Opinion: The San Bernardino iPhone and the 'going dark' myth
Loading...
Now that the Justice Department has withdrawn its case against Apple over听the San Bernardino, Calif. iPhone, it鈥檚 harder to take seriously the FBI鈥檚 claims that it is "going dark."
Since the US government can hack into the phone used by shooter Syed听Rizwan听Farook 鈥 and conceivably other iPhones in its custody 鈥 without Apple's help, it may be overstating its claim that the spread of encrypted apps and devices are harming its ability to track suspected criminals and terrorists.听
FBI Director James Comey repeatedly has testified before Congress that encrypted听technologies frustrate authorized surveillance efforts, and that even with a warrant or court order the agency can't access real-time communications or stored data.
That was the crux of its case against Apple following the San Bernardino terrorist attack. But when the agency received some outside help (apparently from this Israeli firm), it discovered that there are indeed other ways for it to get the information it seeks. That success doesn't do much to further its claims that听听is a serious problem.
But it does give credence to the opinion floated by many security experts in the FBI v. Apple debate: The agency needs to boost its technical abilities to find ways to execute valid search warrants. And if the agency can't do it on its own, maybe it needs to seek outside help like it did to crack the iPhone used by Mr. Farook.听
Mr. Comey previously has argued that the tech community should work on a solution (which critics have called a back door, and Comey himself has referred to as a "front door") for agents to decrypt communications when they have a warrant.
But, in this case, the FBI gained access to the data it wanted without any kind of "backdoor" or other access specially engineered for law enforcement. When the agency has access to that kind of technical talent, which can take advantage of existing vulnerabilities in devices, the听need to augment law enforcement鈥檚 data access and surveillance capabilities seems much less pressing.
Cybersecurity expert Susan Landau drove this point home in a听听published by Harvard University's Berkman Center for Internet and Society.听
"There are, after all, other ways of going after communications content than providing law enforcement with 'exceptional access' to encrypted communications," she wrote. "These include using the existing vulnerabilities present in the apps and systems of the devices themselves. While such an approach makes investigations more expensive, this approach is a tradeoff enabling the vast majority of communications to be far more secure."
What's more, while consumers increasingly may be using technology to keep their communications private and secure, the government has access to an array of impressive surveillance technology and has the ability to glean an unprecedented amount of information from consumers鈥 digital footprints as our lives increasingly migrate online. That would seemingly offset any need to legislate that tech companies build听in mechanisms to facilitate law enforcement access to data.
The Berkman report makes that point, too, noting that听鈥淸t]he increased availability of encryption technologies certainly impedes government surveillance under certain circumstances, and in this sense, the government is losing some surveillance opportunities. However, the combination of technological developments and market forces is likely to fill some of these gaps and, more broadly, to ensure that the government will gain new opportunities to gather critical information from surveillance."
By opening Farook鈥檚 iPhone, the FBI potentially obtained access to vast troves of digital information.
Instead of lamenting going dark, the FBI should take a more active role in poking holes 鈥 and bringing some light 鈥 to the communications and data it thinks are hidden by encryption.
惭别濒补苍颈别听罢别辫濒颈苍蝉办测听teaches information privacy law at the听American University Washington College of Law as an adjunct professor. She started her career in cybersecurity in听1991 as an analyst at the National Security Agency.
听