Jump to content

Apple–FBI encryption dispute: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
captions
Shetty123 (talk | contribs)
added citation
Line 6: Line 6:
In 2015 and 2016, [[Apple Inc.]] has received and objected to or challenged at least 11 orders issued by [[United States district court]]s under the [[All Writs Act]] of 1789. Most of these seek to compel Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked [[iPhone]]s running on operating systems [[iOS 7]] and older" in order to assist in criminal investigations and prosecutions. A few requests, however, involve phones "with more extensive encryption, which Apple cannot break with its current capabilities". These orders seek to compel Apple to "design new software to let the government circumvent the device's security protocols and unlock the phone".<ref name="McLaughlin">{{cite web|url=https://theintercept.com/2016/02/23/new-court-filing-reveals-apple-faces-12-other-requests-to-break-into-locked-iphones/|title=New Court Filing Reveals Apple Faces 12 Other Requests to Break Into Locked iPhones|work=The Intercept|date=February 23, 2016|accessdate=March 3, 2016|first=Jenna|last=McLaughlin}}</ref>
In 2015 and 2016, [[Apple Inc.]] has received and objected to or challenged at least 11 orders issued by [[United States district court]]s under the [[All Writs Act]] of 1789. Most of these seek to compel Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked [[iPhone]]s running on operating systems [[iOS 7]] and older" in order to assist in criminal investigations and prosecutions. A few requests, however, involve phones "with more extensive encryption, which Apple cannot break with its current capabilities". These orders seek to compel Apple to "design new software to let the government circumvent the device's security protocols and unlock the phone".<ref name="McLaughlin">{{cite web|url=https://theintercept.com/2016/02/23/new-court-filing-reveals-apple-faces-12-other-requests-to-break-into-locked-iphones/|title=New Court Filing Reveals Apple Faces 12 Other Requests to Break Into Locked iPhones|work=The Intercept|date=February 23, 2016|accessdate=March 3, 2016|first=Jenna|last=McLaughlin}}</ref>


The most well-known instance of the latter category is ''In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203'', a court case in the [[United States District Court for the Central District of California]].<ref name=":0">{{cite web | url=https://assets.documentcloud.org/documents/2714005/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf | title=Order Compelling Apple, Inc. to Assist Agents in Search | date=February 16, 2016 | first=Sheri |last=Pym | format=PDF | publisher=United States District Court for the Central District of California | accessdate=February 27, 2016}}</ref><ref>{{cite web|first=Edvard|last=Pettersson|url=http://www.bloomberg.com/politics/articles/2016-02-25/apple-says-u-s-can-t-force-it-to-unlock-terrorist-s-iphone-il2pjiw8|title=Apple Slams U.S. Bid to Make It Crack iPhone in Court Papers|work=Bloomberg Politics|date=February 25, 2016|accessdate=February 25, 2016}}</ref> The [[Federal Bureau of Investigation]] (FBI) and Apple engaged in a dispute over whether the [[United States federal courts|federal court]] may compel Apple to create and [[digital signature|electronically sign]] new software that would enable the FBI to unlock an [[iPhone 5C]] it recovered from one of the shooters in [[2015 San Bernardino attack|a terrorist attack]] in [[San Bernardino, California]], in December 2015. The attack killed 14 people and seriously injured 22. The two attackers later died in a shootout with police, having previously destroyed their personal phones; however, a work phone issued to one of the attackers by his employer was recovered intact.<ref>{{cite web | url=https://www.documentcloud.org/documents/2716000-031122954861.html | title=Government's Motion to Compel Apple Inc. to Comply With This Court's February 16, 2016 Order Compelling Assistance in Search | date=February 19, 2016 | first1=Eileen M. | last1=Decker | first2=Patricia A. | last2=Donahue | first3=Tracy L. |last3=Wilkison | first4=Allen W. |last4=Chiu | work=United States Attorneys | accessdate=February 27, 2016}}</ref> The phone is locked with a four-character password.<ref>{{cite news|last1=Zetter|first1=Kim|title=New Documents Solve a Few Mysteries in the Apple-FBI Saga|url=http://www.wired.com/2016/03/new-documents-solve-mysteries-apple-fbi-saga/|accessdate=March 11, 2016|publisher=WIRED|date=March 11, 2016}}</ref>
The most well-known instance of the latter category is ''In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203'', a court case in the [[United States District Court for the Central District of California]].<ref name=":0">{{cite web | url=https://assets.documentcloud.org/documents/2714005/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf | title=Order Compelling Apple, Inc. to Assist Agents in Search | date=February 16, 2016 | first=Sheri |last=Pym | format=PDF | publisher=United States District Court for the Central District of California | accessdate=February 27, 2016}}</ref><ref>{{cite web|first=Edvard|last=Pettersson|url=http://www.bloomberg.com/politics/articles/2016-02-25/apple-says-u-s-can-t-force-it-to-unlock-terrorist-s-iphone-il2pjiw8|title=Apple Slams U.S. Bid to Make It Crack iPhone in Court Papers|work=Bloomberg Politics|date=February 25, 2016|accessdate=February 25, 2016}}</ref> The [[Federal Bureau of Investigation]] (FBI) and Apple engaged in a dispute over whether the [[United States federal courts|federal court]] may compel Apple to create and [[digital signature|electronically sign]] new software that would enable the FBI to unlock an [[iPhone 5C]] it recovered from one of the shooters in [[2015 San Bernardino attack|a terrorist attack]] in [[San Bernardino, California]], in December 2015<ref>{{cite web|title=7 Things You Need To Know About Apple & FBI Battle Over iPhone Unlocking.|url=http://blog.codeproof.com/2016/02/23/7-things-you-need-to-know-about-apple-fbi-battle-over-iphone-unlocking/|website=Codeproof Technologies|publisher=Satish Shetty|accessdate=15 March 2016}}</ref>. The attack killed 14 people and seriously injured 22. The two attackers later died in a shootout with police, having previously destroyed their personal phones; however, a work phone issued to one of the attackers by his employer was recovered intact.<ref>{{cite web | url=https://www.documentcloud.org/documents/2716000-031122954861.html | title=Government's Motion to Compel Apple Inc. to Comply With This Court's February 16, 2016 Order Compelling Assistance in Search | date=February 19, 2016 | first1=Eileen M. | last1=Decker | first2=Patricia A. | last2=Donahue | first3=Tracy L. |last3=Wilkison | first4=Allen W. |last4=Chiu | work=United States Attorneys | accessdate=February 27, 2016}}</ref> The phone is locked with a four-character password.<ref>{{cite news|last1=Zetter|first1=Kim|title=New Documents Solve a Few Mysteries in the Apple-FBI Saga|url=http://www.wired.com/2016/03/new-documents-solve-mysteries-apple-fbi-saga/|accessdate=March 11, 2016|publisher=WIRED|date=March 11, 2016}}</ref>


