Attorney General William Barr Says Apple Isn't Doing Enough To Let The DOJ Check Out A Dead Man's Phones

from the give-it-a-rest,-Bill dept

The DOJ has asked somewhat politely for Apple to break the encryption on some iPhones. Last time, the request wasn't so polite. It involved a legal battle that only ended when a third-party cracked the San Bernardino's iPhone for the FBI. Nothing of interest was recovered from that phone.

Another shooting and another dead shooter has brought Apple and the DOJ together again. The DOJ's counsel sent a letter to Apple asking it to break into two phones recovered from the shooter. Apple stated it had already given the DOJ all the information it could recover without actually cracking the devices. This isn't good enough for the DOJ, which believes the possession of a warrant should trump any concerns about creating encryption backdoors.

There's been no demand made in court… yet. But Attorney General Bill Barr -- whose antipathy towards encryption has been stated multiple times -- is trying to apply a little more extrajudicial pressure.

Attorney General William P. Barr declared on Monday that a deadly shooting last month at a naval air station in Pensacola, Fla., was an act of terrorism, and he asked Apple in an unusually high-profile request to provide access to two phones used by the gunman.

[...]

“This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence,” Mr. Barr said, calling on technology companies to find a solution and complaining that Apple had provided no “substantive assistance.”

It actually illustrates nothing of the sort. "Substantive evidence" is unlikely to be found on the shooter's phones. While the DOJ has pointed to evidence the shooter was "radicalized" on social media, it can only speculate about what evidence can be recovered from the phones, one of which partially destroyed by a deputy's bullet during the shootout with the gunman.

The DOJ's assertions undercut Bill Barr's claims that Apple has provided "no substantive assistance." Barr said that the evidence the DOJ already has shows the "shooter was motivated by jihadist ideology." This is based on social media messages and other content recovered by the DOJ, some of it likely from Apple itself.

There's not much of a case to be built against a dead man. And there's probably some value in mining contacts and text messages, but it's dubious to claim the evidence that might reside on the locked devices will be a game changer for the FBI or result in new leads that could prevent future shootings.

Nevertheless, the Attorney General insists Apple is preventing law enforcement from doing its job. According to Barr, a warrant is all anyone should need to see to start cracking open cellphones for the FBI.

Mr. Barr indicated that he is ready for a sharp fight. “We don’t want to get into a world where we have to spend months and even years exhausting efforts when lives are in the balance,” he said. “We should be able to get in when we have a warrant that establishes that criminal activity is underway.”

This is the leverage. Any tragedy with an iPhone in the mix is fodder for the DOJ's anti-encryption efforts. Third-party services can help the FBI achieve what Barr says it wants to achieve: speedy recovery of evidence from locked devices. But Barr and the agencies he represents only want outside help from the courts -- precedent that will make all cellphone users less safe in the name of securing the nation.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: doj, encryption, fbi, going dark, iphones, terrorism, william barr
Companies: apple


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    Thad (profile), 14 Jan 2020 @ 9:29am

    Bill Barr cares very, very much about holding criminals accountable.

    Unless they're high-ranking members of a Republican administration.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 14 Jan 2020 @ 10:19am

      Re:

      Remind me against because I keep forgetting: how much more accountable can humans hold dead men?

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 14 Jan 2020 @ 10:22am

        Re: Re:

        Sorry realized that might have sounded bad: that is to say this shooter, and I think the last are both dead. I don't see how Bars current actions are convincingly aimed at holding any living person accountable.

        link to this | view in chronology ]

        • identicon
          Anonymous Coward, 14 Jan 2020 @ 10:53am

          Re: Re: Re:

          I don't see how Bars current actions are convincingly aimed at holding any living person accountable.

          Because guilt by association isn't just for RICO any more.

          link to this | view in chronology ]

          • identicon
            Anonymous Coward, 14 Jan 2020 @ 11:16am

            Re: Re: Re: Re:

            Yeah that makes sense actually. I mean you'd totally expect Police to be spending a fair amount of time around criminals.

            link to this | view in chronology ]

        • icon
          Scary Devil Monastery (profile), 15 Jan 2020 @ 5:18am

          Re: Re: Re:

          "I don't see how Bars current actions are convincingly aimed at holding any living person accountable."

          That's one of the more amusing details in the song-and-dance act Barr presents in his shit-show.

