5G Technology World

  • 5G Technology and Engineering
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • EE Learning Center
  • 5G Videos
  • Handbooks
    • 2022
    • 2021
  • Design Guides
    • WiFi & the IOT Design Guide
    • Microcontrollers Design Guide
    • State of the Art Inductors Design Guide

U.S. Appeals Ruling on Accessing Data in New York iPhone Case

By Tami Abdollah, Associated Press | March 8, 2016

WASHINGTON (AP) — Calling a New York judge’s ruling “an unprecedented limitation” on judicial authority, the Justice Department has asked a Brooklyn federal court to reverse a decision that said Apple Inc. wasn’t required to pry open a locked iPhone.

The government’s 45-page brief comes a week after U.S. Magistrate Judge James Orenstein issued his decision in a routine drug case, dealing a blow to the Obama administration in its battle with the tech giant over privacy and public safety.

Lawyers for the Justice Department called their Monday request routine, arguing that the case is not about asking Apple to do anything new, or to create a “master key” to access all iPhones. Apple has opposed the government’s move in a separate case involving the shooter who killed 14 people Dec. 2 in San Bernardino, California.

Apple’s pushback has fueled a national debate over digital privacy rights and national security. Apple had previously assailed the government’s move, saying U.S. officials were seeking “dangerous power” through the courts and trampling on the company’s constitutional rights.

The Brooklyn case involves a government request that is less onerous for Apple and its phone technology. The so-called extraction technique works on an older iPhone operating system and has been used dozens of times before to assist investigators.

The California and New York cases both hinge on the government’s interpretation of the centuries-old All Writs Act. The new cases present another challenge for federal courts, which have to sort out how a law that is used to help government investigators square privacy and encryption in the digital age.

The government asserted in court papers Monday that Orenstein’s ruling in New York is “an unprecedented limitation on” judicial authority and that his legal “analysis goes far afield of the circumstances of this case.” It also stated that the government “does not have any adequate alternatives” to obtaining Apple’s assistance because attempting to guess the passcode would trigger the phone’s auto-erase security feature.

Federal prosecutors cited several examples in which Apple has extracted data from a locked device under the law, including a child exploitation case in New York, a narcotics case in Florida and another exploitation case in Washington state.

Apple responded Monday: “Judge Orenstein ruled the FBI’s request would ‘thoroughly undermine fundamental principles of the Constitution’ and we agree. We share the judge’s concern that misuse of the All Writs Act would start us down a slippery slope that threatens everyone’s safety and privacy.”

In October, Orenstein invited Apple to challenge the government’s use of the 1789 law that compelled the company to help the government obtain iPhone data in criminal cases. Since then, lawyers say Apple has opposed requests to help extract information from over a dozen iPhones in California, Illinois, Massachusetts and New York.

In the California case, officials are looking for access to the phone used by Syed Farook but owned by San Bernardino County, where he was a health inspector. Federal investigators say the attack by Farook and his wife, Tashfeen Malik, was at least partly inspired by the Islamic State group. The couple died later in a gun battle with police.

FBI Director James Comey told a House judiciary panel last week that the government was “asking Apple to take the vicious guard dog away and let us pick the lock” on the iPhone. Should Apple create the specialized software to allow the FBI to hack the iPhone in California, Comey said it would take 26 minutes to do what’s known as a brute force attack — testing multiple passcodes in quick, computational succession.

Apple has said that being forced to extract information from an iPhone, no matter the circumstance, “could threaten the trust between Apple and its customers and substantially tarnish the Apple brand.”

___

Follow Tami Abdollah on Twitter at https://twitter.com/latams

Related Articles Read More >

5G vectors
How RedCap fits into 5G and IoT
Benetel RAN650
OpenRAN mid-band radio brings cellular to private and campus networks
Don’t push on that icon and other 3G sunset issues
LTE Cat 1 modules target worldwide IoT connectivity

Special Issue: 5G Handbook

Need 5G Technology World news in a minute?

We Deliver!
5G Technology World Enewsletters get you caught up on all the mission critical news you need. Sign up today.
Enews Signup

EE World Online Twitter

Tweets by @RandDWorld

EE TRAINING CENTER CLASSROOMS

EE Classrooms
5G Technology World
  • Enews Signup
  • Contact Us
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • Wire & Cable Tips

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search 5G Technology World

  • 5G Technology and Engineering
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • EE Learning Center
  • 5G Videos
  • Handbooks
    • 2022
    • 2021
  • Design Guides
    • WiFi & the IOT Design Guide
    • Microcontrollers Design Guide
    • State of the Art Inductors Design Guide