Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Iphone Privacy Apple News Technology Your Rights Online

Apple Lawyer Ted Olson: Creating Unlock Tool Would Lead To 'Orwellian' Society (9to5mac.com) 183

Apple's lawyer, Ted Olson, explained in an interview with CNN that what the government is asking Apple to do is "limitless." Olson explained that if the tool that the government wants is created, any judge anywhere could essentially order to list to any customer's conversation, track location, and much more. The lawyer likened it to an Orwellian "big brother" type society. When pressed about how Apple could potentially help fight terrorism by creating a tool to access locked devices, Olson explained that while Apple will help the government defeat terrorism in every way that it can, it can't be done by breaking the Constitution.
This discussion has been archived. No new comments can be posted.

Apple Lawyer Ted Olson: Creating Unlock Tool Would Lead To 'Orwellian' Society

Comments Filter:
  • by Rockoon ( 1252108 ) on Sunday February 28, 2016 @10:53AM (#51603091)
    Pretending that back doors don't exist is what will create an Orwellian society.

    The back door is already there. Thats the problem. The problem isn't that the government wants Apple to use it, and certainly not that the government wants Apple to create one (remember the original narrative?)
    • by Rosco P. Coltrane ( 209368 ) on Sunday February 28, 2016 @11:09AM (#51603187)

      You miss to point: Apple - and Google, and Microsoft - would much rather do the big-brothering themselves for their own profit, and don't want to give that power to the government.

      1984 is already happening, but Orwell got one thing wrong: the tyranny is coming from the private sector, not the government.

    • by Rumagent ( 86695 ) on Sunday February 28, 2016 @11:40AM (#51603321)

      Spot on!

      Apple i perfectly capable of cracking your device. They are not fighting for privacy. They are fightning for the appearance of privacy because it is good for business.

      It seems to me that either they follow the legal requests (which they are) or they get their shit together and create a phone that is actually secure.

      • by alvinrod ( 889928 ) on Sunday February 28, 2016 @11:51AM (#51603375)
        I believe they already have made one that's more secure. Apparently this particular attack vector only works on older iPhones, which the shooter had in this case. I wouldn't be surprised if the next phone is completely impossible (so much as anything can be at least) for even they themselves to hack. Apple makes all of their money from selling expensive hardware, not customer data, so they don't have much financial motive for needing an access to that data and their inability to do so only makes the hardware more attractive.
        • by Anonymous Coward on Sunday February 28, 2016 @12:16PM (#51603481)

          I believe they already have made one that's more secure. Apparently this particular attack vector only works on older iPhones, which the shooter had in this case. I wouldn't be surprised if the next phone is completely impossible (so much as anything can be at least) for even they themselves to hack. Apple makes all of their money from selling expensive hardware, not customer data, so they don't have much financial motive for needing an access to that data and their inability to do so only makes the hardware more attractive.

          What if the governements orders Apple to create iphones that are breakable ? Thought about that ?
          People are fucking stupid and don't understand that technology is never the answer to a societal problem.
          Politics is. Apple is doing the right thing. If the government wants to break the iphone they have at their disposal billions of dollars, talent and infrastructure beyond even what is available to Apple. So why don't they do it ? Because once the precedent of making a company do your bidding is made private companies are fucked for life. The government is playing the big game here. If they break Apple we'll never ever again have a computer industry that protects the consumer. We don't live (at least for the time being) in a dictatorship and the constitution is still valid. You can't just through it away because of crime or "insert any other bogey man of the week".

        • If unlocking your phone is done by the OS, and Apple can update your OS without your consent, then they can always unlock your phone.
          • If unlocking your phone is done by the OS, and Apple can update your OS without your consent, then they can always unlock your phone.

            Unlocking the phone requires the passcode. There is absolutely 100% no way to unlock the phone without the passcode. What the FBI wants Apple to do is remove a security feature that erases the phone after ten incorrect attempts. Which would be good enough because the phone uses a 4 digit passcode. With an eight digit passcode, nothing Apple or anyone can do.

    • by Kjella ( 173770 )

      Pretending that back doors don't exist is what will create an Orwellian society. The back door is already there. Thats the problem. The problem isn't that the government wants Apple to use it, and certainly not that the government wants Apple to create one (remember the original narrative?)

