An Apple executive has issued a scathing attack on the U.S. government’s request for greater access to its software – saying that the FBI’s demands to have a virtual backdoor on its devices is worse than the Chinese government’s demands.
Apple and the U.S. government have become embroiled in the latest privacy debate following a federal judge ordering Apple to assist the FBI in their access of a phone used by a San Bernardino shooter.
The Guardian reports:
Apple has refused, arguing that to do so would set a legal precedent that could force it to hack a suspect’s phone each time authorities face a warrant. It argues that would violate user trust, privacy norms and weaken the core security of the company’s flagship smartphone.
Early Friday, the Justice Department released a lengthy legal filing that accused Apple of misinterpreting the law and placing marketing goals over national security.
Apple’s legal team was huddled Friday preparing a response and declined to speak on the record. But in several calls with reporters, a senior Apple executive agreed to offer some response on the condition of anonymity and that reporters not quote the executive’s exact words.
The company’s executive said that the Justice Department’s request was so unprecedented that no other country – specifically mentioning China – had asked for similar access. That comes following reports that the country, a huge market for Apple, has asked to inspect western technology products for “security”.
The company executive also said it was safe to assume that Apple would continue to add more security features to its products to make it harder still for investigators to get access.
The company’s latest spat with the FBI goes back to the fall of 2014, when Apple expanded the default use of encryption on its newer iPhones. At the time, it said it would no longer be able to retrieve passcodes used to unlock phones for federal agents.
The FBI conceded this week it can’t force Apple to give it the passcode, but it concocted a clever workaround. It persuaded a judge to order Apple to make it easier to guess the passcode by weakening other countermeasures.
On the call Apple acknowledged that, on a technical level, the workaround could be applied to any iPhone. Authorities would have to get a warrant for each of those cases.
In its filing Friday, the government said that it had tried several other ways to access gunman Syed Farook’s phone, which was owned by his employer – the county agency he targeted. One of them would have been to return his iPhone to his home wireless network to see if it would automatically back up its files on Apple’s iCloud service.
This potentially could have given investigators access to Farook’s files and iMessages up to the moment of the attack.
However, Apple and federal agents discovered that option wouldn’t work. In the hours after the shooting, San Bernardino county staff tried to access Farook’s iCloud account and reset his password. This, unintentionally, triggered an Apple security measure that made it impossible to back up the phone.
The Apple executive conceded there is no way to know if this would have worked. It’s possible, as the government argues, that Farook had turned off the auto-update function. The phone last updated on 19 October, some six weeks before the shooting.
Apple has until 26 February to file a response in federal court.