Apple–FBI encryption dispute explained

The Apple–FBI encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected.[1] There is much debate over public access to strong encryption.[2]

In 2015 and 2016, Apple Inc. received and objected to or challenged at least 11 orders issued by United States district courts under the All Writs Act of 1789. Most of these seek to compel Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked iPhones running on operating systems iOS 7 and older" in order to assist in criminal investigations and prosecutions. A few requests, however, involve phones with more extensive security protections, which Apple has no current ability to break. These orders would compel Apple to write new software that would let the government bypass these devices' security and unlock the phones.[3]

The most well-known instance of the latter category was a February 2016 court case in the United States District Court for the Central District of California. The Federal Bureau of Investigation (FBI) wanted Apple to create and electronically sign new software that would enable the FBI to unlock a work-issued iPhone 5C it recovered from one of the shooters who, in a December 2015 terrorist attack in San Bernardino, California, killed 14 people and injured 22. The two attackers later died in a shootout with police, having first destroyed their personal phones. The work phone was recovered intact but was locked with a four-digit passcode and was set to eliminate all its data after ten failed password attempts (a common anti-theft measure on smartphones). Apple declined to create the software, and a hearing was scheduled for March 22. However, a day before the hearing was supposed to happen, the government obtained a delay, saying it had found a third party able to assist in unlocking the iPhone. On March 28, the government claimed that the FBI had unlocked the iPhone and withdrew its request. In March 2018, the Los Angeles Times reported "the FBI eventually found that Farook's phone had information only about work and revealed nothing about the plot" but cited only government claims, not evidence.[4]

In another case in Brooklyn, a magistrate judge ruled that the All Writs Act could not be used to compel Apple to unlock an iPhone. The government appealed the ruling, but then dropped the case on April 22, 2016, saying it had been given the correct passcode.[5]

Background

See main article: Crypto Wars.

In 1993, the National Security Agency (NSA) introduced the Clipper chip, an encryption device with an acknowledged backdoor for government access, that NSA proposed be used for phone encryption. The proposal touched off a public debate, known as the Crypto Wars, and the Clipper chip was never adopted.[6]

It was revealed as a part of the 2013 mass surveillance disclosures by Edward Snowden that the NSA and the British Government Communications Headquarters (GCHQ) had access to the user data in iPhones, BlackBerry, and Android phones and could read almost all smartphone information, including SMS, location, emails, and notes.[7] Additionally, the leak stated that Apple had been a part of the government's surveillance program since 2012, however, Apple per their spokesman at the time, "had never heard of it".[8]

According to The New York Times, Apple developed new encryption methods for its iOS operating system, versions 8 and later, "so deep that Apple could no longer comply with government warrants asking for customer information to be extracted from devices."[9] Throughout 2015, prosecutors advocated for the U.S. government to be able to compel decryption of iPhone contents.[10] [11] [12] [13]

In September 2015, Apple released a white paper detailing the security measures in its then-new iOS 9 operating system. iPhone models including the iPhone 5C can be protected by a four-digit PIN code. After more than ten incorrect attempts to unlock the phone with the wrong PIN, the contents of the phone will be rendered inaccessible by erasing the AES encryption key that protects its stored data. According to the Apple white paper, iOS includes a Device Firmware Upgrade (DFU) mode, and that "[r]estoring a device after it enters DFU mode returns it to a known good state with the certainty that only unmodified Apple-signed code is present."[14]

Apple ordered to assist the FBI

The FBI recovered an Apple iPhone 5C—owned by the San Bernardino County, California government—that had been issued to its employee, Syed Rizwan Farook, one of the shooters involved in the December 2015 San Bernardino attack.[15] The attack killed 14 people and seriously injured 22. The two attackers died four hours after the attack in a shootout with police, having previously destroyed their personal phones. Authorities were able to recover Farook's work phone, but could not unlock its four-digit passcode,[16] [17] and the phone was programmed to automatically delete all its data after ten failed password attempts.

On February 9, 2016, the FBI announced that it was unable to unlock the county-owned phone it recovered, due to its advanced security features, including encryption of user data.[18] [19] The FBI first asked the National Security Agency to break into the phone, but they were unable to since they only had knowledge of breaking into other devices that are commonly used by criminals, and not iPhones.[20] As a result, the FBI asked Apple Inc. to create a new version of the phone's iOS operating system that could be installed and run in the phone's random access memory to disable certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which required it to never undermine the security features of its products. The FBI responded by successfully applying to a United States magistrate judge, Sheri Pym, to issue a court order, mandating Apple to create and provide the requested software.[21] The order was not a subpoena, but rather was issued under the All Writs Act of 1789.[22] [23] The court order, called In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate #5KGD203, was filed in the United States District Court for the Central District of California.[24] [25] [26]

The use of the All Writs Act to compel Apple to write new software was unprecedented and, according to legal experts, it was likely to prompt "an epic fight pitting privacy against national security."[27] It was also pointed out that the implications of the legal precedent that would be established by the success of this action against Apple would go far beyond issues of privacy.[28]

Technical details of the order

The court order specified that Apple provide assistance to accomplish the following:

  1. "it will bypass or disable the auto-erase function whether or not it has been enabled" (this user-configurable feature of iOS 8 automatically deletes keys needed to read encrypted data after ten consecutive incorrect attempts[29])
  2. "it will enable the FBI to submit passcodes to the SUBJECT DEVICE for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available"
  3. "it will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware"

The order also specifies that Apple's assistance may include providing software to the FBI that "will be coded by Apple with a unique identifier of the phone so that the [software] would only load and execute on the SUBJECT DEVICE"

There has been much research and analysis of the technical issues presented in the case since the court order was made available to the public.[30]

Apple's opposition to the order

The February 16, 2016 order issued by Magistrate Judge Pym gave Apple five days to apply for relief if Apple believed the order was "unreasonably burdensome". Apple announced its intent to oppose the order, citing the security risks that the creation of a backdoor would pose towards customers.[31] It also stated that no government had ever asked for similar access.[32] The company was given until February 26 to fully respond to the court order.[33] [34]

On the same day the order was issued, chief executive officer Tim Cook released an online statement to Apple customers, explaining the company's motives for opposing the court order. He also stated that while they respect the FBI, the request they made threatens data security by establishing a precedent that the U.S. government could use to force any technology company to create software that could undermine the security of its products.[35] He said in part:

In response to the opposition, on February 19, the U.S. Department of Justice filed a new application urging a federal judge to compel Apple to comply with the order.[36] The new application stated that the company could install the software on the phone in its own premises, and after the FBI had hacked the phone via remote connection, Apple could remove and destroy the software.[37] Apple hired attorneys Ted Olson and Theodore J. Boutrous Jr. to fight the order on appeal.

The same day, Apple revealed that in early January it had discussed with the FBI four methods to access data in the iPhone, but, as was revealed by a footnote in the February 19 application to the court, one of the more promising methods was ruled out by a mistake during the investigation of the attack. After the shooter's phone had been recovered, the FBI asked San Bernardino County, the owner of the phone, to reset the password to the shooter's iCloud account in order to acquire data from the iCloud backup. However, this rendered the phone unable to backup recent data to iCloud, until the new iCloud password was entered. This however, requires the phone to be unlocked.[38] [39] [40] This was confirmed by the U.S. Department of Justice, which then added that any backup would have been "insufficient" because they would not have been able to recover enough information from it.[41]

Legal arguments

The government cited as precedent United States v. New York Telephone Co., in which the Supreme Court ruled in 1977 that the All Writs Act gave courts the power to demand reasonable technical assistance from the phone company in accessing phone calling records. Apple responded that New York Telephone was already collecting the data in question in the course of its business, something the Supreme Court took note of in its ruling. Apple also asserts that being compelled to write new software "amounts to compelled speech and viewpoint discrimination in violation of the First Amendment. ... What is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone's user?" Apple argued that the FBI had not made use of all of the government's tools, such as employing the resources of the NSA. A hearing on the case was scheduled for March 22, 2016.[42]

