Texas gunman’s iPhone could reignite FBI-Apple feud over encryption

0
6

The FBI and Apple are bracing for another potential fight over encryption, this time because of the iPhone of the dead gunman in the Texas church shooting, according to people familiar with the matter.

The federal government and the company have shied away from open confrontation since a 2016 standoff when the locked and encrypted iPhone of a terrorist in San Bernardino, Calif., led to a major court battle. In that fight, the Justice Department tried to force Apple to unlock the dead man’s phone. The company refused, saying to do so would create a security weakness in the phones of all customers.

That legal fight sparked a national debate about the competing interests of national security, law enforcement, personal privacy and giant tech firms. But the larger legal question of whether the government could force companies to provide access to phones and other electronic devices was never answered by the courts, because in the middle of the fight over the San Bernardino phone, the FBI found a private firm that could access it. Another similar case also fizzled when the suspect suddenly remembered his passcode and provided it to investigators.

On Tuesday, the FBI said it had not been able to access the phone belonging to Devin P. Kelley, the Air Force veteran responsible for killing more than two dozen people Sunday at a Texas church. Officials did not say what type of phone Kelley had, but people familiar with the case said it is an iPhone.

After the FBI said it was dealing with a phone it couldn’t open, Apple reached out to the bureau to learn if the phone was an iPhone and if the FBI was seeking assistance. Late Tuesday an FBI official responded, saying it was an iPhone but the agency was not asking anything of the company at this point. That’s because experts at the FBI’s lab in Quantico, Va., are trying to determine if there are other methods, such as cloud storage or a linked laptop, that would give access to the phone’s data, these people said. That process could take weeks, these people said.

If the FBI and Apple had talked to each other in the first two days after the attack, it’s possible the device might already be open.

That time frame may have been critical because Apple’s iPhone “Touch ID” — which uses a fingerprint to unlock the device — stops working after 48 hours. It wasn’t immediately clear if the gunman had activated the Touch ID feature on his phone, but more than 80 percent of iPhone owners do use that feature. If the bureau had consulted the company, Apple engineers would likely have told the bureau to take steps such as putting the dead gunman’s finger to the phone to see if doing so would unlock it. It’s unclear if the FBI tried to use the dead man’s finger to open the device in the first two days.

The two sides have sparred in the past over the first investigative steps involving an iPhone. In the case of the San Bernardino County shootings in December 2016, Apple has said the FBI squandered an early chance to get the data. The gunman in that incident worked for the county government, and the phone in question was his work phone. FBI investigators did not reach out to Apple and instead asked a county technician to reset the shooter’s Apple iCloud password. That foreclosed the possibility of an automatic backup to Apple iCloud servers, which could have been accessed by investigators.

If the FBI is ultimately unable to see the data on the phone, Justice Department officials will be faced with a choice: Is this phone worth another high-stakes legal battle with Apple?

Given the extent of carnage inflicted by the Texas gunman and the growing problem encryption poses for law enforcement, officials could decide that it is a good test case for their argument that companies should make devices that are accessible with a signed order from a judge.

But that impulse may be tempered by another consideration: So far, the Texas gunman appears to have acted alone in what some officials have called a domestic violence problem that escalated into a mass murder.

If there is little reason to think the gunman had any accomplices, the Justice Department may have a less compelling argument to try to take Apple to court to force them to open the phone.

After the previous cases faded, the Justice Department has shied away from direct public confrontations with Apple and other firms over encryption.

While FBI Director Christopher Wray has warned there are nearly 7,000 phones that cannot be opened, and those technologies are making it harder to fight terrorism and crime, Congress has shown little interest so far in tackling the issue.

Law enforcement officials argue that encryption that prevents a police officer from opening a suspect’s phone even with a court order makes it increasingly difficult to solve murders and a host of other crimes; privacy advocates say that encrypted communications protect everyone from hackers and thieves and that the government should be able to find evidence through other means.

Recently, Justice Department Deputy Attorney General Rod Rosenstein has been speaking out about the issue, which the FBI has called “Going Dark.”

“Unfortunately, some companies are unwilling to help enforce court orders to obtain evidence of criminal activity stored in electronic devices,” Rosenstein said at a speech in Salt Lake City in August. “I hope that technology companies will work with us to stop criminals from defeating law enforcement. Otherwise, legislation may be necessary.”

Source Portal

LEAVE A REPLY

Please enter your comment!
Please enter your name here