Justice Department argues against Apple's encryption claims
The Department of Justice said Apple should be able to unlock phones if the government demands it according to the All Writs Order
The Department of Justice (DoJ) has argued against Apple CEO Tim Cook's claims that encryption is essential on iPhones.
The debate came about after it was suggested that Apple should unlock an iPhone that was detained as part of a drugs probe, but Tim Cook said it was "too burdensome" to do so and the matter became a much bigger issue regarding encryption on devices.
Now the All Writs Order has come into play, which has in the past led to smartphone manufacturers having to unlock devices from the homescreen if and when requested by law. However, the Order was written in 1789, so seems a little out of date in today's technologically-charged world.
Apple is refusing to allow access to the device, but the DoJ stated that it has been able to convince Apple to unlock devices in the past when involved in a criminal investigation and cited three instances when it had successfully managed to infiltrate smartphones. Why is this case different?
"Apple agrees with the court's preliminary conclusion that the All Writs Act should not be read to permit the relief the government requests," Apple said in its latest court filing. "This case is not an instance where the government seeks to fill in a statutory gap that Congress has failed to consider,' but rather one where the government seeks to have the court give it authority that Congress chose not to confer.'"
It continued by arguing that it's no different to the government requesting that a company travels around the country unlocking safes holding confidential information.
Magistrate Judge James Orenstein, who has had some success representing companies subject to the All Writs Act then said he wanted Apple to explain why unlocking the device would be "burdensome".
Apple responded that it wouldn't necessarily be such, because the device in question is running iOS7, which doesn't offer end-to-end encryption, but could potentially harm the company's reputation because it would be going against the company's promise to encrypt its users devices and protect their data.
What you need to know about migrating to SAP S/4HANA
Factors to assess how and when to begin migrationDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
Testing for compliance just became easier
How you can use technology to ensure compliance in your organisationDownload now
Best practices for implementing security awareness training
How to develop a security awareness programme that will actually change behaviourDownload now