== Background ==
== Background ==

Revision as of 21:50, 15 March 2016

The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose contents are cryptographically protected.

In 2015 and 2016, Apple Inc. has received and objected to or challenged at least 11 orders issued by United States district courts under the All Writs Act of 1789. Most of these seek to compel Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked iPhones running on operating systems iOS 7 and older" in order to assist in criminal investigations and prosecutions. A few requests, however, involve phones "with more extensive encryption, which Apple cannot break with its current capabilities". These orders seek to compel Apple to "design new software to let the government circumvent the device's security protocols and unlock the phone".[1]

The most well-known instance of the latter category is In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203, a court case in the United States District Court for the Central District of California.[2][3] The Federal Bureau of Investigation (FBI) and Apple engaged in a dispute over whether the federal court may compel Apple to create and electronically sign new software that would enable the FBI to unlock an iPhone 5C it recovered from one of the shooters in a terrorist attack in San Bernardino, California, in December 2015[4]. The attack killed 14 people and seriously injured 22. The two attackers later died in a shootout with police, having previously destroyed their personal phones; however, a work phone issued to one of the attackers by his employer was recovered intact.[5] The phone is locked with a four-character password.[6]

Background

Rear side of blue iPhone 5c.
An iPhone 5C, the model used by one of the San Bernardino shooters[7]
James Comey, Director of the FBI
Tim Cook, Chief Executive Officer of Apple Inc. Cook and FBI Director Comey have both spoken publicly about the case.

In 1993, the National Security Agency (NSA) introduced the Clipper chip, an encryption device with an acknowledged backdoor for government access, that NSA proposed be used for phone encryption. The proposal touched off a public debate, known as the Crypto Wars, and the Clipper chip was never adopted.[8]

It was revealed as a part of the 2013 mass surveillance disclosures by Edward Snowden that the NSA and the British Government Communications Headquarters (GCHQ) had access to the user data in iPhones, BlackBerrys, and Android phones and could read almost all smartphone information, including SMS, location, emails, and notes.[9]

According to The New York Times, Apple developed new encryption methods for its iOS operating system, versions 8 and later, "so deep that Apple could no longer comply with government warrants asking for customer information to be extracted from devices."[10] Throughout 2015, prosecutors advocated for the U.S. government to be able to compel decryption of iPhone contents.[11][12][13][14]