          I wonder when someone's going to realize and say, in public, that what Barr is saying is essentially that no one is allowed a door lock to which the police don't have a key.

          link to this | view in chronology ]

    • This comment has been flagged by the community. Click here to show it
      identicon
      Anonymous Coward, 14 Jan 2020 @ 5:24pm

      Re:

      You just let me know what real CRIMES exist for the Republican party. Made up Leftists crimes since before Trump even got into office. Those type? You're a leftist idiot.

      link to this | view in chronology ]

      • icon
        Toom1275 (profile), 14 Jan 2020 @ 8:16pm

        Re: Re:

        Do you smell toast?

        link to this | view in chronology ]

        • identicon
          Anonymous Coward, 14 Jan 2020 @ 10:33pm

          Re: Re: Re:

          Looks likes someone let hamilton out of the mental health facility.

          link to this | view in chronology ]

          • icon
            Scary Devil Monastery (profile), 15 Jan 2020 @ 5:25am

            Re: Re: Re: Re:

            "...Looks likes someone let hamilton out of the mental health facility."

            He was on Torrentfreak as well, back then. I still claim "Hamilton" is just what happens when "Baghdad Bob" (aka Jhon/Blue/Bobmail/Herrick/Etc) finally has a little episode and goes off on a hysterical rant of hatred and invective in an off-key veneration of "Mein Kampf".

            It happens regularly every time the forum community has treated his "sensible" writings with all the due respect they deserve for some time.

            link to this | view in chronology ]

  • identicon
    Anonymous Coward, 14 Jan 2020 @ 9:38am

    Nevertheless, the Attorney General insists Apple is preventing law enforcement from doing its job.

    So the bigliest, bestiest, most goodest country in the whole wide world, with its vast arsenal of nukeular weapons, deep state technology, and a spray-tanned stable genius is powerless against the makers of the iphone.

    Maybe it's another project we should give to Jared Kushner, perhaps? He's solved everything else.

    link to this | view in chronology ]

    • identicon
      Rocky, 14 Jan 2020 @ 12:44pm

      Re:

      When I did contract work for the government I learned that all problems in a project can be solved by producing a powerpoint-presentation since everything in those work flawlessly...

      link to this | view in chronology ]

      • icon
        Scary Devil Monastery (profile), 15 Jan 2020 @ 5:27am

        Re: Re:

        "When I did contract work for the government I learned that all problems in a project can be solved by producing a powerpoint-presentation since everything in those work flawlessly..."

        The logical extension of that argument is that we should hire Microsoft to design a new government...

        link to this | view in chronology ]

  • identicon
    Anonymous Coward, 14 Jan 2020 @ 9:41am

    “We should be able to get in when we have a warrant that establishes that criminal activity is underway.”

    A warrant lets you look for evidence of criminal activity. It doesn't establish that criminal activity exists.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 14 Jan 2020 @ 9:57am

      Re:

      Nor should the possibility of a warrant mean that the manufacturer has to be able to get in.

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 14 Jan 2020 @ 10:26am

      Re:

      It also doesn't entitle you to that evidence. It merely entitles you to look for it. Clearly they have not found it, only an electronic gadget that might contain some. The warrant got them the phone. What they do next is up to them.

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 14 Jan 2020 @ 11:54am

      Re:

      Talk about Freudian slips from that motherfucker.

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 14 Jan 2020 @ 10:04am

    as far as all security forces in the USA, there should be NO PRIVACY, NO FREEDOM, NO CONSTITUTION, ABSOLUTELY NOTHING THAT PROTECTS THE PEOPLE! have those in lofty positions of government forgotten so quickly, so easily, why the USA became a country separated from the then England rule? have they forgotten what happened that brought about World War II? have they forgotten the conflict that still rages today and the main reasons why? surely, with the weapons available today, they cant want another world war, can they? we would destroy ourselves completely and that is happening fast enough as it is due to the greed of men and businesses fueling climate change!

    link to this | view in chronology ]

  • icon
    Anonymous Anonymous Coward (profile), 14 Jan 2020 @ 10:21am

    Barr's motivations

    The shooter is dead, they have reviewed his social media accounts, they have questioned his compatriots. Unless he is trying to uncover some conspiracy that he has no actual evidence of so far, what more does he want in terms of evidence, and to what end? Since he has no current evidence of a conspiracy, how did he get a warrant when he could not specify what he was looking for on the phones?

    The short answer to the above questions is that he is not concerned with evidence, this is just another excuse to get backdoors into encrypted devices which in turn would give the surveillance state more power over its minions. MAGA redefined as Make Authoritarianism Great Again.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 14 Jan 2020 @ 10:33am

      Re: Barr's motivations

      Hey, do not knock Barrs fetish until you have tried it.
      /s

      link to this | view in chronology ]

    • identicon
      Anonymous Coward, 14 Jan 2020 @ 2:00pm

      Re: Barr's motivations

      He just wants the phone so he can hide the fact that he was calling it... for providing 'business opportunities' to disadvantaged individuals willing to sell their soul for the promise of a better future for their children...

      always think of the children... when you are staging terror plots (and don't forget to collect the phone that has your contact info on it... don't be like Barr and have to chase it down).

      link to this | view in chronology ]

    • icon
      Scary Devil Monastery (profile), 15 Jan 2020 @ 5:29am

      Re: Barr's motivations

      "...what more does he want in terms of evidence, and to what end?"