      With enough C4 you can get into anything physical I own, that's not a backdoor it's just the degree of physical protection it has. Apple has taken the user's very weak lock (the PIN) and tried to put in a much more secure box but without dedicated hardware they had to do it in firmware. It's not a perfect solution but not many have the power to compel Apple to produce a signed firmware disabling it, don't let perfect be the enemy of good.

      At worst, you're back to the user's shitty lock. At no point does Appl

    • The back door is already there.

      If it was we wouldn't be having this debate.

    • with enough time and effort you can crack any device. Security has never been about 'perfection'...at any point in the history of mankind. Ever.

      The whole point of security is to raise the cost (time, money, political capital in this case) that must be spent to break in. Seeing that the government is basically having to go 15 rounds with Apple to break into the iPhone of a deceased terrorist--that seems like pretty good security to me.

      But I understand your confusion--which isn't to say that I'm excusing it,

  • by Applehu Akbar ( 2968043 ) on Sunday February 28, 2016 @10:59AM (#51603115)

    We of the dark side are often accused of invoking the slippery slope argument too soon. But in this instance, if the FBI is able to convince courts that forced labor is a valid tactic to use in a terror investigation, it already has nine new cases (more according to some sources) for which it wants Apple to be forced to write custom crack code in hopes of solving. And every single one of these new cases involves the drug war, not terror.

    • Of course they involve terror.

      The FBI is terrified that they'll stop getting their customary kickbacks from the drug cartels.

    • Re: (Score:2, Interesting)

      by Anonymous Coward

      It's not just a demand for forced labor, they're trying to compel legally-protected speech, and to set a legal precedent in the process.

    • by currently_awake ( 1248758 ) on Sunday February 28, 2016 @02:11PM (#51604043)
      If they can be forced to help unlock a phone after the terror attack, then why can't they be forced to install spy programs on a known terrorist phone before the attack?
    • But in this instance, if the FBI is able to convince courts that forced labor is a valid tactic to use in a terror investigation, it already has nine new cases (more according to some sources) for which it wants Apple to be forced to write custom crack code in hopes of solving.

      This is no different from anybody else having to comply with a court order: it can be costly and the penalties for non-compliance can be harsh. This is nothing new.

      As long as they can break into the phones they produce, courts can

      • "If Apple wants to avoid such cases in the future, they should design phones that they themselves cannot break into. That is entirely legal."

        Apple has already designed iOS to be not decryptable. The FBI, like any other possessor of an encrypted device, is welcome to try writing the facilitating software it would take to allow a brute-force attack on the iPhone. Instead, it is trying to compel Apple to write the software for it, knowing that this would make it easier to break into other such devices in the f

        • Apple has already designed iOS to be not decryptable

          That's simply false. Apple has code signing for OS updates plus insecure cryptographic hardware.

          Instead, it is trying to compel Apple to write the software for it, knowing that this would make it easier to break into other such devices in the future

          Again, that is also false. There is no reason to believe that such software would work for other devices.

          and to establish an exception to the Thirteenth Amendment as precedent. Apple disagrees with this leg

          • Actually I wish you were right about the ease of decrypting an iPhone, because that would make the FBI's case even weaker. You're saying it could easily break into the iPhone by hiring its own developers, but instead chooses to go mano a mano against a company with far more money than it does, and be willing to shred the US Constitution - in an election year - to support its crappy case?

            • You're saying it could easily break into the iPhone by hiring its own developers

              No, it's not easy, it's a lot of work: without Apple's help, they need to get a hardware debugger, a couple of people able to use it, a couple of old iPhones with the same software version, and then try to identify the location where the unlock count is kept/updated. Then they need to take the target 5c and change the unlock count in hardware.

              I think the NSA could do it easily: they probably have both Apple's source code and

      • Courts do not have unlimited authority. Apple is claiming that this oversteps the bounds of legal court orders.

        • Courts do not have unlimited authority. Apple is claiming that this oversteps the bounds of legal court orders.

          Yes, but that is an "undue burden" argument, not a "forced labor" argument; Applehu Akbar's argument was bullshit. Apple's argument may or may not be valid.

  • While I happen to agree with Apple's position in this case, I think it's important to be intellectually honest here.

