Photo by Thom on Unsplash
If youve been following the news much this week, one story, in particular, may have inspired a sense of deja vu. William Barr, President Donald Trumps current Attorney General appeared in front of cameras alongside FBI Director Christopher Wray to explain how after several months of tinkering, they had managed to successfully crack the phone of the shooter and apparent Al-Qaeda affiliate Mohammed Saeed Alshamrani.
A quick recap of that shooting. Back in December of last year, Alshamrani walked onto a naval air station in Pensacola, Florida at around 7:00 am. Armed with a 9mm Glock handgun and several magazines of ammunition, Alshamrani roamed two floors of the building and opened fire, killing three and injuring eight more. About an hour after the shooting began, Alshamrani was shot and killed by Escambia County sheriff deputies.
On January 13, 2020, the FBI officially categorized the shooting an alleged act of terror, and suspected it was motivated by, jihadist ideology. From there, a full-blown investigation was launched attempting to discover any link between the gunman and larger terrorist groups. Central to that investigation were the contents of two phones an iPhone 5 and an iPhone 7 Plus which Alshamrani had on him during the time of the attack. Both were locked behind a passcode.
In a series of events that would eerily resemble the response to the 2015 San Bernardino shooting, FBI officials asked Apple to step in and unlock the phones. As was the case then, Apple refused, saying they do not possess the ability to bypass their phones local encryption even if they wanted to.
Both of the phones according to Wired, were badly damaged during the shooting and it was initially unclear whether or not any of their contents could be received. Eventually, after weeks of tinkering, the FBI managed to power on and unlock both phones, but no thanks to Apple. Heres FBI Director Ray explaining the situation.
We canvassed every partner out there and every company that might have had a solution to access these phones. None did, Wray said. So we did it ourselves. Unfortunately the technique that we developed is not a fix for our broader Apple problem. Its a pretty limited application.
In varying press conferences and interviews, both Wray and Attorney General Barr blasted into Apple claiming they refused to help law enforcement. But thats not exactly accurate. According to Recode, Apple did provide the FBI additional materials, going as far as to provide them with iCloud backups of Alshamranis phones. The company stopped short of agreeing to create a supposed back door for law enforcement to bypass encryption, citing the same concerns it had back in 2016.
It is because we take our responsibility to national security so seriously that we do not believe in the creation of a backdoor one which will make every device vulnerable to bad actors who threaten our national security and the data security of our customers, Apple said this week in a statement sent to Wired. There is no such thing as a backdoor just for the good guys, and the American people do not have to choose between weakening encryption and effective investigations.
That argument fell on deaf ears within the US government. Following the announcement of the FBIs successful iPhone cracking, Barr said he was tired of working with Apple and called for legislative solutions to force Apple to comply in future cases.
The bottom line: Our national security cannot remain in the hands of big corporations who put dollars over lawful access and public safety, Barr said. The time has come for a legislative solution.
While back in 2016 the FBIs main point of contention was a potential inability to bypass iPhone encryption, the main issue now revolves around time and financial cost. During his press conferences, FBI director Wray criticized Apple for supposedly costing the agency valuable time time he claims which let co-conspirators delete evidence.
Public servants, already swamped with important things to do to protect the American people and toiling through a pandemic, with all the risk and hardship that entails had to spend all that time just to access the evidence we got court-authorized search warrants for months ago, Wray said.
And even though the FBI did manage to break into the phone, they are still demanding backdoors into phones because they claim their technique may not work in future cases.
The technique that we developed is not a fix for our broader Apple problem; its of pretty limited application, Wray said.
While its surely frustrating for law enforcement to jump through extra hurdles to gather information, most of the governments rationale for requiring Apple to install backdoors into all its devices fails to hold up under security. For one thing, its unclear why these particular phones in questions were difficult to crack in the first place.
As Chris Welch explains in The Verge, both of the devices here are older models with known vulnerabilities out there making them susceptible to passcode breaking. Several major companies, (most notably Cellebrite) claim they can break the passcodes of any iPhone and have been assisting the FBI for years. Why it took weeks to crack an iPhone 5, which is nearly a decade old (thats Flinstone car in tech years) remains bafflingly unclear.
Its also telling that the government has shifted its language away from saying they cant unlock the phones, to now saying they cant unlock them quickly. The goal post keeps shifting, but the central issue remains the same: any full-scale backdoor would subvert privacy, not just for criminals, but for the billions of innocent people using smartphones every day.
This all follows a familiar trend as ACLU staff attorney Brett Max Kaufman told me in an emailed statement.
Every time theres a traumatic event requiring investigation into digital devices, the Justice Department loudly claims that it needs backdoors to encryption, and then quietly announces it actually found a way to access information without threatening the security and privacy of the entire world. The boy who cried wolf has nothing on the agency that cried encryption.
The timing of the governments announcement is telling here. The House of Representatives is getting ready to vote on a controversial new bill called the EARN IT ACT. While carefully avoiding using the word, encryption, the EARN IT ACT would grant Attorney General Barr the ability to compel tech companies and service providers to provide backdoors into devices.
The bill masquerades as an attempt to reign in child exploitation online, but as multiple writers and privacy advocates have expounded on ad nauseam, the bills purported solution would jeopardize the privacy of everyone who owns a phone, not just child predators. Its no exaggeration to say that if the EARN IT ACT passes, it would represent the most severe invasion of American civil liberties since the Patriot Act.
For decades, encryption has been a cat and mouse game between personal privacy and national security. While it would be one thing if standard encryption was exponentially evolving without any checks, the recent FBI example is clear evidence proving the contrary. The government can break into iPhones and it is getting better and better at it. While private companies shouldnt be able to prevent law enforcement from doing their jobs, they shouldnt be compelled to make investigations a walk in the park either. If the price for greater universal privacy protections means police need to spend extra hours doing police work, then so be it.
Read more here:
Why the Department of Justice Keeps Asking Apple to Unlock iPhones - Medium
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]