Don't Believe The Hype: No, Apple HAS NOT Done What The FBI Now Wants '70 Times' Before

from the propaganda dept

In the past couple of days, you may have heard various claims regarding the whole Apple encryption backdoor debate saying things like "but Apple has unlocked iPhones 70 times before." I've seen a bunch of people tweeting and linking to such claims, and it keeps coming up. And it's bullshit. The 70 times that Apple helped law enforcement before were totally different situations involving unencrypted information where Apple had the ability to extract from the phone because it wasn't encrypted. That's kind of the whole point here. Yes, of course, Apple can and does provide access to information that it can easily access. In fact, in this very case the FBI submitted a warrant and was able to get all of the information from the unencrypted aspect of Farook Syed's iCloud account:
That's very, very, very, very, very, very different from arguing that because the company was willing to hand over that unencrypted data that Apple had full access to, that it's the same kind of thing as building a hacking tool that undermines the foundations of encryption -- and would set a precedent basically allowing a judge to order any company to backdoor and destroy their encryption.

And yet, this message is gaining steam. It's a talking point that first was given life by the feds last October when they tossed out that "70 times in the past" number as part of the earlier All Writs Act case we'd been covering. But unfortunately it picked up steam yesterday with a Shane Harris piece at the Daily Beast yesterday, claiming misleadingly that "a 2015 court case shows that the tech giant has been willing to play ball with the government before -- and is only stopping now because it might 'tarnish the Apple brand.'" That's hellishly misleading, which is too bad because Harris is so often good on these issues.

Apple, and plenty of other companies have always been willing to "play ball" when there's a legitimate warrant along with actual information they can provide. That's because they have to. But this is different. This case involves information that Apple does not have and which the FBI asked for, and the judge has now granted -- an order for Apple to proactively figure out a way to hack around the security protections on the device, allowing the FBI to then look to brute force the (probably) weak passcode on the phone. In other words, the concept and the principle are very, very different than those "70 previous times." And it's not just about "tarnishing Apple's brand," though I'm sure that's at least a part of it. As Julian Sanchez rightly notes at Time, there's so much more at stake here, including opening up the possibility that judges can order any tech company to help the government hack into their systems.

Once again: handing over info you have full access to is not even remotely close to forcing a company to build hacking tools for the government to undermine their own security.

But, of course, that hasn't stopped many in the press from taking this "but Apple unlocked 70 iPhones in the past" talking point and running with it. It's all over the place, including many sources that should know better.

Don't let the propaganda fool you. This case is very, very different and there are much bigger issues at stake.

Filed Under: all writs act, encryption, fbi, security, warrants
Companies: apple


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Anonymous Coward, 19 Feb 2016 @ 12:03pm

    There is something more going on here:

    What could possibly be on the phone that is worth a major corporation compromising the security of all of it’s products? This is not proportional, the means do not justify the outcome. Therefore, this is a planned , orchestrated attack by the DOJ to push for a backdoor. A backdoor that they have been asking for since Apple started encrypting their devices by default. Not a coincidence.

    The DOJ has people that can build the firmware that they want, that's a no brainer. What the DOJ does not have is Apple's digital key that is necessary to sign the modified firmware before the device will accept the firmware. Once Apple gives up this key, all of the devices that use this key are compromised.

    This is a no-win situation for Apple. Congressman, senators and multiple media outlets are pushing public opinion against Apple. If Apple concedes to the court of public opinion, no one can trust the security of their Apple products and no one will buy Apple products. If Apple stands fast and refuses to comply, they will be labeled pro-terrorism and anti american. And no one will buy Apple products. Sell your Apple stock now, the fork has come out clean, they are done.

    The DOJ scare tactic of ‘Going Dark’ doesn't stand up to scrutiny in the face of the facts.
    Ever since the Snowden revelations, the DOJ has been pushing against the public protecting the privacy that is guaranteed by the United States Constitution. WHY? I know, I know, the rallying cry is “terrorism” and “Protect the children”. but this does not add up - the end does not justify the means. There is something deeper that the government fears or wants or…something.

    Is it power? After all, they say information is power. Can they control you if they know all your secrets?

    I tend to agree with the common phrase “follow the money” as this is the real source of power.
    Is it possible that the government is collecting and analyzing mass amounts of data in order to control the world's financial markets? To what end? Possibly to destabilize the economies of other nation-states? To continue to widen the gap between the 1% and the 99% in order to squeeze out the middle class? To create a ruling class of the rich and elite?

    Is this part of an evil plot for total world domination?

    Is this really a battle over the contents of one person's phone? I think not.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Special Affiliate Offer

Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.