In September 2015, Apple released a white paper detailing the security measures in its then-new iOS 9 operating system. The iPhone 5C model can be protected by a four-digit PIN code. After more than ten incorrect attempts to unlock the phone with the wrong PIN, the contents of the phone will be rendered unaccessible by erasing the AES encryption key that protects its stored data. According to the Apple white paper, iOS includes a Device Firmware Upgrade (DFU) mode, and that "[r]estoring a device after it enters DFU mode returns it to a known good state with the certainty that only unmodified Apple-signed code is present."[15]

Apple ordered to assist the FBI

On February 9, 2016, in the middle of its investigation into the San Bernardino attack, the FBI announced that it was unable to unlock one of the mobile phones they recovered, a San Bernardino County-owned iPhone 5C used by one of the shooters, because of its advanced security features, including encryption of user data.[16][17] Because the accessible iCloud backup data from the phone does not include the shooter's recent online activities, the FBI asked Apple Inc. to create a new version of the phone's iOS operating system that could be installed and run in the phone's random access memory to disable certain security features. Apple declined because of its policy to never undermine the security features of its products. The FBI responded by successfully requesting a federal judge to issue a court order, mandating Apple to create and provide the requested software.[18][19]

The aforementioned order was not a subpoena, but rather was issued under the All Writs Act of 1789.[20] The use of the All Writs Act in such a case is unprecedented and, according to legal experts, it is likely to prompt "an epic fight pitting privacy against national security."[21] It has also been pointed out that the implications of the legal precedent that would be established by the success of this action against Apple would go far beyond issues of privacy.[22]

Technical details of the order

The court order specified that Apple provide assistance to accomplish the following:

  1. "it will bypass or disable the auto-erase function whether or not it has been enabled"[2] (this user-configurable feature of iOS 8 automatically deletes keys needed to read encrypted data after ten consecutive incorrect attempts[23])
  2. "it will enable the FBI to submit passcodes to the SUBJECT DEVICE for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available"[2]
  3. "it will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware"[2]

The order also specifies that Apple's assistance may include providing software to the FBI that "will be coded by Apple with a unique identifier of the phone so that the [software] would only load and execute on the SUBJECT DEVICE"[2]

Apple's opposition to the order

Apple announced its intent to oppose the order, citing the security risks that the creation of a backdoor would pose towards customers.[24] It also stated that no government had ever asked for similar access.[25] The company was given until February 26, 2016, to fully respond to the court order.[26]

On February 16, 2016, Apple chief executive officer Tim Cook released an online statement to Apple customers, explaining the company's motives for opposing the court order. He also stated that while they respect the FBI, the request they made threatens data security by establishing a precedent that the U.S. government could use to force any technology company to create software that could undermine the security of its products.[27] He said in part:

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand. This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.[27]

In response to the opposition, on February 19, 2016, the U.S. Department of Justice filed a new application urging a federal judge to compel Apple to comply with the order.[28] The new application stated that the company could install the software on the phone in its own premises, and after the FBI had hacked the phone via remote connection, Apple could remove and destroy the software.[29] Apple has hired attorneys Ted Olson and Theodore J. Boutrous Jr. to fight the order on appeal.[21]

The same day, Apple revealed that it had discussed with the FBI four methods to access data in the iPhone in early January, but, as was revealed by a footnote in the February 19, 2016, application to the court, one of the more promising methods was ruled out by a mistake during the investigation of the attack. After the shooter's phone had been recovered, the FBI asked San Bernardino County, the owner of the phone, to reset the password to the shooter's iCloud account in order to acquire data from the iCloud backup. However, this rendered the phone unable to back up recent data to iCloud unless its pass-code is entered.[30][31][32] This was confirmed by the U.S. Department of Justice, which then added that any backup would have been "insufficient" because they would not have been able to recover enough information from it.[33]

The government cites as precedent United States v. New York Telephone Co., where the Supreme Court ruled in 1977 that the All Writs Act gave courts the power to demand reasonable technical assistance from the phone company in accessing phone calling records. Apple responded that New York Telephone was already collecting the data in question in the course of its business, something the Supreme Court took note of in its ruling. Apple also asserts that being compelled to write new software "amounts to compelled speech and viewpoint discrimination in violation of the First Amendment. … [W]hat is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone's user?" A hearing on the case is scheduled for March 22.[34]