San Bernardino County District Attorney Michael Ramos filed a brief stating the iPhone may contain evidence of a "lying dormant cyber pathogen" that could have been introduced into the San Bernardino County computer network,[43] [44] [45] as well as identification of a possible third gunman who was alleged to have been seen at the scene of the attack by eyewitnesses.[46] The following day, Ramos told the Associated Press that he did not know whether the shooters had compromised the county's infrastructure, but the only way to know for sure was by gaining access to the iPhone.[47] [48] This statement has been criticized by cyber-security professionals as being improbable.[49] [50] [51]

Tim Cook's statements

In an interview for a Time magazine cover story, Cook said that the issue is not "privacy versus security ... it's privacy and security or privacy and safety versus security." Cook also said, "[T]his is the golden age of surveillance that we live in. There is more information about all of us, so much more than ten years ago, or five years ago. It's everywhere. You are leaving digital footprints everywhere."[52]

In a March 21, 2016, Apple press conference, Cook talked about the ongoing conflict with the FBI, saying, "[W]e have a responsibility to protect your data and your privacy. We will not shrink from this responsibility."[53]

FBI withdrawal of request

On March 21, 2016, the government requested and was granted a delay, saying a third party had demonstrated a possible way to unlock the iPhone in question and the FBI needed more time to determine if it will work.[54] [55] [56] On March 28, 2016, the FBI said it had unlocked the iPhone with the third party's help, and an anonymous official said that the hack's applications were limited; the Department of Justice withdrew the case.[57] [58] The lawyer for the FBI claimed that they were using the alleged extracted information to further investigate the case.[59]

On April 7, 2016, FBI Director James Comey said that the tool used could only unlock an iPhone 5C like that used by the San Bernardino shooter as well as older iPhone models lacking the Touch ID sensor. Comey also confirmed that the tool was purchased from a third party but would not reveal the source,[60] later indicating the tool cost more than $1.3 million and that they did not purchase the rights to technical details about how the tool functions.[61] Although the FBI claimed they were able to use other technological means to access the cellphone data from the San Bernardino shooter's iPhone 5C, without the aid of Apple, law enforcement still expresses concern over the encryption controversy.[62]

Some news outlets, citing anonymous sources, identified the third party as Israeli company Cellebrite. However, The Washington Post reported that, according to anonymous "people familiar with the matter", the FBI had instead paid "professional hackers" who used a zero-day vulnerability in the iPhone's software to bypass its ten-try limitation, and did not need Cellebrite's assistance.[63] [64] In April 2021, The Washington Post reported that the Australian company Azimuth Security, a white hat hacking firm, had been the one to help the FBI, with work from security researchers Mark Dowd and David Wang.[65] In 2020, the New York Times reported that "new data reveals a twist to the encryption debate that undercuts both sides," with public records showing that at least 2,000 US law enforcement agencies had since acquired "tools to get into locked, encrypted phones and extract their data," mostly from Cellebrite and Grayshift.[66]

Other All Writs Act cases involving iPhones

Apple had previously challenged the U.S. Department of Justice's authority to compel it to unlock an iPhone 5S in a drug case in the United States District Court for the Eastern District of New York in Brooklyn (In re Order Requiring Apple Inc. to Assist in the Execution of a Search Warrant Issued by the Court, case number 1:15-mc-01902), after the magistrate judge in the case, James Orenstein, requested Apple's position before issuing an order.[67] [68] [69] On February 29, 2016, Judge Orenstein denied the government's request, saying the All Writs Act cannot be used to force a company to modify its products: "The implications of the government's position are so far-reaching – both in terms of what it would allow today and what it implies about Congressional intent in 1789 – as to produce impermissibly absurd results."[70] Orenstein went on to criticize the government's stance, writing, "It would be absurd to posit that the authority the government sought was anything other than obnoxious to the law."[71] [72] The Justice Department appealed the ruling to District Court Judge Margot Brodie.[73] Apple requested a delay while the FBI attempted to access the San Bernardino iPhone without Apple's help.[74] On April 8, after the FBI succeeded, the Justice Department told the Brooklyn court it intended to press forward with its demand for assistance there,[75] but on April 22, the government withdrew its request, telling the court "an individual" (the suspect, according to press reports) had provided the correct passcode.[76]

In addition to the San Bernardino case and the Brooklyn case, Apple has received at least nine different requests from federal courts under the All Writs Act for iPhone or iPad products. Apple has objected to these requests. This fact was revealed by Apple in court filings in the Brooklyn case made at the request of the judge in that case. Most of these requests call upon Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked iPhones running on operating systems iOS7 and older" (as in the Brooklyn case), while others "involve phones with more extensive encryption, which Apple cannot break" and presumably seek to order Apple to "design new software to let the government circumvent the device's security protocols and unlock the phone" (as in the San Bernardino case).[3]

Reactions

National reactions to Apple's opposition of the order were mixed.[77] A CBS News poll that sampled 1,022 Americans found that 50% of the respondents supported the FBI's stance, while 45% supported Apple's stance.[78] Also, 1,002 surveyed Americans who own smartphones were divided into two sides; 51% were against Apple's decision, while 38% supported their stance.[79]

Support for Apple

The Reform Government Surveillance coalition, which includes major tech firms like Google, Microsoft, Facebook, Yahoo!, Twitter, and LinkedIn, has indicated its opposition to the order.[80] [81] [82] By March 3, the deadline, a large number of amicus curiae briefs were filed with the court, with numerous technology firms supporting Apple's position, including a joint brief from Amazon.com, Box, Cisco Systems, Dropbox, Evernote, Facebook, Google, Lavabit, Microsoft, Mozilla, Nest Labs, Pinterest, Slack Technologies, Snapchat, WhatsApp, and Yahoo!. Briefs from the American Civil Liberties Union, the Electronic Frontier Foundation, Access Now, and the Center for Democracy and Technology also supported Apple.[83] [84] [85]

The think tank Niskanen Center has suggested that the case is a door-in-the-face technique designed to gain eventual approval for encryption backdoors[86] and is viewed as a revival of the Crypto Wars.[87]

U.S. Representative Mike Honda, a Democrat who represented the Silicon Valley region, voiced his support for Apple.

On February 23, 2016, a series of pro-Apple protests organized by Fight for the Future were held outside of Apple's stores in over 40 locations.[88] [89] [90]

Zeid Ra'ad al-Hussein, the United Nations High Commissioner for Human Rights, warned the FBI of the potential for "extremely damaging implications" on human rights and that they "risk unlocking a Pandora's box" through their investigation.[91]

General Michael Hayden, former director of the NSA and the Central Intelligence Agency, in a March 7 interview with Maria Bartiromo on the Fox Business Network, supported Apple's position, noting that the CIA considers cyber-attacks the number one threat to U.S. security and saying that "this may be a case where we've got to give up some things in law enforcement and even counter terrorism in order to preserve this aspect, our cybersecurity."[92]

Salihin Kondoker, whose wife was shot in the attack but survived, filed a friend of the court brief siding with Apple; his brief said that he "understand[s] that this software the government wants them to use will be used against millions of other innocent people. I share their fear."[93]

Edward Snowden said that the FBI already has the technical means to unlock Apple's devices and said, "The global technological consensus is against the FBI."[94] [95]

McAfee founder and Libertarian Party presidential primary candidate John McAfee had publicly volunteered to decrypt the iPhone used by the San Bernardino shooters, avoiding the need for Apple to build a backdoor.[96] He later indicated that the method he would employ, extracting the unique ID from inside the A7 processor chip, is difficult and risks permanently locking the phone, and that he was seeking publicity.[97]

Ron Wyden, Democratic senator for Oregon and a noted privacy and encryption advocate, questioned the FBI's honesty concerning the contents of the phone. He said in a statement, "There are real questions about whether [the FBI] has been straight with the public on [the Apple case]."[98]

Support for FBI

Some families of the victims and survivors of the attack indicated they would file a brief in support of the FBI.[99]

The National Sheriffs' Association has suggested that Apple's stance is "putting profit over safety" and "has nothing to do with privacy."[100] The Federal Law Enforcement Officers Association, the Association of Prosecuting Attorneys, and the National Sheriffs' Association filed a brief supporting the FBI.[101]

"With Apple's privacy policy for the customers there is no way of getting into a phone without a person's master password. With this policy there will be no backdoor access on the phone for the law enforcement to access the person's private information. This has caused a great dispute between the FBI and Apple's encryption. Apple has closed this backdoor for the law enforcement because they believe that by creating this backdoor it would make it easier for law enforcement, and also make it easier for criminal hackers to gain access to people's personal data on their phone." Former FBI director James Comey says that "We are drifting to a place in this country where there will be zones that are beyond the reach of the law." He believes that this backdoor access is crucial to investigations, and without it many criminals will not be convicted.

