The FBI's Not-So-Compelling Pitch For Sacrificing Security For Safety

Techdirt. 2016-02-25

Summary:

The FBI's attempt to use an All Writs order to force Apple to help it break into a locked iPhone is seemingly built on a compelling case: a large-scale shooting involving people with ties to terrorist groups. This is exactly the sort of case Comey hoped would help push his anti-encryption agenda forward. Or so it seems. But is the case really that "compelling," especially in the legal sense of the word, which requires the court to weigh the imposition on Apple against the public's interest in seeing wrongdoers punished/future terrorist attacks prevented? Conor Friedersdorf, writing for The Atlantic, finds the agency's "compelling" case to be far less interesting than the FBI imagines it is.

Even so, there are many factors that make me underwhelmed by the San Bernardino case, too. The killers deliberately destroyed other devices but didn’t bother destroying this one. It was a work phone issued by San Bernardino County. Until some time prior to the killings it was backing up to iCloud, and the FBI was able to get those backups. ]So once again, law enforcement personnel got information about some of what was on the phone. They’re missing a mere fraction of its contents. And one would guess that in the time between the last iCloud backup and the terrorist attack, Syed Farook did not suddenly start updating his work iPhone’s contacts with the addresses of his terrorist buddies, but refrained from calling or texting them (which the phone company could tell the FBI).
The FBI likely knows there's little chance much of investigative worth will be found on this phone. It wants the precedent, not the iPhone's contents. That's why Comey is telling anyone who will listen about other cases where encrypted phones have led to "dead ends." Comey's pitch for an Apple-assisted break-in presumes locked phones are literally helping people get away with murder. Friedersdorf notes that Lawfare's Ben Wittes -- arguing on behalf of the FBI -- cites testimony Comey gave to Congress in which he discusses a pregnant woman who was murdered last summer. Her phone was found near her body but the FBI has been unable to access the contents. Again, Comey is making serious presumptions about the worth of the phone's contents to investigators. Taking a more logical approach to the facts of the case, Freidersdorf points out this phone is likely to be as useless as the phone central to the FBI's current actions.
For the first 230 years of U.S. history, police officers managed to investigate murders without the benefit of any evidence from smartphones belonging to the victim. Keep that baseline in mind, because any information that the cops get from the Louisiana victim’s device leaves them better off than all prior generations of law enforcement. And they presumably did get some useful information, because a locked device doesn’t prevent them from going to the phone company and getting access to call, text, and location data generated by the device. It doesn’t stop the authorities from going to Uber to see when the victim last took a ride, to her cloud backup to see what was last uploaded, to her email client to see if she sent or received any messages through that medium, and on and on and on. Admittedly, there could be something only on the device relevant to the murder. The victim could’ve recorded a quick voice memo. She could’ve jotted a note to herself. She could’ve snapped a photograph of the killer in the moment before he acted. But you’ve gotta think that the odds are against there being conclusive evidence on the phone that isn’t available elsewhere, not only because so much data is available in multiple places, but because the killer left the phone with the victim.
Encryption has turned smartphones into Chekov's Device: if a locked phone is owned by a criminal or found with a crime victim, the automatic assumption is that it houses relevant information of high investigatory value. Comey is carefully picking his examples when arguing for greater law enforcement access… for the most part. A mass shooting that left 14 dead. A murdered pregnant woman. A fender bender at a busy intersection? Marcy Wheeler also quotes testimony from Comey.
I’d say this problem we call going dark, which as Director Clapper mentioned, is the growing use of encryption, both to lock devices when they

Link:

http://feedproxy.google.com/~r/techdirt/feed/~3/1YiKo1B1lok/story01.htm

From feeds:

Music and Digital Media » Techdirt.

Tags:

Authors:

Tim Cushing

Date tagged:

02/25/2016, 15:02

Date published:

02/25/2016, 14:45