Practicing law for over three decades, Ossian has nearly 20 years of experience and expertise in IT Law.
Formerly senior principal and chair of the Information Technology and Cyberlaw Section at Miller Canfield, she also served as a law clerk to U.S. District Judge Robert E. DeMascio.
Ossian spoke recently with Steve Thorpe of the Legal News.
Ossian: The FBI has asked for Apple’s assistance in gaining access to the iPhone by deactivating the security feature that wipes the content of the device after a specified number of failed passcode attempts.
On Feb. 16, a federal magistrate judge ordered Apple to comply with the FBI’s request.
Apple recently filed a motion to vacate the order, taking the position that the FBI’s request goes beyond what is legally allowed.
Ossian: Since October of 2015, the FBI has made similar requests of Apple for at least 15 iPhones, some of which have no connection with terrorist-related activities.
Apple and some security and privacy experts have expressed an even greater concern — if Apple were compelled to provide the technical means to facilitate access to government-targeted phones, that technology could quickly become available to others, including domestic and international hackers, compromising the general security of all iPhones.
Ossian: Apple has consistently stated that it currently has no method of getting around the security feature.
From a technical standpoint, it seems that Apple should have the capability to write code to disable it (and certainly could do so for devices going forward).
For Apple, the policy implications of writing and releasing the code are more daunting.
Ossian: A “back door” would provide a way around the security feature so that the FBI (or anyone else having access through it) could continue to try to unlock a device an unlimited number of times until they are successful.
Apple is worried that the back door will nullify the other efforts the company has made in designing and building security and privacy into its
devices.
The availability of a back door would also be inconsistent with existing privacy laws and regulations, including the Federal Trade Commission’s
security and “privacy by design” initiatives as well as foreign laws, like those of the European Union.
Ossian: Some states, including California and New York, have proposed legislation to ban the sale of devices without the built-in capability to be decrypted and unlocked as well as provide civil penalties against device manufacturers.
This has prompted the introduction of the federal Encrypt Act of 2016 to prohibit states from enforcing such legislation.
The federal bill, now in the House Judiciary and House Energy and Commerce Committees, would maintain a uniform national approach on the security level of devices.
It’s too soon to determine whether this bill will pass but I suspect there will be other legislative initiatives on this topic at both the state and federal level.
Ossian: Apple’s motion to vacate the magistrate judge’s order argues that existing federal law doesn’t allow the government to compel Apple to “require a specific design,” i.e. create the back door.
Apple’s argument is based largely on the policy implications of a decision in the FBI’s favor.
Regardless of how the lower court rules, I expect the matter to be appealed and perhaps, ultimately, be decided by the U.S. Supreme Court in light of the privacy and security considerations.
––––––––––––––––––––
Subscribe to the Legal News!
http://legalnews.com/Home/Subscription
Full access to public notices, articles, columns, archives, statistics, calendar and more
Day Pass Only $4.95!
One-County $80/year
Three-County & Full Pass also available