Senator Dianne Feinstein of California, a Democrat and vice chairman of the Senate Intelligence Committee, has voiced her opposition to Apple.[102] All candidates for the Republican nomination for the 2016 U.S. presidential election who had not dropped out of the race before February 19, 2016, supported the FBI's position, though several expressed concerns about adding backdoors to mobile phones.

On February 23, 2016, the Financial Times reported[103] that Bill Gates, founder of Microsoft, has sided with the FBI in the case. However, Gates later said in an interview with Bloomberg News "that doesn't state my view on this."[104] He added that he thought the right balance and safeguards need to be found in the courts and in Congress, and that the debate provoked by this case is valuable.[105]

San Bernardino Police Chief Jarrod Burguan said in an interview:

Manhattan District Attorney Cyrus Vance Jr., said that he wants Apple to unlock 175 iPhones that his office's Cyber-Crime Lab has been unable to access, adding, "Apple should be directed to be able to unlock its phones when there is a court order by an independent judge proving and demonstrating that there's relevant evidence on that phone necessary for an individual case."[106]

FBI Director Comey, testifying before the House Judiciary Committee, compared Apple's iPhone security to a guard dog, saying, "We're asking Apple to take the vicious guard dog away and let us pick the lock."[107]

Apple's iOS 8 and later have encryption mechanisms that make it difficult for the government to get through. Apple provided no backdoor for surveillance without the company's discretion. However, Comey stated that he did not want a backdoor method of surveillance and that "We want to use the front door, with clarity and transparency, and with clear guidance provided by law." He believes that special access is required in order to stop criminals such as "terrorists and child molesters".[108]

Calls for compromise

Both 2016 Democratic presidential candidates - former Secretary of State Hillary Clinton and Senator Bernie Sanders - suggested some compromise should be found.[109] [110]

U.S. Defense Secretary Ashton Carter called for Silicon Valley and the federal government to work together. "We are squarely behind strong data security and strong encryption, no question about it," he said. Carter also added that he is "not a believer in back doors."[111]

In an address to the 2016 South by Southwest conference on March 11, President Barack Obama stated that while he could not comment on the specific case, "You cannot take an absolutist view on [encryption]. If your view is strong encryption no matter what, and we can and should create black boxes, that does not strike the balance that we've lived with for 200 or 300 years. And it's fetishizing our phones above every other value. That can't be the right answer."[112]

Proposed legislation

On April 13, 2016, U.S. Senators Richard Burr and Dianne Feinstein, the Republican Chair and senior Democrat on the Senate Intelligence Committee, respectively, released draft legislation that would authorize state and federal judges to order "any person who provides a product or method to facilitate a communication or the processing or storage of data" to provide data in intelligible form or technical assistance in unlocking encrypted data and that any such person who distributes software or devices must ensure they are capable of complying with such an order.[113] [114]

Freedom of Information Act lawsuit

In September 2016, the Associated Press, Vice Media, and Gannett (the owner of USA Today) filed a Freedom of Information Act (FOIA) lawsuit against the FBI, seeking to compel the agency to reveal who it hired to unlock Farook's iPhone, and how much was paid.[115] [116] On September 30, 2017, a federal court ruled against the media organizations and granted summary judgment in the government's favor.[116] [117] The court ruled that the company that hacked the iPhone and the amount paid to it by the FBI were national security secrets and "intelligence sources or methods" that are exempt from disclosure under FOIA; the court additionally ruled that the amount paid "reflects a confidential law enforcement technique or procedure" that also falls under a FOIA exemption.[116]

Inspector General Investigation

Background

On August 31, 2016, Amy Hess, the FBI's Executive Assistant Director, raised concerns with the Office of Inspector General alleging there was a disagreement between units of the Operational Technology Division (OTD) of their capability to access Farook's iPhone; namely between the Cryptographic and Electronic Analysis Unit (CEAU) and the Remote Operations Unit (ROU). She also alleged that some OTD officials were indifferent to FBI leadership (herself included)[118] giving possibly misleading testimony to Congress and in court orders that they had no such capability.

Findings

Ultimately, the Inspector General's March 2018 report[119] found no evidence that the OTD had withheld knowledge of the ability to unlock Farook's iPhone at the time of Director Comey's congressional testimony of February 9 and March 1, 2016. However, the report also found that poor communication and coordination between the CEAU and ROU meant that "not all relevant personnel had been engaged at the outset".

The ROU Chief (named by Vice to be Eric Chuang)[120] said he only became aware of the access problem after a February 11 meeting of the Digital Forensics and Analysis Section (DFAS) - of which the ROU is not a member. While the OTD directors were in frequent contact during the investigation, including discussions about Farook's iPhone, Asst. Dir. Stephen Richardson and the Chief of DFAS, John F. Bennett, believed at the time that a court order was their only alternative.

Chuang claimed the CEAU Chief didn't ask for their help due to a "line in the sand" against using classified security tools in domestic criminal cases. The CEAU Chief denied such a line existed and that not using classified techniques was merely a preference. Nevertheless, the perception of this line resulted in the ROU not getting involved until after John Bennett's February 11 meeting asking "anyone" in the bureau to help.

Once Chuang "got the word out", he soon learned that a trusted vendor was "almost 90 percent of the way" to a solution after "many months" of work and asked they prioritize its completion. The unnamed vendor came forward with their solution on March 16, 2016, and successfully demonstrated it to FBI leadership on March 20. The US Attorneys Office was informed the next day and they withdrew their court action against Apple on March 28.

When asked why the ROU was not involved earlier the Chief of Technical Surveillance Section (TSS), Eric Chuang's superior, initially said it was not in his "lane" and it was handled exclusively by the DFAS because "that is their mandate". He later claimed that Farook's phone was discussed from the outset but he did not instruct his unit chiefs to contact outside vendors until after February 11. In either event, neither he nor the ROU were asked to request help from their vendors until mid-February. By the time the Attorneys Office filed their February 16 court order, the ROU had only just begun contacting its vendors.

The CEAU Chief was unable to say with certainty that the ROU had been consulted beforehand and that the February 11th meeting was a final "mop-up" before a court action was filed. The CEAU's search for solutions within the FBI was undocumented and was handled informally by a senior engineer that the CEAU Chief personally trusted had checked with "everybody".

On the other hand, it's possible that Hess' asking questions is what prompted the February 11 "mop-up" meeting. During the CEAU's search Hess became concerned that she wasn't getting straight answers from the OTD and that unit chiefs didn't know the capabilities of the others. The Inspector General stated further:

Both Hess and Chuang stated the CEAU Chief seemed not to want to use classified techniques and appeared to have an agenda in pursuing a favorable ruling against Apple. Chuang described the CEAU Chief as "definitely not happy" that they undermined his legal case against Apple and had vented his frustration with him.

Hess said the CEAU Chief wanted to use the case as a "poster child" to resolve the larger problem with encrypted devices known as the "Going Dark challenge". The challenge is defined by the FBI as "changes in technology [that] hinder law enforcement's ability to exercise investigative tools and follow critical leads".[121] As The Los Angeles Times reported in March 2018, the FBI was unable to access data from 7,775 seized devices in their investigations. The unidentified method used to unlock Farook's phone - costing more than $1 million to obtain - quit working once Apple updated their operating system.

