attempted to bypass this security feature through iCloud data syncs [2]. iCloud account password differences between Farook's iPhone and his iCloud rendered the data sync unsuccessful.[3]. On February 9, 2016, the FBI announced it was unable to break into the iPhone. Agents asked Apple to unlock the phone. Apple claims the FBI wanted a to create a new operating system, dubbed GovtOS [4].
Apple Ordered to Assist FBI
[edit | edit source]United States magistrate judge Sherri Pym issued a court order in the United States District Court for the Central District of California "compelling Apple, inc. in assisting [federal] agents in [searching]" the San Bernardino shooter's iPhone 5C on February 16, 2016. Apple was specifically ordered to provide reasonable technical assistance in:
- bypassing or disabling the iPhone's auto-erase function
- enabling FBI agents to submit iPhone passcode electronically
- preventing additional delay between passcode attempts
The court order requested Apple to meet FBI demands by writing new iPhone software for Farook's iPhone. Apple was given five days to apply for relief if "Apple believes that compliance with this Order would be unreasonably burdensome"[5].
All Writs Act of 1789
[edit | edit source]The court order was issued under the All Writs Act of 1789[7]. This act states that any courts established by Congress may issue all necessary or appropriate writs to aid their respective jurisdictions [8]. The American Civil Liberties Union found that the government has been trying to use the All Writs Act to force companies to help crack customer phones since 2008 [9].
Apple's Response
[edit | edit source]Apple released a public letter, written by CEO Tim Cook, that opposes the court order. The letter is directed at Apple customers and states that the "United States government has demanded that Apple take an unprecedented step which threatens the security of our customers." Cook contends compromising information security puts personal security at risk. According to Apple, building "a version of iOS that bypasses security" creates a dangerous backdoor. This software exploit threatens security when in the wrong hands [10].
There is no precedent for "an American company being forced to expose its customers to a greater risk of attack." Apple fears compliance to the court order will set a legal precedent. Cook writes, "if the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data." While Apple states the FBI's intentions are good, the company feels it is "wrong for the government to force [us] to build a backdoor into [our] products... Demand would undermine the very freedoms and liberty our government is meant to protect"[10].
FBI Cracks iPhone
[edit | edit source]On March 28, 2016, the FBI announced that a third party helped unlock the subject iPhone. The Department of Justice withdrew the court order requesting Apple's compliance on the same day [11]. FBI Director James Comey confirmed that FBI purchased a third party hacker's tool to unlock iPhones. Comey suggested the tool is worth over $1.3 million. This purchase didn't cover rights to the tool's technical details [12]. The tool can only be used on older iPhone models lacking a Touch ID sensor[13]. The Israeli company Cellebrite is rumored to have built the hack [14].
Ethics: Software Engineering Perspective
[edit | edit source]Apple's engineers and managers face an ethical crossroad. On one hand, they have a duty to user privacy product integrity. However, they must weigh this against their duty to the national security. Resolving this issue is an important one for engineers, especially in light of programs which ask corporations to aid the government's surveillance efforts.
ACM Code of Ethics
[edit | edit source]A first ethical analysis of this case uses the ACM Code of Ethics[15]. The Association for Computing Machinery (ACM), the professional organization for computer scientists, developed this code to guide members in ethical decision-making[16]. One relevant section of the code relates to a software engineer's obligation to preserve the privacy of a software's users:
...It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals... User data observed during the normal duties of system operation and maintenance must be treated with strictest confidentiality, except in cases where it is evidence for the violation of law, organizational regulations, or this Code...[15]
The problem is reiterated rather than solved; the Code says that data must be confidential, except when it's evidence for legal violation. Unfortunately, later text in the Code adds confusion:
ACM members must obey existing local, state,province, national, and international laws unless there is a compelling ethical basis not to do so. Policies and procedures of the organizations in which one participates must also be obeyed. But compliance must be balanced with the recognition that sometimes existing laws and rules may be immoral or inappropriate and, therefore, must be challenged. Violation of a law or regulation may be ethical when that law or rule has inadequate moral basis or when it conflicts with another law judged to be more important...[15]
Here, the Code appeals to the doctrine of civil disobedience; while obeying laws is important, there exist "higher laws" that may be more important.
Right to Privacy
[edit | edit source]Tim Cook, in the Apple Customer Letter, makes an implicit appeal to a "higher law" at the letter's close. He says: "While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect"[10]. The letter's text implies this higher law is the "right to privacy."
The Right to Privacy is a relatively modern concept, although some trace its roots to Aristotle's division of the political (polis) and family (oikos) spheres. It was first introduced to the United States' legal system by Louis Brandeis and Samuel Warren in their 1890 article, The Right to Privacy, in the Harvard Law Review[17]. They contend that, in light of "instantaneous photographs and newspaper enterprise," the "right to be let alone" should protect a person's privacy and physical being.
As a Supreme Court Justice, Brandeis set a legal precedent on the right to privacy by writing a dissenting opinion for Olmstead v. United States. The Court was determining the legality of wiretaps used to convict a suspected bootlegger. While the Court ruled the wiretaps legal, Brandeis concurred with the defense that the wiretaps violated the Fourth and Fifth Amendments. His dissent stated that "[The makers of our Constitution] conferred, as against the Government, the right to be let alone -- the most comprehensive of rights, and the right most valued by civilized men"[18]. This supports Cook's appeal to privacy as a "higher law" than that of the FBI's request to open the iPhone.
Transparency and the FBI
[edit | edit source]One could argue that the FBI was not fully transparent in this case. According to FBI Director Comey, "[This] isn’t about trying to set a precedent or send any kind of message... this case is about the innocents attacked in San Bernardino" [19]. While this is a plausible stance, it wasn't convincing to personal security advocates.
