Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Read Apple's statement to Congress on the FBI warrant fight
The Verge ^ | February 29, 2016 | By Russell Brandom

Posted on 02/29/2016 12:16:29 PM PST by Swordmaker

Tomorrow, Apple will make its case before Congress, as General Counsel Bruce Sewell gives testimony to the House Judiciary Committee at 1PM ET. It's Apple's first appearance before Congress since the company received an order to break security measures on a phone linked to the San Bernardino attacks, and Sewell may be facing a skeptical crowd. He'll be joined by Manhattan District Attorney Cyrus Vance, who has been an outspoken critic of the company's encryption policies, as well as a number of House representatives who have been vocal supporters of the FBI's position in the past. FBI Director James Comey will also appear before the committee, although he will appear on a separate panel.

Sewell submitted his prepared opening statement to the panel earlier today, and it is reproduced in full below:

Thank you, Mr. Chairman. It's my pleasure to appear before you and the Committee today on behalf of Apple. We appreciate your invitation and the opportunity to be part of the discussion on this important issue which centers on the civil liberties at the foundation of our country.

I want to repeat something we have said since the beginning — that the victims and families of the San Bernardino attacks have our deepest sympathies and we strongly agree that justice should be served. Apple has no sympathy for terrorists.

We have the utmost respect for law enforcement and share their goal of creating a safer world. We have a team of dedicated professionals that are on call 24 hours a day, seven days a week, 365 days a year to assist law enforcement. When the FBI came to us in the immediate aftermath of the San Bernardino attacks, we gave all the information we had related to their investigation. And we went beyond that by making Apple engineers available to advise them on a number of additional investigative options.

But we now find ourselves at the center of an extraordinary circumstance. The FBI has asked a Court to order us to give them something we don’t have. To create an operating system that does not exist — because it would be too dangerous. They are asking for a backdoor into the iPhone — specifically to build a software tool that can break the encryption system which protects personal information on every iPhone.

As we have told them — and as we have told the American public — building that software tool would not affect just one iPhone. It would weaken the security for all of them. In fact, just last week Director Comey agreed that the FBI would likely use this precedent in other cases involving other phones. District Attorney Vance has also said he would absolutely plan to use this on over 175 phones. We can all agree this is not about access to just one iPhone.

The FBI is asking Apple to weaken the security of our products. Hackers and cyber criminals could use this to wreak havoc on our privacy and personal safety. It would set a dangerous precedent for government intrusion on the privacy and safety of its citizens.

Hundreds of millions of law-abiding people trust Apple’s products with the most intimate details of their daily lives – photos, private conversations, health data, financial accounts, and information about the user's location as well as the location of their friends and families. Some of you might have an iPhone in your pocket right now, and if you think about it, there's probably more information stored on that iPhone than a thief could steal by breaking into your house. The only way we know to protect that data is through strong encryption.

Every day, over a trillion transactions occur safely over the Internet as a result of encrypted communications. These range from online banking and credit card transactions to the exchange of healthcare records, ideas that will change the world for the better, and communications between loved ones. The US government has spent tens of millions of dollars through the Open Technology Fund and other US government programs to fund strong encryption. The Review Group on Intelligence and Communications Technology, convened by President Obama, urged the US government to fully support and not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software.

Encryption is a good thing, a necessary thing. We have been using it in our products for over a decade. As attacks on our customers’ data become increasingly sophisticated, the tools we use to defend against them must get stronger too. Weakening encryption will only hurt consumers and other well-meaning users who rely on companies like Apple to protect their personal information.

Today’s hearing is titled Balancing Americans’ Security and Privacy. We believe we can, and we must, have both. Protecting our data with encryption and other methods preserves our privacy and it keeps people safe.

The American people deserve an honest conversation around the important questions stemming from the FBI’s current demand:

Do we want to put a limit on the technology that protects our data, and therefore our privacy and our safety, in the face of increasingly sophisticated cyber attacks? Should the FBI be allowed to stop Apple, or any company, from offering the American people the safest and most secure product it can make?

