In his ruling, New York Magistrate Judge James Orenstein decided the government lacks legal authority to force Apple, or indeed any company, to break its own digital security protocols. Echoing Apple’s arguments against Department of Justice overtures in the high-profile San Bernardino attack investigation, today’s decision noted the “unreasonable burden” in inventing, coding and distributing a purposely vulnerable operating system in hopes of cracking existing device security.
The New York case dates back to June 2014, when warrants were issued to search the residences of suspected drug trafficker Jun Feng and his associates. The Drug Enforcement Agency subsequently recovered several mobile devices connected to the criminal investigation, including Feng’s iPhone 5s running iOS 7.
As noted by Judge Orenstein, the DEA did not attempt to glean information from the iPhone in question until July 2015 despite months of case prosecution. Acting on a warrant to search, the DEA was unable to thwart the iPhone’s passcode protection, prompting a call for assistance to the Federal Bureau of Investigation. Also unable to crack Apple’s iOS encryption, the FBI filed a data retrieval request to Apple itself. As it did at least 70 times previously, Apple said it could and would help obtain as much information as possible short of breaking the phone’s installed security measures.
In October, the government filed a motion to compel Apple’s assistance in bypassing Feng’s passcode to examine data stored directly on the device. The filing relied exclusively on the All Writs Act of 1789, today’s decision says.
Judge Orenstein offers a scathing critique of the FBI’s use of All Writs, as well as other judicial instruments, to effect its decryption operations.
It is also clear that the government has made the considered decision that it is better off securing such crypto-legislative authority from the courts (in proceedings that had always been, at the time it filed the instant Application, shielded from public scrutiny) rather than taking the chance that open legislative debate might produce a result less to its liking.
The FBI dispensed with behind-closed-doors tactics in the San Bernardino case, however, making outright public pleas to curry favor in an investigation involving a locked iPhone 5c used by terrorist Syed Rizwan Farook. As it did in New York, Apple is fighting the Justice Department’s AWA demands, but the sensitive nature of the San Bernardino attack has attached an immediacy to the government’s case not seen in other data request filings.
Apple’s vocal opposition to unlocking Farook’s iPhone sparked debate over how best to balance civil rights and national security. CEO Tim Cook, for example, said on multiple occasions that giving in to government demands sets a dangerous precedent both domestically and in the international arena.
For its part, the government maintains that its motion to compel relates to one iPhone — Farook’s — and does not in any way represent a “master key” to iOS.