Conclusion

The Inspector General's report found that statements in the FBI's testimony before Congress were accurate but relied on assumptions that the OTD units were coordinating effectively from the beginning. They also believe the miscommunication delayed finding a technical solution to accessing Farook's iPhone. The FBI disputed this since the vendor had been working on the project independently "for some time". However, according to Chuang – whom described himself as a "relationship holder" for the vendor – they were not actively working to complete the solution and that it was moved to the "front burner" on his request; to which the TSS Chief agreed.

In response to the Inspector General's report, the FBI intended to add a new OTD section to consolidate resources to address the Going Dark problem and to improve coordination between units.

See also

External links

Notes and References

  1. Inside Apple CEO Tim Cook's Fight With the FBI. Lev. Grossman. Time. March 17, 2016. March 17, 2016. February 10, 2021. https://web.archive.org/web/20210210092022/https://time.com/4262480/tim-cook-apple-fbi-2/. live.
  2. Web site: U.S. Says It Has Unlocked iPhone Without Apple. Katie. Benner. Eric. Lichtblau. The New York Times. March 28, 2016. March 28, 2016. February 10, 2021. https://web.archive.org/web/20210210092017/https://www.nytimes.com/2016/03/29/technology/apple-iphone-fbi-justice-department-case.html. live.
  3. Web site: New Court Filing Reveals Apple Faces 12 Other Requests to Break Into Locked iPhones. The Intercept. February 23, 2016. March 3, 2016. Jenna. McLaughlin. February 10, 2021. https://web.archive.org/web/20210210092002/https://theintercept.com/2016/02/23/new-court-filing-reveals-apple-faces-12-other-requests-to-break-into-locked-iphones/. live.
  4. News: Race to unlock San Bernardino shooter's iPhone was delayed by poor FBI communication, report finds. Tanfani. Joseph. March 27, 2018. Los Angeles Times. August 18, 2018. July 22, 2018. https://web.archive.org/web/20180722011321/http://www.latimes.com/politics/la-na-pol-fbi-iphone-san-bernardino-20180327-story.html. live.
  5. News: Lichtblau. Eric. 2016-04-23. U.S. Opens Another iPhone, This Time With the Keycode. en-US. The New York Times. 2021-04-16. 0362-4331.
  6. [Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age]
  7. News: Privacy Scandal: NSA Can Spy on Smart Phone Data. September 7, 2013. February 25, 2016. September 19, 2019. https://web.archive.org/web/20190919033145/https://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html. live.
  8. Web site: NSA taps data from 9 major Net firms. USA Today. en. 2019-05-05. June 7, 2013. https://web.archive.org/web/20130607113440/http://www.usatoday.com/story/news/2013/06/06/nsa-surveillance-internet-companies/2398345/. live.
  9. News: Signaling Post-Snowden Era, New iPhone Locks Out N.S.A.. September 27, 2014. February 25, 2016. David E.. Sanger. Brian X.. Chen. The New York Times. February 10, 2021. https://web.archive.org/web/20210210092014/https://www.nytimes.com/2014/09/27/technology/iphone-locks-out-the-nsa-signaling-a-post-snowden-era-.html. live.
  10. Web site: Manhattan DA: iPhone Crypto Locked Out Cops 74 Times. July 8, 2015. February 25, 2016. Wired. February 10, 2021. https://web.archive.org/web/20210210092004/https://www.wired.com/2015/07/manhattan-da-iphone-crypto-foiled-cops-74-times/. live.
  11. Web site: Encrypted Smartphones Challenge Investigators. Cat. Zakrzewski. October 12, 2015. The Wall Street Journal. February 25, 2016. February 10, 2021. https://web.archive.org/web/20210210092201/https://www.wsj.com/articles/encrypted-smartphones-challenge-investigators-1444692995. live.
  12. Web site: Prosecutors press on with 'think of the children' campaign against encryption in iOS, Android. August 12, 2015. AppleInsider. February 25, 2016. March 2, 2016. https://web.archive.org/web/20160302221309/http://appleinsider.com/articles/15/08/12/prosecutors-press-on-with-think-of-the-children-campaign-against-encryption-in-ios-android. live.
  13. Web site: Apple, Google Urged to Crack Encrypted Phones in Terror Probes. Tiffany. Kary. Chris. Dolmetsch. November 18, 2015. Bloomberg News. February 25, 2016.
  14. Web site: iOS Security—Version 9 or later. Apple Inc.. September 2015. February 25, 2016. February 27, 2016. https://web.archive.org/web/20160227071343/http://www.apple.com/business/docs/iOS_Security_Guide.pdf. live.
  15. News: Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks. The Washington Post. February 17, 2016. February 18, 2016. Ellen. Nakashima. February 17, 2016. https://web.archive.org/web/20160217224411/https://www.washingtonpost.com/world/national-security/us-wants-apple-to-help-unlock-iphone-used-by-san-bernardino-shooter/2016/02/16/69b903ee-d4d9-11e5-9823-02b905009f99_story.html. live.
  16. Web site: Government's Motion to Compel Apple Inc. to Comply With This Court's February 16, 2016 Order Compelling Assistance in Search . February 19, 2016 . Eileen M. . Decker . Patricia A. . Donahue . Tracy L. . Wilkison . Allen W. . Chiu . United States Attorneys . February 27, 2016 . February 10, 2021 . https://web.archive.org/web/20210210092005/https://www.documentcloud.org/documents/2716000-031122954861.html . live .
  17. News: Zetter. Kim. New Documents Solve a Few Mysteries in the Apple-FBI Saga. March 11, 2016. WIRED. March 11, 2016. February 10, 2021. https://web.archive.org/web/20210210092010/https://www.wired.com/2016/03/new-documents-solve-mysteries-apple-fbi-saga/. live.
  18. Web site: FBI director says investigators unable to unlock San Bernardino shooter's phone content. Reuters. February 9, 2016. March 31, 2016. Dustin. Volz. Mark. Hosenball. February 17, 2016. https://web.archive.org/web/20160217161620/http://www.reuters.com/article/us-california-shooting-encryption-idUSKCN0VI22A. live.
  19. Web site: SAN BERNARDINO SHOOTING: Apple must help US hack killer's phone. The Press-Enterprise. February 16, 2016. February 16, 2016. Tami. Abdollah. Eric. Tucker. February 18, 2016. https://web.archive.org/web/20160218092719/http://www.pe.com/articles/washington-794488-help-killer.html. live.
  20. Web site: NSA finally admits why it couldn't hack San Bernardino shooter's iPhone. ZDNet. June 10, 2016. June 11, 2016. Zack. Whittaker. February 10, 2021. https://web.archive.org/web/20210210092225/https://www.zdnet.com/article/nsa-comes-clean-on-why-it-couldnt-hack-san-bernardino-shooters-iphone/. live.
  21. Web site: Judge Forces Apple to Help Unlock San Bernardino Shooter iPhone. NBC News. February 16, 2016. February 16, 2016. Andrew. Blankstein. February 17, 2016. https://web.archive.org/web/20160217043031/http://www.nbcnews.com/storyline/san-bernardino-shooting/judge-forces-apple-help-unlock-san-bernardino-shooter-iphone-n519701. live.
  22. Web site: Robert M.. Chesney. Apple vs FBI: The Going Dark Dispute Moves from Congress to the Courtroom. Lawfare. February 17, 2016. February 20, 2016. January 13, 2024. https://web.archive.org/web/20240113123605/https://www.lawfaremedia.org/article/apple-vs-fbi-going-dark-dispute-moves-congress-courtroom. live.