San Bernardino County District Attorney Michael Ramos filed a brief stating the iPhone may contain evidence of a "lying dormant cyber pathogen" that could have been introduced into the San Bernardino County computer network,[35][36][37] as well as identification of a possible third gunman who was alleged to have been seen at the scene of the attack by eyewitnesses.[38] The following day, Ramos told the Associated Press that he did not know whether the shooters had compromised the county's infrastructure, but the only way to know for sure was by gaining access to the iPhone.[39][40] This statement has been criticized by cyber-security professionals as being improbable.[40][41][42][43]

Denial of government request

Apple had previously challenged the U.S. Department of Justice's authority to compel it to unlock an iPhone in a drug case in the United States District Court for the Eastern District of New York in Brooklyn, after the magistrate judge in the case, James Ornstein, requested Apple's position before issuing an order.[44][45]

On February 29, 2016, Judge Ornstein denied the government's request, saying the All Writs Act cannot be used to force a company to modify its products: "The implications of the government's position are so far-reaching – both in terms of what it would allow today and what it implies about Congressional intent in 1789 – as to produce impermissibly absurd results."[46] Ornstien went on to criticize the government's stance, writing, "It would be absurd to posit that the authority the government sought was anything other than obnoxious to the law."[47][48][49] The Justice Department has appealed the ruling to District Court Judge Margot Brodie.[50]

This case is captioned In re Order Requiring Apple Inc. to Assist in the Execution of a Search Warrant Issued by the Court, case number 1:15-mc-01902.[49][51]

Other All Writs Act cases involving iPhones

In addition to the San Bernardino case and the Brooklyn case, Apple has received at least nine different requests from federal courts under the All Writs Act for iPhone or iPad products. Apple has objected to these requests. This fact was revealed by Apple in court filings in the Brooklyn case made at the request of the judge in that case. Most of these requests call upon Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked iPhones running on operating systems iOS7 and older" (as in the Brooklyn case), while others "involve phones with more extensive encryption, which Apple cannot break" and presumably seek to order Apple to "design new software to let the government circumvent the device's security protocols and unlock the phone" (as in the San Bernardino case).[1]

Reactions

National reactions to Apple's opposition of the order were mixed.[52] The Reform Government Surveillance coalition, which includes major tech firms Microsoft, Facebook, Yahoo!, Twitter, and LinkedIn, has indicated its opposition to the order.[53][54][55] By March 3, the deadline, a large number of amicus curiae briefs were filed with the court, with numerous technology firms supporting Apple's position, including a joint brief from Amazon.com, Box, Cisco Systems, Dropbox, Evernote, Facebook, Google, Lavabit, Microsoft, Mozilla, Nest Labs, Pinterest, Slack Technologies, Snapchat, WhatsApp, and Yahoo!. Briefs from the American Civil Liberties Union, the Electronic Frontier Foundation, Access Now, and the Center for Democracy and Technology also supported Apple. The Federal Law Enforcement Officers Association, the Association of Prosecuting Attorneys, and the National Sheriffs' Association filed a brief supporting the FBI.[56][57][58]

Some families of the victims and survivors of the attack indicated they would file a brief in support of the FBI.[59]

The think tank Niskanen Center has suggested that the case is a door-in-the-face technique designed to gain eventual approval for encryption backdoors[60] and is viewed as a revival of the Crypto Wars.[61]

The National Sheriffs' Association has suggested that Apple's stance is "putting profit over safety" and "has nothing to do with privacy."[47]

U.S. Representative Mike Honda, a Democrat who represents the Silicon Valley region, has voiced his support for Apple. Senator Dianne Feinstein of California, a Democrat and vice chairman of the Senate Intelligence Committee, however, has voiced her opposition to Apple.[62]

All candidates for the Republican nomination for the 2016 U.S. presidential election at the time supported the FBI's position, though several expressed concerns about adding backdoors to mobile phones. Both Democratic candidates suggested some compromise should be found.[63][64]

On February 23, 2016, the Financial Times reported[65] that Bill Gates, founder of Microsoft, has sided with the FBI in the case. However, Gates later said in an interview with Bloomberg News "that doesn't state my view on this."[66] He added that he thought the right balance and safeguards need to be found in the courts and in Congress, and that the debate provoked by this case is valuable.[67]

Also on February 23, a series of pro-Apple protests organized by Fight for the Future were held outside of Apple's stores in over 40 locations.[68][69][70]

McAfee founder John McAfee had publicly volunteered to decrypt the iPhone used by the San Bernardino shooters, avoiding the need for Apple to build a backdoor.[71] He later indicated that the method he would employ, extracting the unique ID from inside the A7 processor chip, is difficult and risks permanently locking the phone, and that he was seeking publicity.[72]

