Online:
Visits:
Stories:
Profile image
By Mobile Marketing and Technology (Reporter)
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Deciphering the FBI-Apple Mobile Encryption Debate – Byline – Roy Rasmussen

Monday, February 29, 2016 15:42
% of readers think this story is Fact. Add your two cents.

(Before It's News)

The legal battle between the FBI and Apple over unlocking San Bernardino shooter Syed Rizwan Farook’s iPhone has sparked debate over the relationship between national security and consumer privacy. The battle began because the FBI feared that trying to hack the iPhone would trigger a security feature that deletes data after multiple unsuccessful login attempts. The U.S. Attorney’s Office argued that the FBI needs Apple’s help to identify the password and access relevant data, and the judge ordered Apple’s cooperation. Apple CEO Tim Cook refused, objecting that complying would require building a backdoor into the iPhone’s iOS operating system. This could potentially compromise other Apple users if the backdoor software fell into the wrong hands.

The Debate

Public reaction and the opinions of government and technology leaders have been divided. The Obama administration has expressed willingness to let Apple retain custody of any software used to hack the iPhone. Republican presidential candidate Donald Trump has sided with the FBI, saying Apple should cooperate and insinuating Cook is pulling a PR stunt.Anti-virus programmer John McAfee, running for president as a Libertarian, has contended a backdoor would create vulnerabilities that foreign enemies could exploit and has instead offered to help the FBI hack the iPhone.

Google CEO Sundar Pichai and Facebook CEO Mark Zuckerberg have sided with Apple on privacy grounds. Microsoft founder Bill Gates has disputed Apple’s position, saying the FBI is only asking for access to a specific phone, not requesting general backdoor access. However, Gates denies siding with the FBI against Apple, explaining he is simply calling for updated policies to balance security with privacy.

The Underlying Technical Issue

Underlying the controversy is technology known as encryption, a coding technique used to safeguard sensitive data, such as documents in cloud backup servers, passwords and banking information. Standard encryption uses a secret key to convert passwords into long character strings. Someone who knows the key can decipher the original password, but without it, a strong password becomes extremely time-consuming for a hacker’s computer to randomly guess.

However, most people don’t use strong passwords, so Apple takes a different approach. For iPhones with Touch ID, Apples relies upon a 256-bit unique identifier key (UID key) specific to each iPhone. The UID is built into each iPhone during manufacturing by placing it in a co-processor called the Special Enclave (SE). This physically separates it from other iPhone components, so the UID is unknown to Apple and manufacturers. The SE guards access to the UID by stalling for longer periods of time the more someone attempts to randomly guess user passcodes. After 10 consecutive failures, the operating system issues a command to delete protected data.

To bypass this, the FBI has requested that Apple build a customized iOS version that disables the data delete command. The Bureau then wants to update Farook’s iPhone with this new version of iOS, so it can have a computer randomly guess his password. Trail of Bits CEO Dan Guido has analyzed the technical requirements and concluded that it would be possible for Apple to build the iOS version the FBI is requesting, which he calls “FBiOS.”

The Legal Issue

Technical feasibility aside, Apple disputes the legality of the request, arguing it would set a dangerous precedent. The FBI has been trying to get Apple to unlock iPhones in over a dozen recent cases, relying on a law that lets judges issue orders compelling action to carry out their jurisdiction. Apple defenders contend that if the government can compel Apple to bypass its security safeguards, the legal precedent would let any government agency compel any company to hack its security. This could lead to an invasion of users’ privacy by the government or by hostile parties that gain access to the government’s backdoor, such as the pro-Palestiniangroup that recently hacked the FBI and exposed 20,000 employees’ personal information.

To challenge the court’s order, Apple’s lawyers plan to argue that the order violates Apple’s free speech rights by compelling it to write software code. Apple will argue that Congress, rather than the courts, should decide the issue.

Byline: Roy Rasmussen, coauthor of Publishing for Publicity, is a freelance copywriter who helps small businesses get more customers and make more sales. His specialty is helping experts reach their target market with a focused sales message. His most recent projects include books on cloud computing, small business management, sales, business coaching, social media marketing, and career planning.

Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter


Source: http://mobilemarketingandtechnology.com/2016/02/29/deciphering-the-fbi-apple-mobile-encryption-debate-byline-roy-rasmussen/

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.