  23. Web site: Full Explanation of Court Order to Apple to Unlock San Bernardino Shooters' iPhone and Apple Refusal (Full text of court order and Tim Cook's letter included) . Anne P. . Mitchell . The Internet Patrol . February 17, 2016 . February 26, 2016 . February 10, 2021 . https://web.archive.org/web/20210210092014/https://www.theinternetpatrol.com/full-explanation-of-court-order-to-apple-to-unlock-san-bernardino-shooters-iphone-and-apple-refusal-full-text-of-court-order-and-tim-cooks-letter-included/ . live .
  24. Web site: Court Docket for USA v. In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203. Docket Alarm. March 16, 2016. February 10, 2021. https://web.archive.org/web/20210210092013/https://www.docketalarm.com/cases/California_Central_District_Court/5--16-cm-00010/USA_v._In_the_Matter_of_the_Search_of_an_Apple_iPhone_Seized_During_the_Execution_of_a_Search_Warrant_on_a_Black_Lexus_IS300_California_License_Plate_35KGD203/. live.
  25. Web site: Order Compelling Apple, Inc. to Assist Agents in Search . February 16, 2016 . Sheri . Pym . United States District Court for the Central District of California . February 27, 2016 . February 10, 2021 . https://web.archive.org/web/20210210091942/https://assets.documentcloud.org/documents/2714005/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf . live .
  26. Web site: Edvard. Pettersson. Apple Slams U.S. Bid to Make It Crack iPhone in Court Papers. Bloomberg Politics. February 25, 2016. February 25, 2016.
  27. Web site: Maura. Dolan. Victoria. Kim. Apple-FBI fight over iPhone encryption pits privacy against national security. Los Angeles Times. February 18, 2016. February 20, 2016. February 10, 2021. https://web.archive.org/web/20210210092242/https://www.latimes.com/business/la-me-fbi-apple-legal-20160219-story.html. live.
  28. Web site: Amy. Davidson. The Dangerous All Writs Act Precedent in the Apple Encryption Case. New Yorker. February 19, 2016. February 20, 2016. February 10, 2021. https://web.archive.org/web/20210210092226/https://www.newyorker.com/news/amy-davidson/a-dangerous-all-writ-precedent-in-the-apple-case. live.
  29. Web site: APPLE INC'S MOTION TO VACATE. Boutrous Jr.. Theodore J.. February 25, 2016. Documentcloud. 51. March 14, 2016. February 10, 2021. https://web.archive.org/web/20210210091943/https://assets.documentcloud.org/documents/2722199/5-15-MJ-00451-SP-USA-v-Black-Lexus-IS300.pdf. live.
  30. Web site: Analyzing the FBI case against Apple: A technical review. https://web.archive.org/web/20160403122351/https://readysignon.com/step-step-technical-analysis-fbis-case-compelling-apple-unlock-san-bernardino-shooters-iphone/. dead. April 3, 2016. ReadySignOn. March 21, 2016.
  31. News: Apple opposes judge's order to hack San Bernardino shooter's iPhone. CNN. February 17, 2016. February 17, 2016. Evan. Perez. Tim. Hume. February 18, 2016. https://web.archive.org/web/20160218092519/http://www.cnn.com/2016/02/16/us/san-bernardino-shooter-phone-apple/. live.
  32. Web site: Apple says the FBI is making access demands even China hasn't asked for. The Guardian. February 19, 2016. February 20, 2016. Danny. Yadron. February 20, 2016. https://web.archive.org/web/20160220042614/http://www.theguardian.com/technology/2016/feb/19/apple-fbi-encryption-battle-san-bernardino-shooting-syed-farook-iphone. live.
  33. Web site: SAN BERNARDINO SHOOTING: Apple gets more time to file its response. The Press-Enterprise. February 19, 2016. February 19, 2016. February 20, 2016. https://web.archive.org/web/20160220103553/http://www.pe.com/articles/apple-794741-time-bernardino.html. live.
  34. Web site: Apple will battle the FBI in court Tuesday. Pagliery. Jose. CNN Money. March 21, 2016. April 20, 2016. February 10, 2021. https://web.archive.org/web/20210210092020/https://money.cnn.com/2016/03/21/technology/apple-fbi-tuesday/index.html. live.
  35. Web site: A Message to Our Customers. Apple Inc.. February 16, 2016. February 19, 2016. Tim. Cook. February 17, 2016. https://web.archive.org/web/20160217084120/http://www.apple.com/customer-letter/. live.
  36. Web site: DOJ Escalates Battle With Apple Over San Bernardino Shooter's Phone. ABC News. February 19, 2016. February 19, 2016. Mike. Levine. Jack. Date. Jack. Cloherty. February 10, 2021. https://web.archive.org/web/20210210092230/https://abcnews.go.com/US/doj-escalates-battle-apple-san-bernardino-shooters-phone/story?id=37056775. live.
  37. News: San Bernardino shooting: US says Apple could keep, destroy software to help FBI hack iPhone. Associated Press. February 19, 2016. February 19, 2016. February 20, 2016. https://web.archive.org/web/20160220090543/http://www.scpr.org/news/2016/02/19/57752/san-bernardino-justice-department-files-new-motion/. live.
  38. Web site: Apple and feds reveal San Bernardino shooter's iCloud password was reset hours after attack. Los Angeles Times. February 19, 2016. February 19, 2016. Paresh. Dave. February 21, 2016. https://web.archive.org/web/20160221034818/http://www.latimes.com/business/la-fi-tn-apple-fbi-call-20160219-story.html. live.
  39. Web site: San Bernardino Shooter's Apple ID Passcode Changed While in Government Possession, Apple Says. Yahoo! GMA. February 19, 2016. February 19, 2016. Jack. Date. March 9, 2018. https://web.archive.org/web/20180309053127/https://www.yahoo.com/gma/san-bernardino-shooters-apple-id-passcode-changed-while-234003785--abc-news-topstories.html. live.
  40. News: Volz. Dustin. Edwards. Julia. U.S., Apple ratchet up rhetoric in fight over encryption. Reuters. February 20, 2016. February 20, 2016. February 19, 2016. https://web.archive.org/web/20160219231104/http://www.reuters.com/article/us-apple-encryption-doj-idUSKCN0VS2FT. live.
  41. Web site: Apple Says Law Enforcement Missed Chance to Back Up San Bernardino Shooter's iPhone. CNN Wire. February 20, 2016. February 20, 2016. February 21, 2016. https://web.archive.org/web/20160221090353/http://ktla.com/2016/02/20/apple-says-law-enforcement-missed-chance-to-back-up-san-bernardino-shooters-iphone/. live.
  42. Web site: Apple to FBI: You Can't Force Us to Hack the San Bernardino iPhone. Kim. Zetter. Brian. Barrett. Wired. February 25, 2016. February 25, 2016. February 10, 2021. https://web.archive.org/web/20210210092014/https://www.wired.com/2016/02/apple-brief-fbi-response-iphone/. live.
  43. Web site: Fagan. Gary. In the Matter of the Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203. Ars Tecnica. March 4, 2016. March 10, 2016. February 10, 2021. https://web.archive.org/web/20210210091945/https://cdn.arstechnica.net/wp-content/uploads/2016/03/sanbernardo.pdf. live.
  44. News: David . Kravets . San Bernardino DA says seized iPhone may hold "dormant cyber pathogen" . Ars Technica . March 3, 2016 . March 4, 2016 . The iPhone is a county owned telephone that may have connected to the San Bernardino County computer network. The seized iPhone may contain evidence that can only be found on the seized phone that it was used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino's infrastructure. . March 5, 2016 . https://web.archive.org/web/20160305023142/http://arstechnica.com/tech-policy/2016/03/san-bernardino-da-says-seized-iphone-may-hold-dormant-cyber-pathogen/ . live .
  45. Web site: SAN BERNARDINO SHOOTING: DA fears terrorist's iPhone could have launched cyber attack. The Press-Enterprise. March 4, 2016. March 5, 2016. David. Downey. March 6, 2016. https://web.archive.org/web/20160306110731/http://www.pe.com/articles/san-796176-bernardino-launced.html. live.