San Bernardino Police Chief Jarrod Burguan said in an interview:

I'll be honest with you, I think that there is a reasonably good chance that there is nothing of any value on the phone. What we are hoping might be on the phone would be potential contacts that we would obviously want to talk to. This is an effort to leave no stone unturned in the investigation. [To] allow this phone to sit there and not make an effort to get the information or the data that may be inside of that phone is simply not fair to the victims and their families.[73]

Manhattan District Attorney Cyrus Vance, Jr. said that he wants Apple to unlock 175 iPhones that his office's Cyber-Crime Lab been unable to access, adding, "Apple should be directed to be able to unlock its phones when there is a court order by an independent judge proving and demonstrating that there's relevant evidence on that phone necessary for an individual case."[74]

FBI Director Comey, testifying before the House Judiciary Committee, compared Apple's iPhone security to a guard dog, saying, "We're asking Apple to take the vicious guard dog away and let us pick the lock."[75]

U.S. Defense Secretary Ashton Carter called for Silicon Valley and the federal government to work together. "We are squarely behind strong data security and strong encryption, no question about it," he said. Carter also added that he is "not a believer in back doors."[76]

Zeid Raad al-Hussein, the United Nations High Commissioner for Human Rights, warned the FBI of the potential for "extremely damaging implications" on human rights and that they "risk unlocking a Pandora's box" through their investigation.[77]

In a March 7 interview with Maria Bartiromo on the Fox Business Network, General Michael Hayden, former director of the NSA and the Central Intelligence Agency, supported Apple's position, noting that the CIA considers cyber-attacks the number one threat to U.S. security and saying that "this may be a case where we've got to give up some things in law enforcement and even counter terrorism in order to preserve this aspect, our cybersecurity."[78]

Edward Snowden said that the FBI already has the technical means to unlock Apple's devices and said, "The global technological consensus is against the FBI."[79][80]

In an address to the 2016 South by Southwest conference on March 11, President Barack Obama stated that while he could not comment on the specific case, "You cannot take an absolutist view on [encryption]. If your view is strong encryption no matter what and we can and should create black boxes, that does not strike the balance that we've lived with for 200 or 300 years. And it's fetishizing our phones above every other value. That can't be the right answer."[81]