    When pressed about how Apple could potentially help fight terrorism by creating a tool to access locked devices, Olson explained that while Apple will help the government defeat terrorism in every way that it can, it can't be done by breaking the Constitution.

    Let's not pretend that Tim Cook, or virtually any executive at Apple, gives a shit about the US Constitution.

    It's just really annoying when I see these shysters get indignant and hide behind the same Constitution that they continuously mock and use as a punchline.

    • Let's not pretend that the FBI, or virtually any politician, gives a shit about the US Constitution.

      There - fixed it to more closely match the realities, because the US is already an Orwellian society.

    • Maybe I'm missing something here?

      The 4th Amendment 'guarantees' the people privacy against government intrusion until a judge decides it's OK for the government to search. Search. Not find, search.

      The government can already get the data off this 5C if they want. Heck it doesn't even have the Secure Enclave. They can scrape the epoxy off the memory chips and read the data out in their lab. Did you see Snowden's recent video where he shows an example of this? They have a very precise robot-guided router

      • Even if you "scrape the epoxy off the memory chips and read the data out" all you're going to be reading out is encrypted bits. Yes, by reading out those encrypted bits it could be possible to then try to brute-force attack the encryption... but you make it sound like they could just read the data directly... which is not true.

        • I think that on the 5C and earlier, the key portions that a required to perform a brute-force on the PIN are available on the flash. But it's hard to find accurate information on this. Certainly, on the 5S and later, reading the flash memory won't help you.
    • Let's not pretend that Tim Cook, or virtually any executive at Apple, gives a shit about the US Constitution.

      Whether he does or doesn't isn't terribly relevant. Tim "cares" about the privacy of his users. The 4th Amendment "cares" about the privacy of the people. They're aligned.

      The Constitution that authorizes the government restricts the powers of said government. The government specifically is not authorized to obtain General Warrants; what they're asking for is the digital equivalent of King George'

  • While I'm on Apple's side in this one. The argument that this is against the constitution is, well...arguable.

    The constitution says:
    "The right of the people to be secure in their persons, houses, papers, and effects,[a] against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized"

    So we need a sworn court order which, to

    • Maybe I'm missing something here?

      Please don't post in stories on which you are completely uninformed. This particular case has no 4th amendment issues. The phone belongs to the San Bernadino heath department, so there never was an expectation of privacy.

      The issue here is whether Apple can be forced to do something that they don't want to do. Something that is against Apple's business interests, something that may have 1st amendment issues, something that may negative consequences for the security of Am

    • by kenwd0elq ( 985465 ) <kenwd0elq@engineer.com> on Sunday February 28, 2016 @11:14AM (#51603215)

      The "unreasonable" part. It's "reasonable" for Apple, on receipt of a court order, to turn over to the FBI all data in its possession concerning the terrorists, which Apple has done.

      Demanding that Apple force its programmers to write custom software THAT DOES NOT NOW EXIST to allow the FBI to break into one particular iPhone is "unreasonable", and I think Cook, and Apple, are correct here.

      Further, concerning the 1789 "All Writs Act", signed by George Washington back before there was much Federal law at all; if the All Writs Act can be perverted so far as to demand that Apple write software that does not exist, then what government demand does it NOT permit? Because if there aren't any limits to THIS PARTICULAR LAW, then the Constitution died in 1789, barely two years after its ratification.

      • Wouldn't any law written in 1789 be limited by both the US constitution as written and any subsequent amendments? I mean the law would have been passed 2 years before the bill of rights (10 of the first 12 amendments) was ratified in 1791-2. Furthermore the 13th amendment bars involuntary servitude except as punishment for a crime. Certainly any law would have to take that into consideration.

        Perhaps if Apple was a cake maker or photographer this would be a lot simple to sort out.

      • "Demanding that Apple force its programmers to write custom software THAT DOES NOT NOW EXIST to allow the FBI to break into one particular iPhone is "unreasonable", and I think Cook, and Apple, are correct here."

        Exactly. The FBI should have asked. And Apple would have and should have refused, as they have.

        Instead, the FBI screwed up and then are trying to strong-arm Apple into repairing the mess the FBI made. Typical overreach and use of force instead of brains.