  46. News: Prosecutor: iPhone could ID unknown San Bernardino attacker. CBS News. Associated Press. March 4, 2016. March 5, 2016. February 10, 2021. https://web.archive.org/web/20210210092012/https://www.cbsnews.com/news/san-bernardino-shooting-prosecutor-iphone-could-id-unknown-attacker/. live.
  47. News: Bailey . Brandon . Does an extremist's iPhone contain a "cyber pathogen"? . Associated Press . March 3, 2016 . March 10, 2016 . dead . https://web.archive.org/web/20160310183553/http://hosted.ap.org/dynamic/stories/U/US_TEC_APPLE_IPHONE_PATHOGEN?SITE=TXWIC&SECTION=HOME&TEMPLATE=DEFAULT . March 10, 2016 . mdy .
  48. News: Kravets. David. What is a "lying-dormant cyber pathogen?" San Bernardino DA says it's made up [Update]]. March 5, 2016. Ars Technica. March 4, 2016. Did he use the county's infrastructure? Did he hack into that infrastructure? I don't know. In order for me to really put that issue to rest, there is one piece of evidence that would absolutely let us know that, and that would be the iPhone.. February 10, 2021. https://web.archive.org/web/20210210092024/https://arstechnica.com/tech-policy/2016/03/what-is-a-lying-dormant-cyber-pathogen-san-bernardino-da-wont-say/. live.
  49. News: Collins. Katie. Harry Potter fiction or iPhone weaponry? The 'dormant cyber pathogen' at the heart of Apple vs. FBI. March 5, 2016. CNET. March 4, 2016. February 10, 2021. https://web.archive.org/web/20210210092015/https://www.cnet.com/news/apple-vs-fbi-harry-potter-iphone-dormant-cyber-pathogen/. live.
  50. News: What's a 'cyber pathogen'? San Bernardino DA baffles security community. March 5, 2016. The Guardian. March 4, 2016. February 10, 2021. https://web.archive.org/web/20210210092029/https://www.theguardian.com/technology/2016/mar/04/san-bernardino-da-baffles-security-community-lying-dormant-cyber-pathogen-iphone. live.
  51. News: Russel. Jon. San Bernardino DA claims Syed Farouk's iPhone may house 'cyber pathogen'. March 5, 2016. Tech Crunch. March 4, 2016. February 10, 2021. https://web.archive.org/web/20210210092029/https://techcrunch.com/2016/03/03/san-bernardino-da-claims-syed-farouks-iphone-may-house-cyber-pathogen/. live.
  52. Transcript of Nancy Gibbs' interview with Tim Cook. Time. March 18, 2016. March 18, 2016. February 10, 2021. https://web.archive.org/web/20210210092211/https://time.com/4261796/tim-cook-transcript/. live.
  53. Web site: Apple's Tim Cook on iPhone unlocking case: 'We will not shrink from this responsibility'. March 21, 2016. AOL. TechCrunch. March 21, 2016. February 10, 2021. https://web.archive.org/web/20210210092029/https://techcrunch.com/2016/03/21/apples-tim-cook-on-iphone-unlocking-case-we-will-not-shrink-from-this-responsibility/. live.
  54. Web site: The Latest: FBI, Apple hearing over unlocking phone canceled. Yahoo! News. Associated Press. March 21, 2016. March 21, 2016.
  55. Web site: FBI may have found way to unlock San Bernardino shooter's iPhone. CBS News. Associated Press. March 21, 2016. March 22, 2016. March 25, 2016. https://web.archive.org/web/20160325150230/http://www.cbsnews.com/news/fbi-may-have-found-way-to-unlock-san-bernardino-shooters-iphone/. live.
  56. Web site: SAN BERNARDINO SHOOTING: Israeli company is helping the FBI, reports say. The Press-Enterprise. March 23, 2016. March 23, 2016. March 24, 2016. https://web.archive.org/web/20160324171813/http://www.pe.com/articles/company-797859-fbi-israeli.html. live.
  57. Web site: FBI says it has cracked terrorist's iPhone without Apple's help. CNN Money. March 28, 2016. March 28, 2016. February 10, 2021. https://web.archive.org/web/20210210092016/https://money.cnn.com/2016/03/28/news/companies/fbi-apple-iphone-case-cracked/index.html. live.
  58. Web site: Justice Department Withdraws Request in Apple iPhone Encryption Case After FBI Accesses San Bernardino Shooter's Phone. ABC News. Jack. Dale. Mike. Levine. Alyssa. Newcomb. March 28, 2016. March 28, 2016. February 10, 2021. https://web.archive.org/web/20210210092212/https://abcnews.go.com/Technology/justice-department-withdraws-request-apple-iphone-encryption-case/story?id=37986428. live.
  59. Web site: F.B.I. Lawyer Won't Say if Data From Unlocked iPhone Is Useful. The New York Times. Eric. Lichtblau. April 6, 2016. April 6, 2016. February 10, 2021. https://web.archive.org/web/20210210092032/https://www.nytimes.com/2016/04/06/technology/fbi-lawyer-wont-say-if-data-from-unlocked-iphone-is-useful.html?_r=0. live.
  60. Web site: Samuel. Gibbs. April 7, 2016. San Bernardino iPhone hack won't work on newer models, says FBI. The Guardian. April 7, 2016. February 10, 2021. https://web.archive.org/web/20210210092031/https://www.theguardian.com/technology/2016/apr/07/san-bernardino-iphone-hack-work-newer-models-fbi-james-comey. live.
  61. Web site: F.B.I. Director Suggests Bill for iPhone Hacking Topped $1.3 Million. Eric. Lichtblau. Katie. Benner. The New York Times. April 21, 2016. April 25, 2016. Comey said the cost was 'more than I will make in the remainder of this job, which is 7 years and 4 months.'. February 10, 2021. https://web.archive.org/web/20210210092233/https://www.nytimes.com/2016/04/22/us/politics/fbi-director-suggests-bill-for-iphone-hacking-was-1-3-million.html. live.
  62. Web site: Law enforcement worries over beefed-up phone encryption. Dujardin. Peter. April 12, 2015. Daily Press. May 2, 2016. February 10, 2021. https://web.archive.org/web/20210210092019/https://www.dailypress.com/news/crime/dp-nws-phone-encryption-20150412-story.html. live.
  63. News: Ellen. Nakashima. FBI paid professional hackers one-time fee to crack San Bernardino iPhone. The Washington Post. April 12, 2016. April 14, 2016. April 14, 2016. https://web.archive.org/web/20160414134313/https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html. live.
  64. Web site: Government keeping his technique to crack San Bernardino iPhone 'classified'. www.mbgadget.com. 2016-12-02. February 2, 2017. https://web.archive.org/web/20170202141742/http://www.mbgadget.com/2016/03/government-keeping-his-technique-to.html.
  65. News: Nakashima. Ellen. Albergotti. Reed. April 14, 2021. The FBI wanted to unlock the San Bernardino shooter's iPhone. It turned to a little-known Australian firm.. The Washington Post. April 15, 2021.
  66. News: Nicas . Jack . 2020-10-21 . The Police Can Probably Break Into Your Phone . 2024-07-17 . The New York Times . en-US . 0362-4331.
  67. Web site: Emily. Field. Apple Says Gov't Can't Force It To Unlock iPhone. Law360. March 3, 2016. February 10, 2021. https://web.archive.org/web/20210210092239/https://www.law360.com/articles/718821/apple-says-gov-t-can-t-force-it-to-unlock-iphone. live.
  68. Web site: Apple's legal strategy v FBI has roots in case heard last year. Tim. Bradshaw. Richard. Waters. Financial Times. February 24, 2016. February 25, 2016. February 10, 2021. https://web.archive.org/web/20210210092028/https://www.ft.com/content/c811f652-dade-11e5-98fd-06d75973fe09. live.
  69. Web site: How a N.Y. judge inspired Apple's encryption fight with Justice. Alison. Frankel. Reuters. February 17, 2016. March 11, 2016. March 12, 2016. https://web.archive.org/web/20160312121720/http://blogs.reuters.com/alison-frankel/2016/02/17/how-a-n-y-judge-inspired-apples-encryption-fight-with-justice/. dead.
