Apple Responds To DOJ's Attempt To Get Into Drug Dealer's Phone: Why You So Dishonest?
from the and-off-we-go dept
As we've discussed at length, there are multiple cases going on right now in which the US Justice Department is looking to compel Apple to help access encrypted information on iPhones. There was lots of attention paid to the one in San Bernardino, around Syed Farook's work iPhone, but that case is now over. The one getting almost but not quite as much attention is the one happening across the country in NY, where magistrate judge James Orenstein ruled against the DOJ a little over a month ago, with a very detailed explanation for why the All Writs Act clearly did not apply. The DOJ, not surprisingly, appealed that ruling (technically made a "renewed application" rather than an appeal) to an Article III judge and the case was assigned to judge Margo Brodie.Apple has now filed its argument against the DOJ, making a variety of points, but hitting hard on the idea that the DOJ is flat out lying in now claiming that Apple's assistance in unlocking this phone is "necessary." As we've noted, the end result of the San Bernardino case, where the FBI eventually "figured out" how to get into the phone, raises questions about whether it truly exhausted all possibilities in this case -- which involves a newer phone, but an older operating system.
... the record is devoid of evidence that Apple’s assistance is necessary—and remains so even after a similar claim of necessity was proven untrue in a recent proceeding in California. Indeed, in its original application to Judge Orenstein, the government acknowledged that it sought Apple’s help to spare the government from having to expend “significant resources.”...And, of course, Apple suggests (as it has all along) that the DOJ is totally misreading and/or misrepresenting the All Writs Act:
[....]
The government has made no showing that it has exhausted alternative means for extracting data from the iPhone at issue here, either by making a serious attempt to obtain the passcode from the individual defendant who set it in the first place—nor to obtain passcode hints or other helpful information from the defendant—or by consulting other government agencies and third parties known to the government. Indeed, the government has gone so far as to claim that it has no obligation to do so... notwithstanding media reports that suggest that companies already offer commercial solutions capable of accessing data from phones running iOS 7, which is nearly three years old.
The government would have this Court believe that the All Writs Act, first enacted in 1789, is a boundless grant of authority that permits courts to enter any order the government seeks—including orders conscripting private third parties into providing whatever assistance law enforcement deems appropriate—as long as Congress has not expressly prohibited its issuance. DE 30 at 18. But that characterization of the All Writs Act turns our system of limited government on its head. It simply is not the case that federal courts can issue any order the executive branch dreams up unless and until Congress expressly prohibits it. That construction of the All Writs Act has it exactly backwards. If the government’s view is correct, Congress would never need to pass permissive legislation in the law enforcement context because everything would be on the table until explicitly prohibited. That may be what the government prefers, but it is not the legal system in which it operates.The company also questions whether or not it's really necessary for the government to get into this phone, given that the defendant in the case, Jun Feng, has already pled guilty and the phone hasn't been used in years. Also, the government didn't even seek a warrant to get into the phone for over a year after seizing it.
Apple also raises some procedural concerns. As noted above, the government just asked for a new judge to review, rather than doing an official appeal, and Apple points out that it's doing this to try to avoid certain standards:
In its papers, the government takes great pains to characterize its brief as a renewed application rather than an appeal from Judge Orenstein’s order, presumably to bolster its contention that Judge Orenstein’s order should be reviewed de novo.... In doing so, the government attempts to obscure the fact that this matter was extensively briefed, a hearing was held, supplemental briefing was provided, and Judge Orenstein issued a 50-page order. Moreover, the government’s insistence that it is entitled to a do-over is belied by Federal Rule of Criminal Procedure 59 and Section 636 of the Federal Magistrates Act.One of the key points made by the DOJ in its filing in this case was that Apple had been fine with previous such All Writs Act orders on phones running iOS 7, where it does have more access to information. But Apple notes that the details of this case are different in important ways: this is the first case where the judge specifically brought Apple into court, rather than ruling without Apple being involved at all (i.e. "ex parte").
To be sure, courts have previously issued ex parte orders directing Apple to “assist in extracting data from an Apple device through bypassing the passcode in order to execute a search warrant.” But the government’s cited orders were issued ex parte, without Apple’s participation, without the benefit of adversarial briefing on the scope of the All Writs Act, and with no supporting analysis. Apple also was not a party in United States v. Blake, No. 13-CR-80054 (S.D. Fl. July 14, 2014), in which the court denied the defendant’s motion to suppress evidence gathered from an iPhone that Apple helped unlock. Accordingly, such cases are not even persuasive authority on the scope of the All Writs Act, let alone precedential; certainly such ex parte orders issued with little analysis should carry less weight than Judge Orenstein’s lengthy and reasoned opinion.Most of the other arguments cover things discussed earlier, around why the All Writs Act doesn't apply and why CALEA covers this situation and does not require Apple to assist.
