Law enforcement says that kind of encryption would stall investigations. iPhone owners just want protection from hackers.
- Apple scrapped plans to let its customers fully encrypt backups of their phone to iCloud after the FBI said it would hamper investigations, according to a Reuters report.
- U.S. Attorney General William Barr called on Apple to unlock two iPhones used by a Saudi Air Force officer who shot and killed three people on a Florida naval base last month.
- End-to-end encryption is meant to stop hackers, but it would also have meant that Apple would no longer have the encryption key to read a person’s data. So the company also couldn’t fork over the goods to law enforcement anymore.
Apple had intended to make end-to-end encryption of an entire device’s data, which would then be uploaded to iCloud, available to customers. But then the FBI stepped in and put the kibosh on those plans.
The problem, according to law enforcement: Fully locked-down iPhones could be a roadblock to investigations, like the probe into a Saudi Air Force officer who shot three people dead at a Pensacola, Florida naval base last month.
U.S. Attorney General William Barr publicly asked Apple to unlock the two iPhones the shooter had in his possession. The company eventually did hand over backups from his iCloud account, but the whole ordeal shone a light on the back-and-forth dialogue going on between the U.S. government and tech companies that disagree about whether or not end-to-end encryption should be allowed. Just last month, both Democratic and Republican senators considered legislation to ban end-to-end encryption, using unrecoverable evidence in crimes against children as an example.
Apple had been planning to introduce end-to-end encryption for over two years and even told the FBI, according to a Reuters report that cited one current and three former Bureau officials, as well as one current and one former Apple employee. Shortly thereafter, the FBI’s cybercrime agents and its operational technology division came out as staunchly opposed to those plans because it would make it impossible for Apple to recover people’s messages for use in investigations.
“Legal killed it, for reasons you can imagine,” another former Apple employee told Reuters. “They decided they weren’t going to poke the bear anymore.”
In this case, the bear is the government. In 2016, a nearly identical showdown between the FBI and Apple took place after the two parties got into a legal battle over access to an iPhone owned by a suspect in the San Bernardino, California mass shooting.
The nixed encryption plans are a loss for iPhone users because end-to-end encryption is more advanced than today’s industry standard for security: basic encryption. Loads of companies use encryption, which basically scrambles the contents of a message or some other snippet of data, rendering it completely useless without the decryption key, which can unshuffle the jargon and restore the original.
Under this framework, a company usually has the cryptographic encryption key, which means the data isn’t truly safe if a government or hacker gets their hands on the key. End-to-end encryption, though, means only the, well, end computer—the one receiving the data—has the encryption key stored. In theory, that person’s computer could still be hacked and the encryption key could be forfeited, but it really reduces those odds.
By Courtney LinderJan 23, 2020