      By now a saner answer than those presented by Barr would include "So the shooter can't go and commit further crimes".

      link to this | view in chronology ]

  • icon
    That One Guy (profile), 14 Jan 2020 @ 11:03am

    Better the current world than yours

    Mr. Barr indicated that he is ready for a sharp fight. “We don’t want to get into a world where we have to spend months and even years exhausting efforts when lives are in the balance,” he said.

    First of all, in neither case the DOJ has attempted to use to force companies to break their own encryption were 'lives in the balance', so this is just gross(in both uses of the word) fearmongering. It's also beyond rich to make the 'lives could be on the line' excuse after it was found that the DOJ deliberately avoided a quicker solution the last time they tried the stunt, something which nicely destroys the 'we need access and we need it now' excuse.

    That said, you know what kind of world I and many, many others would much prefer over the hypothetical he's spinning? The one we're currently in, where all encryption offered by major companies isn't broken by law with known security holes that can and will be found and exploited by countless criminals and state actors. There are story after story of the damage caused by encryption being broken and bypassed already, to say that things would be exponentially worse should security holes not just be expected due to imperfect coding but required would be a serious understatement.

    link to this | view in chronology ]

  • icon
    Uriel-238 (profile), 14 Jan 2020 @ 11:03am

    Bill Barr's religious adherence to authoritarian values

    This is entirely on brand for Attorney General Barr.

    link to this | view in chronology ]

    • icon
      Thad (profile), 14 Jan 2020 @ 11:15am

      Re: Bill Barr's religious adherence to authoritarian values

      Tough on (certain types of) Crime

      link to this | view in chronology ]

      • icon
        Uriel-238 (profile), 15 Jan 2020 @ 5:49pm

        "Tough on crime"

        Has long been established as code for taking rights away from poor suspects. Especially minorities.

        link to this | view in chronology ]

  • icon
    Norahc (profile), 14 Jan 2020 @ 11:10am

    Never let it be said our government let's a tragedy go to waste in their never ending effort to make us all less secure in the name of security.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 14 Jan 2020 @ 11:10am

    I see one of three possibilities.

    1. This is security theater in which the DOJ already has access to the phone via other means but pretends not to in order to create a false impression.

    2. Apple complies with the warrants and the false impression that apple doesn't comply with the warrants is put in the media.

    3. There is an incompetence issue inside the federal government that prevents it from gaining access to devices other entities, especially foreign entities, have access to.

    link to this | view in chronology ]

    • icon
      That One Guy (profile), 14 Jan 2020 @ 12:31pm

      Re:

      They've already gone through this song and dance before, and it's close to #1 though slightly different, wherein the phone is merely being used as a prop, something to be used in an attempt to get a legal precedent that will allow them to require companies using encryption only use encryption that they can break and be required to break it on demand.

      link to this | view in chronology ]

  • identicon
    Anon, 14 Jan 2020 @ 11:16am

    Already

    they deported 21 other Saudi students already. This implies to me they determined who the shooter was in contact with (and radicalized by) and determined a number of other Saudi's likely in the same boat. How much more do they need? What's the urgency except the fact that "this is a way to make Apple give in or else appear to support terrorism." Thin edge of the wedge an all that.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 14 Jan 2020 @ 11:25am

      Re: Already

      Should've decrypted their phones eh?

      link to this | view in chronology ]

    • icon
      Scary Devil Monastery (profile), 15 Jan 2020 @ 5:33am

      Re: Already

      "they deported 21 other Saudi students already. This implies to me they determined who the shooter was in contact with (and radicalized by) and determined a number of other Saudi's likely in the same boat."

      Oh, if only Barr had been around when the FBI had certain knowledge that known saudi extremists were learning how to pilot airliners in american schools and planning a hijacking.

      Oh, wait. he was!

      Barr doesn't give two shits about actual criminals. He never has. All he cares about is that government power needs to be absolute.

      link to this | view in chronology ]

  • icon
    cliff_badger (profile), 14 Jan 2020 @ 1:10pm

    An honest question...

    I have a simple honest question.

    Why are these proceedings always against iPhones?

    • Does Google just hand over information?
    • Is Android easier to crack than iOS?
    • Do bad people only carry iPhones?

    This all seems strange to me that every time this subject is debated, by anyone, it's always how Apple isn't providing enough support. It kind of scares me that Android is never mentioned in these things.

    link to this | view in chronology ]

    • icon
      Anonymous Anonymous Coward (profile), 14 Jan 2020 @ 1:26pm

      Re: An honest question...