So, while the San Bernardino case may be over, the NY case is still raging. I imagine the DOJ's next filing will be... interesting as well.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: all writs act, doj, encryption, james orenstein, jun feng, margo brodie
Companies: apple
Reader Comments
Subscribe: RSS
View by: Time | Thread
"Here's an idea, how about you do your work /and/ mine."
Translation: "We're not saying we can't do it, we just don't want to bother with it ourselves. As such they should be forced to do it for us."
Last I checked "We're too lazy to do our own jobs" wasn't a valid argument to force a private company to do a government agency's work for it.
[ link to this | view in chronology ]
Re: "Here's an idea, how about you do your work /and/ mine."
i thought SLAVERY was abolished in the US?
... it looks like some branches/members of the government are still practicing it and want to make it an official court-approved policy.
[ link to this | view in chronology ]
Re: "Here's an idea, how about you do your work /and/ mine."
The metadata such numbers called or texted should be enough to allow a brief visit with an abbreviated version of 20 questions. Even if it was a burner phone, a little bit of actual work might tie the phone to a person; it had to be purchased by someone, somewhere.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
The Totalitarian Principle* applied to law enforcement.
* It's a quantum mechanics principle, rather than a political one!
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Government logic for getting what it wants
[ link to this | view in chronology ]
Re: Government logic for getting what it wants
[ link to this | view in chronology ]
Re: Re: Government logic for getting what it wants
I'm shocked, schocked, I tell you, that there is gambling in this establishment!
...Oh, is that my winnings? Okay, I'm off to Panama, safe haven for all tax thieves!
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Again, what is it they think they will find?
Can someone please tell me what a criminal might leave on a phone that law enforcement could use? Pictures of people that they can claim are accomplices? Movies of them breaking the law? We all know that criminals can be stupid but I think these things are actually quite rare. WAIT! A drug dealer's to-do list?
They have all the calls & texts & quite likely recordings of the actual calls. What is it about these phones that are making them go to all this effort?
[ link to this | view in chronology ]
Re: Again, what is it they think they will find?
(except for the propaganda victims and authoritarians who EVEN IF they themselves were 100% innocent and got jacked up by The Man, would aver that it as 100% righteous and double-plus good that they got jacked up, 'cause doesn't that show just how much The They are looking out for us ? ? ? *snort* none so blind...)
[ link to this | view in chronology ]
Re: Again, what is it they think they will find?
[ link to this | view in chronology ]
Re: Again, what is it they think they will find?
Why do they want to do that? Who knows? I can only think of one reason: they want power.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Apple wrong again!
[ link to this | view in chronology ]
The DOJ has a lot of patience, and Apple's lawyers seem pretty trigger happy, and seem to be providing way too much material to work from. Sooner or later, they will say something stupid and the DOJ will jump on them for it.
My guess is that by the end of 2017, Apple will have been spanked on this issue, and their encryption will be back doored or will be made in some way hackable by large scale brute force.
[ link to this | view in chronology ]
Re:
If Apple were to do this, and fail to keep it 100% secret, it would be the end of them as a major consumer product company. I'm not sure how much it would reduce US sales, but sales in the rest of the world would plummet.
I suspect that they'd be willing to spend a pretty sizable chunk of that $200+ billion cash reserve they have to fight that eventuality. Or perhaps withdraw from the US market.
[ link to this | view in chronology ]
Re: Re:
I am not so sure. If they are in EXACTLY the same position as every other company (ie, Android and Windows phones / tablets) then they may not suffer as much.
Well, then again, because they have staked their claim so hard on this issue, it may come back to bite them in the ass. Worst of all, they have no Steve Jobs to save them from hell this time.
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Quick Time for Windows
https://www.us-cert.gov/ncas/alerts/TA16-105A
[ link to this | view in chronology ]
https://cyberlaw.stanford.edu/blog/2016/02/calea-limits-all-writs-act-and-protects-security -apples-phones
https://cyberlaw.stanford.edu/blog/2016/02/more-calea-and-why-it-trumps-fbis-all-writs -act-order
https://backchannel.com/why-are-we-fighting-the-crypto-wars-again-b5310a423295#.p2ry21nov
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]