Don't Believe The Hype: No, Apple HAS NOT Done What The FBI Now Wants '70 Times' Before

from the propaganda dept

In the past couple of days, you may have heard various claims regarding the whole Apple encryption backdoor debate saying things like “but Apple has unlocked iPhones 70 times before.” I’ve seen a bunch of people tweeting and linking to such claims, and it keeps coming up. And it’s bullshit. The 70 times that Apple helped law enforcement before were totally different situations involving unencrypted information where Apple had the ability to extract from the phone because it wasn’t encrypted. That’s kind of the whole point here. Yes, of course, Apple can and does provide access to information that it can easily access. In fact, in this very case the FBI submitted a warrant and was able to get all of the information from the unencrypted aspect of Farook Syed’s iCloud account:

That’s very, very, very, very, very, very different from arguing that because the company was willing to hand over that unencrypted data that Apple had full access to, that it’s the same kind of thing as building a hacking tool that undermines the foundations of encryption — and would set a precedent basically allowing a judge to order any company to backdoor and destroy their encryption.

And yet, this message is gaining steam. It’s a talking point that first was given life by the feds last October when they tossed out that “70 times in the past” number as part of the earlier All Writs Act case we’d been covering. But unfortunately it picked up steam yesterday with a Shane Harris piece at the Daily Beast yesterday, claiming misleadingly that “a 2015 court case shows that the tech giant has been willing to play ball with the government before — and is only stopping now because it might ‘tarnish the Apple brand.'” That’s hellishly misleading, which is too bad because Harris is so often good on these issues.

Apple, and plenty of other companies have always been willing to “play ball” when there’s a legitimate warrant along with actual information they can provide. That’s because they have to. But this is different. This case involves information that Apple does not have and which the FBI asked for, and the judge has now granted — an order for Apple to proactively figure out a way to hack around the security protections on the device, allowing the FBI to then look to brute force the (probably) weak passcode on the phone. In other words, the concept and the principle are very, very different than those “70 previous times.” And it’s not just about “tarnishing Apple’s brand,” though I’m sure that’s at least a part of it. As Julian Sanchez rightly notes at Time, there’s so much more at stake here, including opening up the possibility that judges can order any tech company to help the government hack into their systems.

Once again: handing over info you have full access to is not even remotely close to forcing a company to build hacking tools for the government to undermine their own security.

But, of course, that hasn’t stopped many in the press from taking this “but Apple unlocked 70 iPhones in the past” talking point and running with it. It’s all over the place, including many sources that should know better.

Don’t let the propaganda fool you. This case is very, very different and there are much bigger issues at stake.

Filed Under: , , , ,
Companies: apple

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Don't Believe The Hype: No, Apple HAS NOT Done What The FBI Now Wants '70 Times' Before”

Subscribe: RSS Leave a comment
jameshogg says:

Re: Re:

It’s not an encryption issue, because the brute-forcing bit is easy. It’s a hacking issue because the software/hardware is forbidding the speedy process of it. The FBI want Apple to tinker with their source code essentially.

Though I keep stressing the warrant was granted here. It’s not comparible to unwarranted, mass unconstitutional spying. If it were, by definition Apple would be asked to do it secretly anyway.

Law enforcement asking for a key to a house does not mean we should all be afraid of our locks on the count of the possibility that law enforcement could be forcing all keymakers to keep copies of keys in secret, as a result of that one house “hacking”.

“The government can’t be trusted” is an argument you could make against any security breach, even so much as walking through a criminal’s front door rendering all doors untrustworthy.

The logic is not working for me here.

Anonymous Coward says:

This one is actually starting to scare me. I’m not usually one for conspiracies, but this is really looking at being a coordinated attack on Apple and encryption as a whole. It’s surreal hearing a local radio talkshow yesterday (I wish you would have called in Mike, the host was receptive at the very least) going on about this, cutting to a newsbreak and hearing the same repeated line about how Apple is “defying an FBI order to break then encryption on the San Bernardino terrorists’ phone despite records showing they have been willing to do this as many as 70 times in the past”. And that line was just getting repeated every ten minutes or so.

It’s getting out of hand.

Anonymous Coward says:

Re: Re: Re:

any encryption that’s protected by a five digit pin is not secure. Yes all the marketing hype from companies like Apple might tell you otherwise, that the pin gets hashed and rehashed and seeded and reseeded and seeded again by multiple different inputs but if you really expect a five digit pin to protect very sensitive data you are only fooling yourself.

Anonymous Coward says:

Re: Re: Re: Re:

With a Iphone, the password to get into the phone may be a 5 digit pin, or a long random string. The problem the FBI is facing is that the phone only allws 10 attempts on the password, with increasing delays after each wrong attempts, and it wipes the actual encryption key after 10 failed attempts at a login. What they are asking for is for Ale to turn off the attempt limit, and remove the increasing delay between attempts. After they they will attempt to brute force the password, and will be out of luck if a strong password is in use.

JMT says:

Re: Re: Re: Re:

“any encryption that’s protected by a five digit pin is not secure.”

On it’s own, you’re correct, which is why Apple built in the very safeguards the court is now trying to force them to disable. It’s almost like you haven’t read any of the many articles explaining this…

Of course it’s also possible the dead user of this particular phone felt the same way you do, and didn’t keep any sensitive data on the phone. That’s what makes this such an over-reaching fishing expedition. The potential downsides are enormous, but it might well be for zero gain.

TechDescartes (profile) says:

Re: Re: Where's the moral dilemma, anyway?