See also

References

  1. ^ a b McLaughlin, Jenna (February 23, 2016). "New Court Filing Reveals Apple Faces 12 Other Requests to Break Into Locked iPhones". The Intercept. Retrieved March 3, 2016.
  2. ^ a b c d e Pym, Sheri (February 16, 2016). "Order Compelling Apple, Inc. to Assist Agents in Search" (PDF). United States District Court for the Central District of California. Retrieved February 27, 2016.
  3. ^ Pettersson, Edvard (February 25, 2016). "Apple Slams U.S. Bid to Make It Crack iPhone in Court Papers". Bloomberg Politics. Retrieved February 25, 2016.
  4. ^ "7 Things You Need To Know About Apple & FBI Battle Over iPhone Unlocking". Codeproof Technologies. Satish Shetty. Retrieved March 15, 2016.
  5. ^ Decker, Eileen M.; Donahue, Patricia A.; Wilkison, Tracy L.; Chiu, Allen W. (February 19, 2016). "Government's Motion to Compel Apple Inc. to Comply With This Court's February 16, 2016 Order Compelling Assistance in Search". United States Attorneys. Retrieved February 27, 2016.
  6. ^ Zetter, Kim (March 11, 2016). "New Documents Solve a Few Mysteries in the Apple-FBI Saga". WIRED. Retrieved March 11, 2016.
  7. ^ Nakashima, Ellen (February 17, 2016). "Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks". The Washington Post. Retrieved February 18, 2016.
  8. ^ Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age, Steven Levy, 2001
  9. ^ "Privacy Scandal: NSA Can Spy on Smart Phone Data". September 7, 2013. Retrieved February 25, 2016.
  10. ^ Sanger, David E.; Chen, Brian X. (September 27, 2014). "Signaling Post-Snowden Era, New iPhone Locks Out N.S.A." The New York Times. Retrieved February 25, 2016.
  11. ^ "Manhattan DA: iPhone Crypto Locked Out Cops 74 Times". Wired. July 8, 2015. Retrieved February 25, 2016.
  12. ^ Zakrzewski, Cat (October 12, 2015). "Encrypted Smartphones Challenge Investigators". The Wall Street Journal. Retrieved February 25, 2016.
  13. ^ "Prosecutors press on with 'think of the children' campaign against encryption in iOS, Android". AppleInsider. August 12, 2015. Retrieved February 25, 2016.
  14. ^ Tiffany Kary,Chris Dolmetsch (November 18, 2015). "Apple, Google Urged to Crack Encrypted Phones in Terror Probes". Bloomberg News. Retrieved February 25, 2016.
  15. ^ "iOS Security—Version 9 or later" (PDF). Apple Inc. September 2015. Retrieved February 25, 2016.
  16. ^ Volz, Dustin; Hosenball, Mark (February 9, 2016). "FBI director says investigators unable to unlock San Bernardino shooter's phone content". Reuters. Retrieved February 16, 2016.
  17. ^ Abdollah, Tami; Tucker, Eric (February 16, 2016). "SAN BERNARDINO SHOOTING: Apple must help US hack killer's phone". The Press-Enterprise. Retrieved February 16, 2016.
  18. ^ Blankstein, Andrew (February 16, 2016). "Judge Forces Apple to Help Unlock San Bernardino Shooter iPhone". NBC News. Retrieved February 16, 2016.
  19. ^ Mitchell, Anne P. (February 17, 2016). "Full Explanation of Court Order to Apple to Unlock San Bernardino Shooters' iPhone and Apple Refusal (Full text of court order and Tim Cook's letter included)". The Internet Patrol. Retrieved February 26, 2016.
  20. ^ Chesney, Robert M. (February 17, 2016). "Apple vs FBI: The Going Dark Dispute Moves from Congress to the Courtroom". Lawfare. Retrieved February 20, 2016.
  21. ^ a b Dolan, Maura; Kim, Victoria (February 18, 2016). "Apple-FBI fight over iPhone encryption pits privacy against national security". Los Angeles Times. Retrieved February 20, 2016.
  22. ^ Davidson, Amy (February 19, 2016). "The Dangerous All Writs Act Precedent in the Apple Encryption Case". New Yorker. Retrieved February 20, 2016.
  23. ^ Boutrous, Jr., Theodore J. (February 25, 2016). "APPLE INC'S MOTION TO VACATE" (PDF). Documentcloud. p. 51. Retrieved March 14, 2016.
  24. ^ Perez, Evan; Hume, Tim (February 17, 2016). "Apple opposes judge's order to hack San Bernardino shooter's iPhone". CNN. Retrieved February 17, 2016.
  25. ^ Yadron, Danny (February 19, 2016). "Apple says the FBI is making access demands even China hasn't asked for". The Guardian. Retrieved February 20, 2016.
  26. ^ "SAN BERNARDINO SHOOTING: Apple gets more time to file its response". The Press-Enterprise. February 19, 2016. Retrieved February 19, 2016.
  27. ^ a b Cook, Tim (February 16, 2016). "A Message to Our Customers". Apple Inc. Retrieved February 19, 2016.
  28. ^ Levine, Mike; Date, Jack; Cloherty, Jack (February 19, 2016). "DOJ Escalates Battle With Apple Over San Bernardino Shooter's Phone". ABC News. Retrieved February 19, 2016.
