Jump to content

All Writs Act: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Undoing a good-faith edit by 98.172.26.135: The document to which Ars Technica linked says November 3, 2014. This is not the same instance as what's been in the news this week.
→‎Use in electronic devices: rm undue weight tag as no explanation or justification for it is given on the talk page. That should precede placing a tag.
Line 18: Line 18:


==Use in electronic devices==
==Use in electronic devices==

{{undue|date=February 2016}}
The government has revived the All Writs Act in cases against terrorists, notably to gain access to password protected [[Mobile phone|mobile phones]] in domestic terrorism investigations.
The government has revived the All Writs Act in cases against terrorists, notably to gain access to password protected [[Mobile phone|mobile phones]] in domestic terrorism investigations.



Revision as of 08:38, 23 February 2016

"The All Writs Act", lecture by Jonathan Mayer

The All Writs Act is a United States federal statute, codified at 28 U.S.C. § 1651, which authorizes the United States federal courts to "issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law."

The act in its original form was part of the Judiciary Act of 1789. The current form of the act was first passed in 1911[1] and the act has been amended several times since then.[2]

Act

The text of the Act is:[2]

(a) The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.
(b) An alternative writ or rule nisi may be issued by a justice or judge of a court which has jurisdiction.

Conditions for use

Application of the All Writs Act requires the fulfillment of four conditions:[3]

  • The absence of alternative remedies — the act is only applicable when other judicial tools are not available.
  • An independent basis for jurisdiction — the act authorizes writs in aid of jurisdiction, but does not in itself create any federal subject-matter jurisdiction.
  • Necessary or appropriate in aid of jurisdiction — the writ must be necessary or appropriate to the particular case.
  • Usages and principles of law — the statute requires courts to issue writs "agreeable to the usages and principles of law."

In the case U.S. v. New York Telephone Co. 434 U.S. 159 (1977), the Supreme Court established a three-factor test for the admissible application of the All Writs Act: the party ordered to perform an action cannot be too far removed from the case, the government's request cannot impose an undue burden on that party, and the party's assistance is necessary.[4]

Use in electronic devices

The government has revived the All Writs Act in cases against terrorists, notably to gain access to password protected mobile phones in domestic terrorism investigations.

October 2014

One case in which the act's application drew public attention was on October 31, 2014, by the U.S. Attorney's Office in New York's Southern District to compel an unnamed smartphone manufacturer to bypass the lock screen of a smartphone allegedly involved in a credit card fraud.[5]

Apple Inc.

On November 3, 2014, the Oakland Division of the U.S. Attorney's Office named Apple Inc. in papers invoking the Act, which were filed in the United States District Court for the Northern District of California. Court documents obtained by Ars Technica reveal[6] that federal law enforcement sought to get Apple to extract data from a locked iPhone 5C as part of a criminal case.[7]

On February 16, 2016, the Act was invoked again in an order that Apple Inc. create a special version of its iOS operating system, with certain security features removed, for Federal law enforcement officers to use as part of an investigation into the 2015 San Bernardino terrorist attack.[8] The head of the FBI stated that what was requested was that a feature be disabled, viz. that Apple disable the iPhone's feature to erase encrypted data on the device after 10 incorrect password attempts. Apple claimed that, were they to comply with this demand for automated password entry with no consequence for failed attempts, simple brute force password attacks would then be trivially easy for anyone with access to a phone using this software.[9] Apple CEO Tim Cook responded in an open letter warning of the precedent that following the order and ensuing universal iPhone vulnerability would create.[10] On the same day, the Electronic Frontier Foundation announced its intention to support efforts by Apple Inc. to resist the order.[11] Several public figures have joined the debate, contributing to the media controversy surrounding this invocation of the Act.[12]

In court filings, Apple has argued that the federal government is overstepping its bounds as Congress had codified the Communications Assistance for Law Enforcement Act of 1992, which addresses the guidelines of private entities to act in relation to such circumstances.[13] The federal government disagrees. Saritha Komatireddy, arguing for the government in October in Brooklyn, countered: “CALEA doesn’t even come close to addressing the issue we have here.” DOJ defended the authority of the All Writs Act in its filing on February 19, 2016 against Apple and slammed any hearkening to CALEA: “Put simply, CALEA is entirely inapplicable to the present dispute and does not limit this Court’s authority under the All Writs Act to require Apple to assist the government in executing a search warrant.” DOJ argued the case involved "data at rest rather than in transit" -- an important distinction in CALEA applicability.

Sen. Ron Wyden, D-Ore., a privacy advocate on the Senate Intelligence Committee, argued: “If the FBI can force Apple to build a key, you can be sure authoritarian regimes like China and Russia will turn around and force Apple to hand it over to them,” he said Friday in a Medium blog post. “They will use that key to oppress their own people and steal U.S. trade secrets.”

References

  1. ^ "TOPN: Table of Popular Names". Legal Information Institute.
  2. ^ a b "28 U.S. Code § 1651 - Writs". Legal Information Institute.
  3. ^ Portnoi, D. D. (2009-03-19). "Resorting to Extraordinary Writs: How the All Writs Act Rises to Fill the Gaps in the Rights of Enemy Combatants" (PDF). New York University Law Review: 293–322. Retrieved 2016-02-17.
  4. ^ "United States v. New York Telephone Co., 434 U.S. 159 (1977)".
  5. ^ US Government vs XXX (2014-10-31) ("Assist in the execution of a search warrant issued by this court by unlocking a cellphone"), Text.
  6. ^ Farivar, Cyrus (2014-12-01). "Feds want Apple's help to defeat encrypted phones, new legal case shows". Ars Technica. Retrieved 2016-02-16.
  7. ^ United States of America vs Apple (2014-10-03) ("Order requiring Apple, Inc. to assist in the execution of a search warrant"), Text.
  8. ^ United States of America vs Apple (2016-02-16) ("In the matter of the search of an Apple iPhone seized during the execution of a search warrant on a black Lexus IS300, California license plate 35KGD203"), Text.
  9. ^ Ellen Nakashima (2016-02-17). "Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks". The Washington Post. Retrieved 2016-02-17.
  10. ^ Cook, Tim (2016-02-16). "A Message to our Customers". Apple. Retrieved 2016-02-17.
  11. ^ Opsahl, Kurt (2016-02-16). "EFF to Support Apple in Encryption Battle". Apple Inc. Retrieved 2016-02-17.
  12. ^ O'Neill, Maggie (19 February 2016). "Apple vs. FBI: See who's taking sides". CNN. Turner Broadcasting System. Retrieved 19 February 2016.
  13. ^ "Can an 18th-century law force Apple into hacking killer's phone?". New York Post. 2016-02-18.