The FBI is not contending that they need to break into these phones to stop a future attack from happening—the owners of the phones are dead. The government is not even contending that there is an established link between these “lone wolves” and known terrorists. For this issue to rise to this level of debate, you would expect there to be some sort of moral dilemma (e.g., decrypt this now or people will die). The fact that there is no such dilemma, and yet many are willing to fold nonetheless, is what is most disturbing to me.

Anonymous Coward says:

Re: Re: Re: Where's the moral dilemma, anyway?

I agree, but since the fall the twin towers this country has been running in fear from the boogie men with turbans on their head.

We are quickly protecting ourselves into Tyranny. The government NEVER protects, it reacts to shit by prosecuting and destroying.

There is only 1 universal truth in world history… A nation that asks it citizens to disarm and expose self so that they may be protected is the REAL EVIL to be defeated. Germany serves as a damn good recent example of this that most people should easily understand.

Anonymous Coward says:

Re: Re: Re:3 Where's the moral dilemma, anyway?

Yep, there is no end to the multi-pronged assault on liberty. You do not have to be a willing participant to help destroy liberty, in some cases all you need to do is sit and do nothing to be a party to the problem.

Eternal Vigilance is a fact of life as surely as putting more gas in your car. If you don’t keep it up, you run out of fuel and you lose all momentum. Rest assured that private business interest, civilian politics, and government Authorities are all each doing their part to destroy liberty… which is why it will be destroyed, the only question is how soon?

There currently stands no agency upon this planet that seeks to prop up liberty and justice. American used to be it but we have now become that which we fought so long ago.

Anonymous Coward says:

Re: Re:

Encryption technologies are “by default” created with master keys especially for the testing phase of the product to ensure functionality. And while this is usually necessary during the development of the product… most companies never remove this and pretend that it never happened in the first place.

It would not surprise me in the least if Apple already has a master key capable of decrypting the device but will do anything to protect that information. If we see the news were Apply settles this with the FBI/Court quietly behind closed doors, then you can bet this is the most likely reason.

Anonymous Coward says:

Lying sacks of shit.

Komatireddy argued that Apple should help because it’s been doing that since 2008, and since then it “has never objected” and “has complied” with “at least” 70 similar requests.

So the DOJ is staffed by lying sacks of shit. So what else is new? Those are just exactly the kinds of people that should not be given back-doors.

observer says:

This seems likely to drive Apple to change the way future devices are built. An obvious solution to this exact case would be to make devices that can’t receive OS and firmware updates. So in the name of greater user privacy Apple is forced to make a design decision that results in less usability. Whatever the outcome, the fact that government is pushing seems likely to force Apple into future design decisions it wouldn’t have made otherwise.

Anonymous Coward says:

Apple can and should give FBI access to the raw file system. A software rate limiter is not encryption, nor is it good protection. It’s up to the user to use a strong passphrase to counter brute force attacks. You can’t expect a 4 digit pin to give you security, and Apple is misleading its customers when it claims or suggests this.

Anonymous Coward says:

Re: Re:

You have overlooked the other part of the protection, 10 fails and the actual encryption key is erased. Limited attempts before the card was invalidated, three or four if I remember right, protected cashpoint cards for many years. with the crooks installing cameras in the machines, to capture the pin, along with a stripe reader to allow them to clone the card..

DannyB (profile) says:

A note about Backdoors

See this article entitled: How Google’s Web Crawler Bypasses Paywalls

The article itself is about how to quickly get your chrome browser to use the same trick that Google’s Web Crawler uses to access paywalled sites. You too can read those paywalled sites by making the paywalled sites think that you are the Google Web Crawler.

See the last sentence of the article:

Remember: Any time you introduce an access point for a trusted third party, you inevitably end up allowing access to anybody.

Do you suppose that would also apply to encryption backdoors?

Anonymous Coward says:

There is something more going on here:

What could possibly be on the phone that is worth a major corporation compromising the security of all of it’s products? This is not proportional, the means do not justify the outcome. Therefore, this is a planned , orchestrated attack by the DOJ to push for a backdoor. A backdoor that they have been asking for since Apple started encrypting their devices by default. Not a coincidence.

The DOJ has people that can build the firmware that they want, that’s a no brainer. What the DOJ does not have is Apple’s digital key that is necessary to sign the modified firmware before the device will accept the firmware. Once Apple gives up this key, all of the devices that use this key are compromised.

This is a no-win situation for Apple. Congressman, senators and multiple media outlets are pushing public opinion against Apple. If Apple concedes to the court of public opinion, no one can trust the security of their Apple products and no one will buy Apple products. If Apple stands fast and refuses to comply, they will be labeled pro-terrorism and anti american. And no one will buy Apple products. Sell your Apple stock now, the fork has come out clean, they are done.

The DOJ scare tactic of ‘Going Dark’ doesn’t stand up to scrutiny in the face of the facts.
Ever since the Snowden revelations, the DOJ has been pushing against the public protecting the privacy that is guaranteed by the United States Constitution. WHY? I know, I know, the rallying cry is “terrorism” and “Protect the children”. but this does not add up – the end does not justify the means. There is something deeper that the government fears or wants or…something.

Is it power? After all, they say information is power. Can they control you if they know all your secrets?

I tend to agree with the common phrase “follow the money” as this is the real source of power.
Is it possible that the government is collecting and analyzing mass amounts of data in order to control the world’s financial markets? To what end? Possibly to destabilize the economies of other nation-states? To continue to widen the gap between the 1% and the 99% in order to squeeze out the middle class? To create a ruling class of the rich and elite?

Is this part of an evil plot for total world domination?

Is this really a battle over the contents of one person’s phone? I think not.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...