        • Perhaps Apple should agree to write that software for the FBI, but the Professional Services fee should be TEN BILLION DOLLARS, paid in advance.

          And since there are, reportedly, 8 or 9 other Federal prosecutors in the possession of locked iPhones who plan to use the FBI's precedent to make their OWN case (these cases are all drug related, not terrorism), then Apple will have set the price for this service. No discounts!

          • Interesting, but after one capitulation at whatever price, the rest would be mere price negotiations.
        • Demanding that Apple force its programmers to write custom software THAT DOES NOT NOW EXIST to allow the FBI to break into one particular iPhone is "unreasonable"

          But what if the software does exist? Asking "Hey, can you change a couple of variables, and recompile" is not very burdensome. As for the driver to allow for PIN guesses via some other method than the touch screen, that sounds more likely to be unreasonable. But what if the code already exists? It's not too hard to imagine that Apple already has some test assembly that they use in test labs for testing PIN entries on physical devices.

          • That doesn't comply with the court order, which requires that the software shall run ONLY on the target device and NO OTHERS. If it were a matter of changing some variables and recompiling, then it would violate the court order. Since Apple would violate the court order in ANY event, then they're correct to choose THIS course of action - to do nothing.

          • Good point but I think it requires a bit of supposition.
          • Demanding that Apple force its programmers to write custom software THAT DOES NOT NOW EXIST to allow the FBI to break into one particular iPhone is "unreasonable"

            But what if the software does exist? Asking "Hey, can you change a couple of variables, and recompile" is not very burdensome.

            Yes. And that is what they will claim in the next cases already piling up, because then, not now, the software will exist.

      • Further, concerning the 1789 "All Writs Act", signed by George Washington back before there was much Federal law at all.

        Actually, I'm wandering a bit off-topic, but this "All Writs Act" could be awesome.

        Recently, Northrop-Grumman announced their new B-21 strategic bomber. They're going to build them at a cost to the taxpayer of $800 million per.

        Nope! "All Writs Act!"

        That's right, with the "All Writs Act," all the government needs is a court order saying that this is important for "National Security" and, bingo, Northrop-Grumman has to figure out how to build it for free!

        (Yes, I'm being facetious.)

        • Don't SAY stuff like that, not even in jest! Some congresscritter (or staffer) is likely to be lurking here, and get the idea that this might actually WORK!

          But there is case law concerning the All Writs Act; demands made regarding it are required to be "reasonable", which the FBI's demand in this case is not.

          But now Apple will spend a billion dollars litigating this all the way to the Supreme Court, and Apple is pretty sure that's how far it'll go - because you don't hire the former Solicitor General of

      • Because if there aren't any limits to THIS PARTICULAR LAW, then the Constitution died in 1789, barely two years after its ratification.

        There are limits. The word 'reasonable' and that it takes a request from one branch of government, and another independent branch to sign off on it. If either one believes that what is being asked is not reasonable, then it doesn't apply.

      • All Writs Act essentially just says that the courts can do stuff without needing micromanaging from congress.

        • All Writs Act essentially just says that the courts can do stuff without needing micromanaging from congress.

          Unless congress has already done that micromanagement, then they can't. In this case it's called "Communications Assistance for Law Enforcement Act".

          In the section of CALEA entitled “Design of features and systems configurations,” 47 U.S.C. 1002(b)(1), the statute says that it “does not authorize any law enforcement agency or officer —
          (1) to require any specific design of equipment, facilities, services, features, or system configurations to be adopted by any provider of a wire o

    • by Anonymous Coward

      Maybe I'm missing something here?

      Yes, the popcorn. Here's a bowl. Enjoy the show.

    • You are absolutely right. There is a court order, and a public one at that, so the 4th amendment is not at issue. That's what distinguishes this from the whole Snowden thing, where government intelligence-gathering entities either act without a court order, or else on a secret court order by a secret court (which is really the same thing, 'cause who knows what happened, 'cause it's a secret).

      No, the thing going on here is that Apple is being asked, or even forced, to compromise their own product using mean

    • The 4th amendment is actually irrelevant in this case. The phone belongs to the San Bernardino County government. It was a work phone assigned to the shooter, not the shooter's personal phone.