Should the FBI have the right to compel a company to produce a product it doesn't already make, to the FBI’s exact specifications and for the FBI’s use?

We believe that each of these questions deserves a healthy discussion, and any decision should be made after a thoughtful and honest consideration of the facts.

Most importantly, the decisions should be made by you and your colleagues as representatives of the people, rather than through a warrant request based on a 220 year- old-statute.

At Apple, we are ready to have this conversation. The feedback and support we're hearing indicate to us that the American people are ready, too.

We feel strongly that our customers, their families, their friends and their neighbors will be better protected from thieves and terrorists if we can offer the very best protections for their data. And at the same time, the freedoms and liberties we all cherish will be more secure.

Thank you for your time. I look forward to answering your questions.


TOPICS: Business/Economy; Constitution/Conservatism; Culture/Society; News/Current Events
KEYWORDS: apple; applepinglist; fbi; privacy
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 401-404 next last
To: Swordmaker
Self evident truth:

If they wanted a healthy discussion, they would not start out with so many deceptive and false premises. They would start out with the truth.

101 posted on 02/29/2016 2:29:26 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 88 | View Replies]

To: palmer
The other is the decryption of the AES key using the passcode and UID in HW. A lot of that is in hardware, the rest in flash. It is done that way with no visibility or manipulation from programs in RAM for security reasons. The SE is the next stage in secure flash. Has the code and data to decrypt the AES key while being tamperproof.

Hardware logic is how processors are made. So they are using components of a processor to do a specific function. I figured it had to be more than just memory.

102 posted on 02/29/2016 2:32:26 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 89 | View Replies]

To: freedumb2003

Yeah, well, when you’re talking to facists, you can’t just boil it down to it’s bare essentials.


103 posted on 02/29/2016 2:32:54 PM PST by zeugma (Lon Horiuchi is the true face of the feral government. Remember that. Always.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: palmer
Already answered that. Apple can tell the Chicomms to stuff it.

Sure they can, but will they? A Billion people market is pretty big.

Apple is already setting up some manufacturing in India.

But will still want to sell phones in China, I think.

104 posted on 02/29/2016 2:34:41 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 91 | View Replies]

To: Swordmaker
WHAT SEARCH WARRANT?

Warrant, writ, whatever. Let's quibble about the distinction.

105 posted on 02/29/2016 2:36:31 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 93 | View Replies]

To: palmer
That is a very reasonable guess, but I would give it 50/50.

On this, you may be right. Especially in California. Their judiciary just does weird things.

106 posted on 02/29/2016 2:37:54 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 96 | View Replies]

To: DiogenesLamp; Sword master

>>The legal standard is “undue burden.” The 15 minutes it will require to modify their existing code to remove the 10 try limit will not be regarded by the courts as an “undue burden.”<<

DL: You design and wrote operating systems? Who knew.

Can you save Apple some time with an SOW and detailed specifications for this “15 minutes of work?”

They and the government will no doubt be grateful to you for the application of your many years of experience in this extremely technical and complex field.


107 posted on 02/29/2016 2:43:18 PM PST by freedumb2003 (Don't mistake my silence for ignorance, my calmness for acceptance, or my kindness for weakness)
[ Post Reply | Private Reply | To 26 | View Replies]

To: freedumb2003
DL: You design and wrote operating systems? Who knew.

Why yes I have. Starting when I was 16. I've written many since then. How about you? Do you know how to program, or are you just an ignorant @$$ that wants to dispute someone who knows what they are talking about?

Can you save Apple some time with an SOW and detailed specifications for this “15 minutes of work?”

Well see here, this is more ignorance being displayed. Most computer programers don't need detailed specifications to modify a subroutine that counts to "10." Usually people smart enough and knowledgeable enough to do computer programing can figure out how to count to 10 all by themselves, and don't need any help with the problem.