Questionable tactics
[edit | edit source]Steps taken by the FBI to unlock the phone suggest that they had a deeper motive than solving the case at hand:
- The FBI "instructed a county worker to change the password for the phone's iCloud account"[2]. This prevented the phone from backing up its contents over Wi-Fi. Therefore, the FBI couldn't get data via iCloud. This is an odd mistake for a well-equipped agency to make.
- While it wasn't the first time Apple encountered the All Writs Act[6], Cook's letter to Apple customers claimed that the FBI's use of the law was "unprecedented"[10]. One would not expect such a stretch in an ordinary shooting investigation.
- Less than two months after Apple refused to comply, the agency found a third party to help unlock the phone and immediately dropped their suit against Apple.
Possible interpretations
[edit | edit source]These events suggest a few possibilities:
- The FBI was unaware of third party hacks into the iPhone at case outset. Once they discovered one, Apple's help was no longer needed and they withdrew their suit.
- The FBI was aware of third party hacks, but tried to conscript Apple to unlock the phone, hoping that they would do it faster. Upon realizing Apple wasn't complying, they went to a third party for time's sake.
- The FBI was aware of third party hacks and knew that they could bypass Apple at any time, but continued to push their suit. Even though setting a legal precedent was not their manifest function of the investigation, it may have been a latent function.
Generalizations and Further Research
[edit | edit source]In high profile investigations, governments and companies should consider both the rights of individuals and the security implications of the case at hand. Future research could study public opinion on these matters, or the many similar lower-profile cases across the country[20]. In particular, further investigation on the other invocations of the All-Writs act on phone companies, uses of National Security Letters, and other instances of court-orders requiring software companies to divulge customer information.
References
[edit | edit source]- ↑ The Los Angeles Times (2015, December 9). San Bernardino Shooting Updates. http://www.latimes.com/local/lanow/la-me-ln-san-bernardino-shooting-live-updates-htmlstory.html
- ↑ a b Zetter, K. (2016, March 11). New Documents Solve a Few Mysteries in the Apple-FBI Saga. https://www.wired.com/2016/03/new-documents-solve-mysteries-apple-fbi-saga/
- ↑ Kang, C. and Lichtblau, E. (2016, March 1). F.B.I. Error Locked San Bernardino Attacker's iPhone. The New York Times, pp. B1
- ↑ Burgess, M. (2016, February 26). Why Apple won't unlock iPhones for the FBI. http://www.wired.co.uk/article/why-apple-refuse-help-fbi-iphone
- ↑ Order Compelling Apple, Inc. to Assist Agents in Search. United States District Court for Central District of California. (2016).
- ↑ a b Pagliery, J. (2016, March 30). "Here are the places feds are using a controversial law to unlock phones". CNN. Time Warner. Retrieved April 30, 2016.
{{cite web}}
: Check date values in:|date=
(help) - ↑ Order Compelling Apple, Inc. to Assist Agents in Search. United States District Court for Central District of California. (2016).
- ↑ All Writs Act of 1789, 28 U.S.C. §§ 1651 (1948).
- ↑ Sweren-Becker, E. (2016, March 30). This map Shows How the Apple-FBI Fight Was About Much More Than One Phone. https://www.aclu.org/blog/speak-freely/map-shows-how-apple-fbi-fight-was-about-much-more-one-phone
- ↑ a b c d Cook, T. (2016, February 16). A Message to Our Customers. https://www.apple.com/customer-letter/
- ↑ Segall, L., Pagliery, J., and Wattles, J. (2016, March 29). FBI says it has cracked terrorist's iPhone without Apple's help. http://money.cnn.com/2016/03/28/news/companies/fbi-apple-iphone-case-cracked/
- ↑ Lichtbau, E. and Benner, K. (2016, April 21). F.B.I. Director Suggests Bill for iPhone Hacking Topped $1.3 Million. The New York Times, pp. B3
- ↑ Gibbs, S. (2016, April 7). San Bernardino iPhone hack won’t work on newer models, says FBI. https://www.theguardian.com/technology/2016/apr/07/san-bernardino-iphone-hack-work-newer-models-fbi-james-comey
- ↑ Pandey, R. (2016, March 26). This Is How Much FBI Is Paying to Cellebrite to Unlock San Bernardino Shooter’s iPhone. http://www.iphonehacks.com/2016/03/this-is-how-much-fbi-is-paying-to-cellebrite-to-unlock-san-bernardino-shooters-iphone.html
- ↑ a b c ACM. (1992). The ACM Code of Ethics. Retrieved from https://ethics.acm.org/code-of-ethics
- ↑ ACM. Using the Code. Retrieved from https://ethics.acm.org/code-of-ethics/using-the-code/
- ↑ Warren, S. D. & Brandeis, L. D. (Dec. 15, 1890). The Right to Privacy. Harvard Law Review, Vol. 4 (No. 5). Retrieved from http://www.cs.cornell.edu/~shmat/courses/cs5436/warren-brandeis.pdf
- ↑ Olmstead v. United States. (June 4, 1928). FindLaw. Retrieved from http://caselaw.findlaw.com/us-supreme-court/277/438.html
- ↑ Comey, J. (2016, February 21). FBI Director Comments on San Bernardino Matter https://www.fbi.gov/news/pressrel/press-releases/fbi-director-comments-on-san-bernardino-matter
- ↑ Johnson, K. & Weise, E. 1,000 locked devices in limbo after FBI quits iPhone case. https://www.usatoday.com/story/tech/news/2016/03/29/fbi-withdrawal-apple-iphone-farook-brooklyn-locked-encryption-case-san-bernardino/82378416/
This page or section is an undeveloped draft or outline. You can help to develop the work, or you can ask for assistance in the project room. |