  70. Web site: Apple case: judge rejects FBI request for access to drug dealer's iPhone. Spencer. Ackerman. Sam. Thielman. Danny. Yadron. The Guardian. February 29, 2016. February 29, 2016. February 10, 2021. https://web.archive.org/web/20210210092028/https://www.theguardian.com/technology/2016/feb/29/apple-fbi-case-drug-dealer-iphone-jun-feng-san-bernardino. live.
  71. https://www.documentcloud.org/documents/2728314-Orenstein-Order.html In Re Order requiring Apple, Inc. to assist in the execution of a search warrant issued by the court, Memorandum and Order
  72. Web site: Apple Wins in Brooklyn Battle Over Unlocking iPhone. Christie. Smythe. Tiffany. Kary. Bloomberg News. February 29, 2016. March 2, 2016.
  73. News: Justice Department asks judge to revisit NY iPhone case. Julia. Edwards. Reuters. Yahoo! News. March 7, 2016. March 8, 2016. February 10, 2021. https://web.archive.org/web/20210210092044/https://news.yahoo.com/justice-department-asks-judge-revisit-ny-iphone-case-011447599--finance.html. live.
  74. Web site: Citing FBI quest, Apple asks judge to delay iPhone data case. Yahoo! News. Associated Press. March 25, 2016. March 25, 2016.
  75. Web site: U.S. to continue appeal of iPhone data case in New York. Yahoo! Finance. Reuters. April 8, 2016. April 8, 2016. February 10, 2021. https://web.archive.org/web/20210210092049/https://finance.yahoo.com/news/u-continue-appeal-iphone-data-151043351.html. live.
  76. Web site: FBI ends stand-off with Apple over iPhone. Tim. Bradshaw. FT. April 23, 2016. April 25, 2016. February 10, 2021. https://web.archive.org/web/20210210092244/https://www.ft.com/content/d1090a5c-0905-11e6-b6d3-746f8e9cdd33#axzz46q2skSK8. live.
  77. News: Anger, praise for Apple for rebuffing FBI over San Bernardino killer's phone. CNN. February 18, 2016. February 19, 2016. Greg. Botelho. Lorenza. Brascia. Michael. Martinez. February 19, 2016. https://web.archive.org/web/20160219103313/http://www.cnn.com/2016/02/18/us/san-bernardino-shooter-phone-apple-reaction/. live.
  78. Web site: CBS News poll: Americans split on unlocking San Bernardino shooter's iPhone. CBS News. March 18, 2016. March 19, 2016. March 20, 2016. https://web.archive.org/web/20160320032136/http://www.cbsnews.com/news/cbs-news-poll-americans-split-on-unlocking-san-bernardino-shooters-iphone/. live.
  79. Web site: More Support for Justice Department Than for Apple in Dispute Over Unlocking iPhone. Pew Research Center for the People and the Press. February 22, 2016 . April 24, 2016. February 10, 2021. https://web.archive.org/web/20210210092227/https://www.pewresearch.org/politics/2016/02/22/more-support-for-justice-department-than-for-apple-in-dispute-over-unlocking-iphone/. live.
  80. News: Reform Government Surveillance Statement Regarding Encryption and Security. Reform Government Surveillance. February 17, 2016. February 24, 2016. February 10, 2021. https://web.archive.org/web/20210210092216/https://reformgs.tumblr.com/post/139513553507/reform-government-surveillance-statement. live.
  81. News: Clark. Jack. Google, Tech Companies Side With Apple in Decryption Protest. February 24, 2016. Bloomberg. February 17, 2016.
  82. News: Andor Brodeur. Michael. FBI v. Apple: What's at stake in encryption fight. February 23, 2016. The Boston Globe. February 23, 2016. February 10, 2021. https://web.archive.org/web/20210210092049/https://www.bostonglobe.com/arts/2016/02/23/fbi-apple-what-stake-encryption-fight/cYlBxyhfMIrzU3EvnAqIaI/story.html. live.
  83. Web site: Google, Microsoft, and other tech giants file legal briefs in support of Apple. Russell. Brandom. The Verge. March 3, 2016. March 4, 2016. February 10, 2021. https://web.archive.org/web/20210210092051/https://www.theverge.com/2016/3/3/11156704/apple-fbi-amicus-briefs-iphone-encryption-fight. live.
  84. Web site: Brief of Amici Curiae Amazon, et. al.. Michael. Maddigan. Neil. Katyal. Hogan Lovells US LLP. March 2, 2016. March 4, 2016. February 10, 2021. https://web.archive.org/web/20210210092005/https://cdn3.vox-cdn.com/uploads/chorus_asset/file/6141865/appleBriefasfiled__1___1_.0.pdf. live.
  85. Web site: Amicus Briefs in Support of Apple. March 3, 2016. March 4, 2016. Apple Press Info. February 10, 2021. https://web.archive.org/web/20210210092249/https://www.apple.com/newsroom/. live.
  86. News: Froomkin. Dan. McLaughlin. Jenna. FBI vs. Apple Establishes a New Phase of the Crypto Wars. February 26, 2016. The Intercept. February 26, 2016.
  87. News: Lee. Sung. The government's decades-long battle for backdoors in encryption. February 27, 2016. Newsweek. February 26, 2016. February 10, 2021. https://web.archive.org/web/20210210092120/https://www.newsweek.com/governments-decades-long-battle-backdoors-encryption-430868. live.
  88. News: Reisinger. Don. Will You Protest the FBI at Apple Stores on Tuesday?. March 13, 2016. Fortune. February 22, 2016. February 10, 2021. https://web.archive.org/web/20210210092120/https://fortune.com/2016/02/22/apple-stores-protests/. live.
  89. News: MOSCARITOLO. ANGELA. Protesters Gather to Support Apple in FBI iPhone Fight. March 13, 2016. PCMag. February 24, 2016. February 10, 2021. https://web.archive.org/web/20210210092125/https://www.pcmag.com/news/photos-protesters-gather-to-support-apple-in-fbi-iphone-fight. live.
  90. News: CUTHBERTSON. ANTHONY. APPLE STORE PROTESTS OVER ENCRYPTION BATTLE PLANNED WORLDWIDE. March 13, 2016. Newsweek. February 22, 2016. February 10, 2021. https://web.archive.org/web/20210210092221/https://www.newsweek.com/apple-store-protests-planned-across-us-over-encryption-428948. live.
  91. News: San Bernardino Shooting: UN chief warns of implications of Apple-FBI row. The Press-Enterprise. Associated Press. March 4, 2016. March 4, 2016. February 10, 2021. https://web.archive.org/web/20210210092057/https://www.pe.com/2016/03/04/san-bernardino-shooting-un-chief-warns-of-implications-of-apple-fbi-row/. live.
  92. Web site: Fmr. NSA, CIA Chief Hayden Sides with Apple Over Feds. Julia. Limitone. Fox Business. March 7, 2016. March 9, 2016. February 10, 2021. https://web.archive.org/web/20210210092239/https://www.foxbusiness.com/features/fmr-nsa-cia-chief-hayden-sides-with-apple-over-feds. live.
  93. Web site: San Bernardino survivor's husband backs Apple in battle with FBI. February 29, 2016. AOL. TechCrunch. March 21, 2016. February 10, 2021. https://web.archive.org/web/20210210092300/https://techcrunch.com/2016/02/29/san-bernardino-survivors-husband-backs-apple-in-battle-with-fbi/. live.
  94. Web site: Snowden: FBI Saying It Can't Unlock iPhone is 'Bullsh**'. Don. Reisinger. Fortune. March 9, 2016. March 9, 2016. February 10, 2021. https://web.archive.org/web/20210210092155/https://fortune.com/2016/03/09/snowden-fbi-apple-iphone/. live.
  95. Web site: The global technological consensus is against the FBI. Why? Here's one example. Edward. Snowden. Twitter. March 8, 2016. March 9, 2016. February 10, 2021. https://web.archive.org/web/20210210092246/https://twitter.com/Snowden/status/707299113449230336. live.