But I can see why you might need detailed specifications on how to count to "10".

They and the government will no doubt be grateful to you for the application of your many years of experience in this extremely technical and complex field.

I know that to you, a computer program that counts to "10" might seem like an "extremely technical and complex field", but to people who aren't morons, it's pretty much a nothing deal.

108 posted on 02/29/2016 2:50:18 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 107 | View Replies]

To: DiogenesLamp
Apple overlooked the fact that their phones can be updated while locked, and can thereafter be "brute-force" opened.

No, my iPhone cannot be udated while locked. Apple might send an update to my phone, but I am the only one who can install the update. Simply unlocking my phone does not do it. (I usually delete them because I would rather billions of other phones test the update first, but that is neither here nor there).

I, not Apple, control updates. Apple might send them, I am under no obligation to accept or retain them.

109 posted on 02/29/2016 2:58:14 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 37 | View Replies]

To: DiogenesLamp
too dangerous - only makes sense if Apple had to turn over the OS workaround code to the FBI.

Apple would only have to modify the OS by changing some lines of code to bypass the PIN # verification. If they only did it one time and kept the new code under lock and key, or destroyed it (fat chance), it still might get loose, but a danger to all phones is a stretch unless by legal fiat.

If Apple would have quietly done it for the FBI, no one would be the wiser. But since the FBI has gone public and filed a suit, it will set a legal precedent if Apple complies (they didn't want to comply anyway). I understand there are about 175 phones in NYC the authorities want a crack into.

Plus the county had some app to prevent all this they didn't install on their phones.

Sooner or later, Apple is probably going to lose, but for now, I'm on their side because I believe the FBI is being duplicitous about it.

If they hadn't changed the PIN remotely, the county-issued phone would have backed up all the data to the cloud where the FBI could have gotten it. Getting around the encryption, I can't say how they would manage that. But since the PIN was changed, it will no longer do an auto backup.

The last backup was only a month before, so they have that. It's just the final month they want to know what's on the phone.

The option to get at the physical chip and circuitry would be too likely to destroy critical data. Some of this may be wrong. I learned it on a discussion group elsewhere.

110 posted on 02/29/2016 3:05:35 PM PST by Aliska ("No bank is too big to fail, and no executive is too powerful to jail." HRC 1/24/16)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Protect the Bill of Rights
No, my iPhone cannot be udated while locked. Apple might send an update to my phone, but I am the only one who can install the update.

I think you are talking about apps. Apple can update the phone's firmware even though the phone is locked.

111 posted on 02/29/2016 3:12:07 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 109 | View Replies]

To: DiogenesLamp

>> The removal of the “number of tries” does not constitute a “back door.”

If course it’s a back door.

A “self destruct after 10 tries” is roughly equivalent to a 1024 bit RSA key: for all practical purposes, it’s unbreakable.

A tool to remove that “number of tries” is akin to factoring in a 16-bit alternate key to the aforementioned unbreakable RSA key: the FBI may not know what it is, but they’re guaranteed cracking it in minutes.


112 posted on 02/29/2016 3:12:10 PM PST by ctdonath2 (History does not long entrust the care of freedom to the weak or the timid. - Ike)
[ Post Reply | Private Reply | To 10 | View Replies]

To: DesertRhino
Is your position that government, with the permission of someone else in government (a secret judge) should have no limits on what they may access from a citizen?

BINGO!! This will take Sneak & Peek and Delayed Notifications to a new level. Most people, even those innocent of any wrong doing, will never know their phone has been searched.

I have no issues with the government or LEO seizing a phone with a warrant. The issues of unlocking that phone are for the owner and a judge to address in Court.

Under no circumstances should the government be given one more tool to perform these actions under the cloak of secrecy.

113 posted on 02/29/2016 3:12:26 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 60 | View Replies]

To: DiogenesLamp

Apple isn’t stupid enough to implement the “counts to ten” as a simple software counter. It’s implemented in hardware, in a way that requires intricate secure integration with software. They can’t just issue an update, they have to build new hardware at nontrivial cost.