  29. ^ "San Bernardino shooting: US says Apple could keep, destroy software to help FBI hack iPhone". Associated Press. February 19, 2016. Retrieved February 19, 2016.
  30. ^ Dave, Paresh (February 19, 2016). "Apple and feds reveal San Bernardino shooter's iCloud password was reset hours after attack". Los Angeles Times. Retrieved February 19, 2016.
  31. ^ Date, Jack (February 19, 2016). "San Bernardino Shooter's Apple ID Passcode Changed While in Government Possession, Apple Says". Yahoo! GMA. Retrieved February 19, 2016.
  32. ^ Volz, Dustin; Edwards, Julia (February 20, 2016). "U.S., Apple ratchet up rhetoric in fight over encryption". Reuters. Retrieved February 20, 2016.
  33. ^ "Apple Says Law Enforcement Missed Chance to Back Up San Bernardino Shooter's iPhone". CNN Wire. February 20, 2016. Retrieved February 20, 2016.
  34. ^ Zetter, Kim; Barrett, Brian (February 25, 2016). "Apple to FBI: You Can't Force Us to Hack the San Bernardino iPhone". Wired. Retrieved February 25, 2016.
  35. ^ Fagan, Gary (March 4, 2016). "In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203" (PDF). Ars Tecnica. Retrieved March 10, 2016.
  36. ^ Kravets, David (March 3, 2016). "San Bernardino DA says seized iPhone may hold "dormant cyber pathogen"". Ars Technia. Retrieved March 4, 2016. The iPhone is a county owned telephone that may have connected to the San Bernardino County computer network. The seized iPhone may contain evidence that can only be found on the seized phone that it was used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino's infrastructure.
  37. ^ Downey, David (March 4, 2016). "SAN BERNARDINO SHOOTING: DA fears terrorist's iPhone could have launched cyber attack". The Press-Enterprise. Retrieved March 5, 2016.
  38. ^ "Prosecutor: iPhone could ID unknown San Bernardino attacker". CBS News. Associated Press. March 4, 2016. Retrieved March 5, 2016.
  39. ^ Bailey, Brandon (March 3, 2016). "Does an extremist's iPhone contain a "cyber pathogen"?". Associated Press. Retrieved March 10, 2016.
  40. ^ a b Kravets, David (March 4, 2016). "What is a "lying-dormant cyber pathogen?" San Bernardino DA says it's made up [Update]". Ars Technica. Retrieved March 5, 2016. Did he use the county's infrastructure? Did he hack into that infrastructure? I don't know. In order for me to really put that issue to rest, there is one piece of evidence that would absolutely let us know that, and that would be the iPhone.
  41. ^ Collins, Katie (March 4, 2016). "Harry Potter fiction or iPhone weaponry? The 'dormant cyber pathogen' at the heart of Apple vs. FBI". CNET. Retrieved March 5, 2016.
  42. ^ "What's a 'cyber pathogen'? San Bernardino DA baffles security community". The Guardian. March 4, 2016. Retrieved March 5, 2016.
  43. ^ Russel, Jon (March 4, 2016). "San Bernardino DA claims Syed Farouk's iPhone may house 'cyber pathogen'". Tech Crunch. Retrieved March 5, 2016.
  44. ^ Bradshaw, Tim; Waters, Richard (February 24, 2016). "Apple's legal strategy v FBI has roots in case heard last year". Financial Times. Retrieved February 25, 2016.
  45. ^ Frankel, Alison (February 17, 2016). "How a N.Y. judge inspired Apple's encryption fight with Justice". Reuters. Retrieved March 11, 2016.
  46. ^ Ackerman, Spencer; Thielman, Sam; Yadron, Danny (February 29, 2016). "Apple case: judge rejects FBI request for access to drug dealer's iPhone". The Guardian. Retrieved February 29, 2016.
  47. ^ a b Smythe, Christie; Wang, Selina; Kary, Tiffany (March 1, 2016). "Apple Goes to Washington Fresh From Big Boost in iPhone Fight". Bloomberg. Retrieved March 1, 2016.
  48. ^ Smythe, Christie; Kary, Tiffany (February 29, 2016). "Apple Wins in Brooklyn Battle Over Unlocking iPhone". Bloomberg News. Retrieved March 2, 2016.
  49. ^ a b In Re Order requiring Apple, Inc. to assist in the execution of a search warrant issued by the court, Memorandum and Order, James Orenstein, Magistrate Judge, U.S. District Court, Eastern District of New York (Brooklyn), 1:15-mc-1902 (JO), February 29, 2016
  50. ^ Edwards, Julia (March 7, 2016). "Justice Department asks judge to revisit NY iPhone case". Yahoo! News. Reuters. Retrieved March 8, 2016.
  51. ^ Field, Emily. "Apple Says Gov't Can't Force It To Unlock iPhone". Law360. Retrieved March 3, 2016.
  52. ^ Botelho, Greg; Brascia, Lorenza; Martinez, Michael (February 18, 2016). "Anger, praise for Apple for rebuffing FBI over San Bernardino killer's phone". CNN. Retrieved February 19, 2016.