  96. Web site: Hathaway . Jay . Antivirus Wild Man John McAfee Offers to Solve FBI's iPhone Problem So Apple Doesn't Have To . Following: How We Live Online . February 19, 2016 . February 24, 2016 . February 23, 2016 . https://web.archive.org/web/20160223133848/http://nymag.com/following/2016/02/john-mcafee-says-he-can-crack-that-iphone.html . live .
  97. Web site: John McAfee lied about San Bernardino shooter's iPhone hack to 'get a s**tload of public attention'. William. Turton. The Daily Dot. March 7, 2016. March 7, 2016. May 15, 2016. https://web.archive.org/web/20160515024010/http://www.dailydot.com/politics/john-mcafee-lied-iphone-apple-fbi/. live.
  98. Web site: FBI's strategy in Apple case caught in distortion field. ZDNet. John. Fontana. April 6, 2016. April 6, 2016. February 10, 2021. https://web.archive.org/web/20210210092232/https://www.zdnet.com/article/fbis-strategy-in-apple-case-caught-in-distortion-field/. live.
  99. News: Some Victims in Terror Attack Support Efforts to Hack iPhone . Tami . Abdullah . Amanda Lee . Myers . Associated Press . ABC News . February 22, 2016 . February 25, 2016 . dead . https://web.archive.org/web/20160224120439/https://abcnews.go.com/Technology/wireStory/basic-software-held-key-shooters-iphone-unused-37106947 . February 24, 2016 .
  100. News: Smythe. Christie. Wang. Selina. Kary. Tiffany. Apple Goes to Washington Fresh From Big Boost in iPhone Fight. March 1, 2016. Bloomberg. March 1, 2016.
  101. Web site: Nelson. Joe. State, federal law enforcement agencies file in support of FBI in Apple battle. March 3, 2016 . San Bernardino County Sun. March 30, 2016. February 10, 2021. https://web.archive.org/web/20210210092128/https://www.sbsun.com/2016/03/03/state-federal-law-enforcement-agencies-file-in-support-of-fbi-in-apple-battle/. live.
  102. Web site: Thielman. Sam. Yadron. Danny. Crunch time for Apple as it prepares for face-off with FBI. The Guardian. March 1, 2016. February 27, 2016. February 10, 2021. https://web.archive.org/web/20210210092053/https://www.theguardian.com/technology/2016/feb/27/apple-fbi-congressional-hearing-iphone-encryption. live.
  103. Web site: Gates breaks ranks over FBI Apple request. Stephen. Foley. Tim. Bradshaw. Financial Times. February 23, 2016. February 25, 2016. February 10, 2021. https://web.archive.org/web/20210210092101/https://www.ft.com/content/3559f46e-d9c5-11e5-98fd-06d75973fe09#axzz417MxjWob. live.
  104. Web site: Gates disputes report that he backs FBI in Apple dispute. Bloomberg. February 23, 2016. February 25, 2016.
  105. News: Bill Gates Weighs In on Apple's Clash With the F.B.I.. Mike. McPhatefeb. The New York Times. February 23, 2016. February 25, 2016. February 10, 2021. https://web.archive.org/web/20210210092102/https://www.nytimes.com/2016/02/24/technology/bill-gates-apple.html. live.
  106. Web site: It's Not Just The iPhone Law Enforcement Wants To Unlock. NPR. February 21, 2016. March 3, 2016. February 10, 2021. https://web.archive.org/web/20210210092249/https://www.npr.org/2016/02/21/467547180/it-s-not-just-the-iphone-law-enforcement-wants-to-unlock. live.
  107. Web site: Apple clash before Congress as encryption fight simmers. Tami. Abdollah. Larry. Neumeister. CBS News. March 1, 2016. March 3, 2016. February 10, 2021. https://web.archive.org/web/20210210092245/https://sanfrancisco.cbslocal.com/2016/03/01/apple-fbi-stake-out-competing-sides-in-encryption-debate/. live.
  108. Web site: FBI director demands access to private cell phone data. Rosenblatt. Seth. October 16, 2014. Cnet. May 2, 2016. February 10, 2021. https://web.archive.org/web/20210210092110/https://www.cnet.com/news/fbi-director-demands-access-to-private-cell-phone-data/. live.
  109. Web site: What presidential candidates are saying about the Apple v. FBI debate . The Christian Science Monitor . February 19, 2016 . February 25, 2016 . February 10, 2021 . https://web.archive.org/web/20210210092109/https://www.csmonitor.com/World/Passcode/2016/0219/What-presidential-candidates-are-saying-about-the-Apple-v.-FBI-debate . live .
  110. Web site: Every GOP presidential candidate sides with the FBI in fight with Apple. Alyssa. Bereznak. Yahoo! News. February 25, 2016. February 25, 2016. February 10, 2021. https://web.archive.org/web/20210210092302/https://www.yahoo.com/news/every-republican-presidential-candidate-sides-with-044526788.html. live.
  111. Web site: Defense Secretary Says He Is For Encryption And Against Back Doors. Fortune. Jonathan. Vanian. March 2, 2016. March 3, 2016. February 10, 2021. https://web.archive.org/web/20210210092255/https://fortune.com/2016/03/02/secretary-defense-encryption-back-doors/. live.
  112. News: Machkovech. Sam. Obama weighs in on Apple v. FBI: "You can't take an absolutist view". March 12, 2016. Ars Technica. March 11, 2016. February 10, 2021. https://web.archive.org/web/20210210092109/https://arstechnica.com/tech-policy/2016/03/obama-weighs-in-on-apple-v-fbi-you-cant-take-an-absolutist-view/. live.
  113. Web site: Leak of Senate encryption bill prompts swift backlash. Dustin. Volz. Mark. Hosenball. Reuters. April 8, 2016. April 14, 2016. February 10, 2021. https://web.archive.org/web/20210210092205/https://www.reuters.com/article/us-apple-encryption-legislation-idUSKCN0X52CG. live.
  114. Web site: U.S. Senate panel releases draft of controversial encryption bill. Mark. Hosenball. Dustin. Volz. Yahoo! Finance. Reuters. April 13, 2016. April 14, 2016. February 10, 2021. https://web.archive.org/web/20210210092057/https://finance.yahoo.com/news/u-senate-panel-releases-draft-192224282.html. live.
  115. Web site: USA Today, others sue FBI for info on phone hack of San Bernardino shooter. USA Today. September 16, 2016. September 17, 2016. Brad. Heath. September 17, 2016. https://web.archive.org/web/20160917012058/http://www.usatoday.com/story/news/nation/2016/09/16/usa-today-lawsuit-fbi-iphone-hack-san-bernardino/90477540/. live.
  116. Josh Gerstein, Judge: FBI can keep cost of iPhone hack secret, Politico (October 1, 2017).
  117. Associated Press v. Federal Bureau of Investigation , Civil Action No. 16-cv-1850 (TSC) (D.D.C. Sept. 13, 2017).
  118. Web site: Statement Before the House Committee on Energy and Commerce, Subcommittee on Oversight and Investigation Washington, D.C.. Hess. Amy. April 19, 2016. fbi.gov. August 18, 2018. February 10, 2021. https://web.archive.org/web/20210210092059/https://www.fbi.gov/news/testimony/deciphering-the-debate-over-encryption. live.
  119. Web site: A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation. oig.justice.gov. Office of the Inspector General, US Department of Justice. August 18, 2018. February 10, 2021. https://web.archive.org/web/20210210092017/https://oig.justice.gov/reports/2018/o1803.pdf. live.
  120. News: The FBI Used Classified Hacking Tools in Ordinary Criminal Investigations. Cox. Joseph. March 29, 2018. Motherboard. August 18, 2018. February 10, 2021. https://web.archive.org/web/20210210092238/https://www.vice.com/en/article/7xdxg9/fbi-hacking-investigations-classified-remote-operations-unit. live.
  121. Web site: Going Dark. fbi.gov. August 18, 2018. November 1, 2019. https://web.archive.org/web/20191101184638/https://www.fbi.gov/services/operational-technology/going-dark. live.
  122. "Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans 'the privacies of life.'" Riley v. California, 573 U. S., ___, No. 13-312, slip op. at 28 (2014).