      If one is trying to crack a dam you don't chisel a little here and chisel a little there. You keep chiseling at the same place, and if the dam isn't too thick, eventually a hole is created out of which all the water flows.

      link to this | view in chronology ]

    • icon
      Khym Chanur (profile), 14 Jan 2020 @ 5:49pm

      Re: An honest question...

      This is just speculation:

      When the DOJ does stuff like this it could either get a favorable precedent from a court ruling or the target could cave and put in a backdoor for law enforcement. For Android phones I'm assuming that they can't go directly after Google but have to go after a particular Android producer.

      1) Any given Android producer is probably significantly smaller than Apple and thus more likely to cave, preventing the DOJ from getting a precedent which can be used against all smartphone producers.

      2) If a particular Android producer caves then people might dump that producer in favor of another one, or just root their device to undo the backdoor. But if Apple caves then iPhone users either have to jailbreak or switch from an iPhone to an Android. Not only is such a switch a much bigger pain than merely switching from one variant of Android to another, but lots of iPhone users are rather dedicated/loyal to iDevices and Apple.

      link to this | view in chronology ]

    • icon
      Uriel-238 (profile), 15 Jan 2020 @ 6:16pm

      Regarding android

      Recent Android builds use the same kinds of crypto and defense methods as apple (AES encription using a 256+ byte code that's stored in a TPM on board the device. TPMs are acceptably vulnerable in that one can crack them, but it's tedious and expensive and involves a tunneling electron microscope.

      Android builds, unlike iOS builds are released to the Android Open Source Project, where the code is scrutinized by the public, so when someone finds a security flaw, usually it's news and it means a white hat gets to eat that week while Google closes the vulnerability with a security update. (My phone got one today.)

      And if Google, or anyone outside the end user could crack open a phone using some back door intentionally installed, that would make news. The NSA tried to integrate a backdoor into elliptic curve crypto and set that as a global standard. There were grumbles in the news during development (e.g. we think the NSA is trying to facilitate espionage rather than prevent it.) So optimistically, Android devices are likely to be secure.

      Of course, unlike the Apple Store which is a walled garden, it's possible to install malware and spyware onto an Android device and requires all the security hygiene of webbrowsing on a Windows system.

      For most stuff, thus, law enforcement likes to preinstall vulnerabilities in anticipation of sting operations. Without such a vulnerability, law enforcement would have to rely on:

      • The tunneling electron microscope method, above.
      • The five-dollar wrench method
      • Undiscovered vulnerabilities retained by the NSA or hacker friends of law enforcement (a short, ever-changing list).

      link to this | view in chronology ]

    • icon
      Uriel-238 (profile), 15 Jan 2020 @ 6:33pm

      The other two questions:

      • Google, according to its public disclosures, has an extensive legal department that cooperates with law enforcement writs only if it has to. That is to say that Google promises its end-users to only hand over specific data requested (and no more) and not to honor warrants that are overly broad or were issued under dubious pretenses.

      This is not to say Google never leaks. Sometimes companies and law enforcement that work with Google get techs who are more cooperative than they should be, and sometimes Google techs themselves will stalk people. When such incidents become public, it makes news and pops up on the TechDirt feed.

      • I think bad people carry iPhones the way they wear pants and eat twinkies. This is to say these things are just that ubiquitous.

      Also the San Bernardino killer used an iPhone 5 which could be cracked by Apple, but doing so would expose all iPhone 5s to US law enforcement. iPhone 7s and later don't have the same vulnerability.

      link to this | view in chronology ]

    • icon
      Scary Devil Monastery (profile), 17 Jan 2020 @ 12:38am

      Re: An honest question...

      "It kind of scares me that Android is never mentioned in these things."

      Android is open source, meaning that every phone OEM and every homebrew version a user might run on a rooted phone can be different and not subject to a simple software update issued by one corporate entity opening a backdoor in the phones of all users.

      Barr going after Apple is primarily because Apple has a certain reputation of retaining power over their OS in a way Google has long relinquished to users.

      That, and the fact that both of Barr's hobbyhorse examples were iPhones has ensured Apple's the one he's going after today.

      link to this | view in chronology ]

  • icon
    Bergman (profile), 15 Jan 2020 @ 2:14pm

    Precedent

    I doubt any government bureaucrat wants to set a precedent that a warrant or subpoena or other statutorily-mandatory production of information compels the recipient to spend exorbitant sums to invent a way to comply where no such method already exists.

    But that seems to be exactly where AG Barr is heading. Bets on whether the precedent he wants to carve out somehow applies only to government orders, even though laws supposedly apply to everyone?

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.