  53. ^ "Reform Government Surveillance Statement Regarding Encryption and Security". Reform Government Surveillance. February 17, 2016. Retrieved February 24, 2016.
  54. ^ Clark, Jack (February 17, 2016). "Google, Tech Companies Side With Apple in Decryption Protest". Bloomberg. Retrieved February 24, 2016.
  55. ^ Andor Brodeur, Michael (February 23, 2016). "FBI v. Apple: What's at stake in encryption fight". The Boston Globe. Retrieved February 23, 2016.
  56. ^ Brandom, Russell (March 3, 2016). "Google, Microsoft, and other tech giants file legal briefs in support of Apple". The Verge. Retrieved March 4, 2016.
  57. ^ Maddigan, Michael; Katyal, Neil (March 2, 2016). "Brief of Amici Curiae Amazon, et. al" (PDF). Hogan Lovells US LLP. Retrieved March 4, 2016.
  58. ^ "Amicus Briefs in Support of Apple". Apple Press Info. March 3, 2016. Retrieved March 4, 2016.
  59. ^ Abdullah, Tami; Myers, Amanda Lee (February 22, 2016). "Some Victims in Terror Attack Support Efforts to Hack iPhone". ABC News. Associated Press. Retrieved February 25, 2016.[dead link]
  60. ^ Froomkin, Dan; McLaughlin, Jenna (February 26, 2016). "FBI vs. Apple Establishes a New Phase of the Crypto Wars". The Intercept. Retrieved February 26, 2016.
  61. ^ Lee, Sung (February 26, 2016). "The government's decades-long battle for backdoors in encryption". Newsweek. Retrieved February 27, 2016.
  62. ^ Thielman, Sam; Yadron, Danny (February 27, 2016). "Crunch time for Apple as it prepares for face-off with FBI". The Guardian. Retrieved March 1, 2016.
  63. ^ "What presidential candidates are saying about the Apple v. FBI debate". Christian Science Monitor. February 19, 2016. Retrieved February 25, 2016.
  64. ^ Bereznak, Alyssa (February 25, 2016). "Every GOP presidential candidate sides with the FBI in fight with Apple". Yahoo! News. Retrieved February 25, 2016.
  65. ^ Foley, Stephen; Bradshaw, Tim (February 23, 2016). "Gates breaks ranks over FBI Apple request". Financial Times. Retrieved February 25, 2016.
  66. ^ "Gates disputes report the he backs FBI in Apple dispute". Bloomberg. February 23, 2016. Retrieved February 25, 2016.
  67. ^ McPhatefeb, Mike (February 23, 2016). "Bill Gates Weighs In on Apple's Clash With the F.B.I." The New York Times. Retrieved February 25, 2016.
  68. ^ Reisinger, Don (February 22, 2016). "Will You Protest the FBI at Apple Stores on Tuesday?". Fortune. Retrieved March 13, 2016.
  69. ^ MOSCARITOLO, ANGELA (February 24, 2016). "Protesters Gather to Support Apple in FBI iPhone Fight". PCMag. Retrieved March 13, 2016.
  70. ^ CUTHBERTSON, ANTHONY (February 22, 2016). "APPLE STORE PROTESTS OVER ENCRYPTION BATTLE PLANNED WORLDWIDE". Newsweek. Retrieved March 13, 2016.
  71. ^ Hathaway, Jay (February 19, 2016). "Antivirus Wild Man John McAfee Offers to Solve FBI's iPhone Problem So Apple Doesn't Have To". Following: How We Live Online. Retrieved February 24, 2016.
  72. ^ Turton, William (March 7, 2016). "John McAfee lied about San Bernardino shooter's iPhone hack to 'get a s**tload of public attention'". The Daily Dot. Retrieved March 7, 2016.
  73. ^ "San Bernardino Police Chief Sees Chance Nothing of Value On Shooter's iPhone". NPR. February 26, 2016. Retrieved February 27, 2016.
  74. ^ "It's Not Just The iPhone Law Enforcement Wants To Unlock". NPR. February 21, 2016. Retrieved March 3, 2016.
  75. ^ Abdollah, Tami; Neumeister, Larry (March 1, 2016). "Apple clash before Congress as encryption fight simmers". CBS News. Retrieved March 3, 2016.
  76. ^ Vanian, Jonathan (March 2, 2016). "Defense Secretary Says He Is For Encryption And Against Back Doors". Fortune. Retrieved March 3, 2016.
  77. ^ "San Bernardino Shooting: UN chief warns of implications of Apple-FBI row". The Press-Enterprise. Associated Press. March 4, 2016. Retrieved March 4, 2016.
  78. ^ Limitone, Julia (March 7, 2016). "Fmr. NSA, CIA Chief Hayden Sides with Apple Over Feds". Fox Business. Retrieved March 9, 2016.
  79. ^ Reisinger, Don (March 9, 2016). "Snowden: FBI Saying It Can't Unlock iPhone is 'Bullsh**'". Fortune. Retrieved March 9, 2016.
  80. ^ Snowden, Edward (March 8, 2016). "The global technological consensus is against the FBI. Why? Here's one example". Twitter. Retrieved March 9, 2016.
  81. ^ Machkovech, Sam (March 11, 2016). "Obama weighs in on Apple v. FBI: "You can't take an absolutist view"". Ars Technica. Retrieved March 12, 2016.
  82. ^ "Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans 'the privacies of life.'" Riley v. California, 573 U. S., ___, No. 13-312, slip op. at 28 (2014).