      That's a crucial fact which keeps being omitted from this debate. Apple's argument holds no water if this software can only be used at the device owner's request. It's not the government coercing them to hack an iPhone that they fear. It's Johnny's mom and dad coercing them to hack Johnny's iPhone they fear (ti
  • not that it would make a world of sunshine and happiness either. But Orwell's book wasn't about out of control government, it was about the negative impact of television and other forms of mass media. It always bugs me that even schools don't bother to cover this until maybe when you hit college.

    Sure, I agree with Apple on this one (though I'd argue they're less concerned about freedom and more so about having to pay to write backdoors and clean up the brand damage from said backdoors). But can we stop
    • Sure it was about out of control government - who do you think were controlling the media?
    • But can we stop trotting out Orwell as our anti-gov't poster boy please? The man was a socialist for Pete's sake...

      Any full blown 'ist is indistinguisable from another.

  • Thanks to the NSA and the Freedom Act, we're already there.

    Kudos to Apple for trying to limit the scope of the problem, but they can't prevent something that already exists.
  • So basically, your phone is still your enemy, and anyone with physical access to the device will eventually be able to defeat all of your safeguards. This same situation exists with laptops and other computers. Even if your entire system is encrypted, at some point you must enter a key. It would seem that anyone with physical access to the hardware can intercept that key by some means. The only "hard" problem is this ex-post facto style access where the keyholder is dead. I guess the cops will have to stop

  • facecrime (Score:4, Informative)

    by Anonymous Coward on Sunday February 28, 2016 @11:44AM (#51603337)

    "It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself – anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face (to look incredulous when a victory was announced, for example) was itself a punishable offense. There was even a word for it in Newspeak: facecrime, it was called."

    "The telescreen recieved and transmitted simultaneously. Any sound Winston made, above the level of a very low whisper, would be picked up by it; moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever the wanted to. You had to live- did live, from habit that became instinct- in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized."

    -Some quotes from 1984

  • That feels like a rather ironic statement given the fact that Apple and Google are at the forefront of invading your privacy so they can better jam advertisements down your throat.
    • Google, yes; Apple, no. In case you hadn't realized it, Apple is in the hardware business. Google is in the advertising business. Everything they do is to further advertising. Everything.
  • As the subject reads, I'm in total agreement with Mr. Olson. Mandatory backdoors in encryption systems lead to no good endings. I would sooner not sacrifice my privacy to catch the relative few who abuse encryption.
  • We are their now or are we all going to pretend the mass collection and saving of that data without warrants isn't breaking the constitution? If the use of stingray,mass collection of all text messages,emails isn't Orwellian i don't know what is. But its ok for corporations "a list far to lengthy to post" to spy on our every move to make a buck is ok??
  • by NotSoHeavyD3 ( 1400425 ) on Sunday February 28, 2016 @02:25PM (#51604105) Journal
    Since his wife was killed by terrorists on 9/11 he's a good choice to counter the fed's "But we need this because terrorists" argument.
  • Apple can unlock your phone and access your encrypted data with a home-grown tool, but they are telling your your data is secure because they aren't cooperating with the FBI and making a big fuss about it in the media. In the day and age of national security letters and gag orders, that's a joke. If some mechanism exists by which Apple can unlock your phone, your phone isn't secure, and none of this public posturing helps: Apple may already have been ordered to create the tool they say they don't want to c
    • Somebody is wearing a tin foil hat...
    • National security letters can make Apple turn over information they already have, but can't compel them to write new software to break security. Since Apple is objecting on the grounds that they don't want to write the software, it's a reasonable presumption that they haven't written it already. If the Feds knew Apple had the software, they wouldn't be demanding that Apple write it, they'd just have the court tell Apple to use the software. It's theoretically possible that Apple has written the crack, b

      • Apple is capable of making this tool because it has intimate knowledge of the security features and OS involved, and has the signing keys. Nobody else can perform this particular attack, so if Apple can manage to avoid it it's not a practical security vulnerability

        Sorry, that's just silly. Figuring out where the unlock count is kept in RAM is a moderate amount of work, but it isn't rocket science. Furthermore, an attacker with access to the hardware doesn't need code signing, they can simply change the lo

Think of it! With VLSI we can pack 100 ENIACs in 1 sq. cm.!

Working...