114 posted on 02/29/2016 3:18:19 PM PST by ctdonath2 (History does not long entrust the care of freedom to the weak or the timid. - Ike)
[ Post Reply | Private Reply | To 108 | View Replies]

To: DiogenesLamp

Well, since the FBI et al changed the icloud password, they can’t “auto update” while it’s locked.


115 posted on 02/29/2016 3:19:41 PM PST by ctdonath2 (History does not long entrust the care of freedom to the weak or the timid. - Ike)
[ Post Reply | Private Reply | To 111 | View Replies]

To: Aliska
too dangerous - only makes sense if Apple had to turn over the OS workaround code to the FBI.

Or if Apple were lying about it.

Apple would only have to modify the OS by changing some lines of code to bypass the PIN # verification. If they only did it one time and kept the new code under lock and key, or destroyed it (fat chance), it still might get loose, but a danger to all phones is a stretch unless by legal fiat.

Exactly.

Sooner or later, Apple is probably going to lose, but for now, I'm on their side because I believe the FBI is being duplicitous about it.

You say the FBI is being duplicitous about it, but i've read an excerpt of their filing. From what I can see, the FBI is being straightforward and reasonable, and Apple inc is the one being duplicitous about what has been asked of them. Excerpted from the FBI court filing:

"To the contrary, the Order allows Apple to retain custody of its sofware at all times, and it gives Apple flexibility in the manner in which it provides assistance. In fact, the software never has to come into the government's custody."

Read it yourself and tell me if you don't think it was reasonable.

The option to get at the physical chip and circuitry would be too likely to destroy critical data.

I don't know. I know the guy that hacked the military style encryption being used in the Satellite receiver systems some years back claims to have decapped the chips and measured signals directly on the substrate.

The sizes of chips may have gotten too small to make such an approach doable nowadays, but I wouldn't rule it out till I had better information.

116 posted on 02/29/2016 3:21:45 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 110 | View Replies]

To: ctdonath2
If course it’s a back door.

A “self destruct after 10 tries” is roughly equivalent to a 1024 bit RSA key: for all practical purposes, it’s unbreakable.

A "back door" is generally regarded as a means of hacking into all versions of the software. The modified software would only be loaded onto this one phone long enough to "brute force" the password. It is therefore not a "back door" in the sense that it is ubiquitous to all phones of this design. In other words, "back door" is a term that is improperly used in this context.

More Apple deception.

the FBI may not know what it is, but they’re guaranteed cracking it in minutes.

I've read that at a retry rate of 80 milliseconds, which is the fastest Apple claims their OS can handle password retries, it could take a year to stumble across the password if it is a six digit alphanumeric code.

117 posted on 02/29/2016 3:27:38 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 112 | View Replies]

To: Protect the Bill of Rights
I have no issues with the government or LEO seizing a phone with a warrant.

And there we are on the same page. That IS what is at stake in this case.

118 posted on 02/29/2016 3:29:01 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 113 | View Replies]

To: DiogenesLamp

So how do you address this?

http://www.theverge.com/2016/2/23/11097044/us-forcing-apple-to-unlock-dozen-iphones-says-wsj

The government wants unfettered access to iPhones. San Bernardino is just the camel’s nose under the tent. I guess you’re one of those who trusts our government, I don’t! The list of phones the LEO’s want cracked will be endless.


119 posted on 02/29/2016 3:29:08 PM PST by vette6387 (Obama can go to hell!)
[ Post Reply | Private Reply | To 61 | View Replies]

To: ctdonath2
Well, since the FBI et al changed the icloud password, they can’t “auto update” while it’s locked.

Nobody can do an OS firmware update but Apple, but Apple CAN do an OS firmware update on a locked phone.

120 posted on 02/29/2016 3:30:03 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 115 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 401-404 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson