<p style="text-align:justify;"><em>Ed. Note.: This post, by Benjamin Vanlalvena, is a part of the NALSAR Tech Law Forum Editorial Test 2016.</em></p>
<p style="text-align:justify;"><u>A background of the issue</u></p>
<p style="text-align:justify;">On December 2, 2015, 14 people were killed and 22 were seriously injured in a terrorist attack at the Inland Regional Center in San Bernardino, California, which consisted of a mass shooting and an attempted bombing. The <a href="http://www.reuters.com/article/us-california-shooting-encryption-idUSKCN... announced on February 9, 2016</a> that it was unable to unlock the iPhone used by one of the shooters, Farook. The <a href="https://theintercept.com/2016/03/03/nsa-is-mysteriously-absent-from-fbi-... initially asked the NSA</a> to break into the iPhone but their issue was not resolved, and therefore asked Apple to create a version of the phone’s operating system to disable the security features on that phone.</p>
<p style="text-align:justify;">Apple however refused which led to the <a href="http://www.wired.com/wp-content/uploads/2016/02/SB-shooter-MOTION-seekin... of Justice</a> applying to a United States Magistrate judge who issued a <a href="https://assets.documentcloud.org/documents/2714005/SB-Shooter-Order-Comp... order</a> requiring Apple to create and provide the requested software and was <a href="http://www.pe.com/articles/apple-794741-time-bernardino.html">given until 26<sup>th</sup> February, 2016</a> to respond to the order. <a href="http://edition.cnn.com/2016/02/16/us/san-bernardino-shooter-phone-apple/... however announced their intention</a> to oppose the order. The Department of Justice in response <a href="http://abcnews.go.com/US/doj-escalates-battle-apple-san-bernardino-shoot... a new application</a> to compel Apple to comply with the order. It was revealed that they had <a href="https://gma.yahoo.com/san-bernardino-shooters-apple-id-passcode-changed-... methods to access the data</a> in January however, a mistake by the investigating agencies ruled out that method. On March 28, the <a href="http://www.nytimes.com/2016/03/29/technology/apple-iphone-fbi-justice-de... announced</a> that they had unlocked the phone and withdrew the suit.</p>
<p style="text-align:justify;"><u>The dilemma</u></p>
<p style="text-align:justify;">Privacy is a recognised fundamental right under <a href="http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx">Article 17 of the International Covenant for Civil and Political Rights</a> and <a href="http://www.un.org/en/universal-declaration-human-rights/">Article 12 of the Universal Declaration of Human Rights</a>.</p>
<p style="text-align:justify;">Encryption is a process through which one encodes or secures a message or data to make the content readable only by an authorized party or by someone who has the decryption key. Apple claims that it <a href="https://www.apple.com/privacy/government-information-requests/">does not perform data extractions</a> as the ‘<em>files to be extracted are protected by an encryption key that is tied to the user’s passcode, which Apple does not possess.</em>’ This, according to the <a href="http://www.dailypress.com/news/crime/dp-nws-phone-encryption-20150412-st... Director</a>, James Comey, is a cause for concern as it means that even with a court order, the contents inside the device of all kinds of criminals would not be accessible. Having a backdoor or ‘golden key’, though slightly different [though not totally] from mass surveillance, as agencies herein would be having the <em>capability </em>to access data stored in the devices as compared to a constant monitoring of data. It’s no longer a matter of constant surveillance but the potentiality of other non-governmental persons gaining access through some illegitimate means. The major contention is that there is an assumption either that those who have access to the key are ‘good people’, who have our interests in mind or that the backdoor would only be accessible by the government. The <a href="https://www.washingtonpost.com/world/national-security/fbi-paid-professi... Post</a> reported that the FBI had (after failing to get Apple to comply) paid professional hackers to assist them in cracking the San Bernardino terrorist’s phone. This itself is a cause of concern as it is proof of vulnerabilities existing in our phones which are seemingly secure.</p>
<p style="text-align:justify;">A data that is encrypted cannot be considered to be totally secure if there is some party which has a means to bypass said encryption. The FBI’s request is therefore problematic as it gives it a backdoor to the data which would be a vulnerability which effects all users. One should bear in mind that the <a href="http://forums.theregister.co.uk/forum/1/2016/06/01/windows_0day_selling_... of such ‘zero-day vulnerabilities’ is <a href="http://www.defenseone.com/ideas/2016/09/what-do-about-zero-day-hacks-try... something unheard of</a> and the NSA or FBI having such tools which keep our data secure is<a href="https://www.theguardian.com/commentisfree/2016/sep/04/nsa-stash-digital-... problematic</a> as <a href="http://thehackernews.com/2016/09/nsa-hacking-tool-exploits.html">such tools could be end up in the hands of hackers</a> or <a href="http://thehackernews.com/2016/08/nsa-hack-exploit.html">leaked</a>. One of the most hard hitting points raised is the <a href="http://www.politico.eu/article/encryption-probe-in-terror-investigations... of national interest</a>, that terrorists or paedophiles use encryption and that it is a “<a href="http://arstechnica.co.uk/tech-policy/2016/03/revised-snoopers-charter-ig... <a href="http://www.businessinsider.in/The-FBI-claims-technology-promoted-by-Appl...” for them. However, a creation of a backdoor according to the former NSA chief, <a href="http://www.usatoday.com/story/news/2016/02/21/ex-nsa-chief-backs-apple-i... Hayden</a>, would be futile as terrorists would be making their own apps based on open-source software, the presence of a backdoor would simply make innocent persons less secure and vulnerable to people who would be taking advantage of such backdoors.</p>
<p style="text-align:justify;">While the intention of the agencies might be good or in the interests of the public, one should keep in mind that once a backdoor is provided, not only is this a dangerous precedent but the dangers of such an encryption leaking an effecting the lives of common persons is huge.</p>
<p style="text-align:justify;"></p>
<p style="text-align:justify;"></p>
<p style="text-align:justify;">For more information, visit:</p>
<p style="text-align:justify;"><a href="https://tcf.org/content/commentary/weve-apple-encryption-debate-nothing-...
<p style="text-align:justify;"><a href="https://www.aclu.org/feature/community-control-over-police-surveillance"...
<p style="text-align:justify;"><a href="https://www.ctc.usma.edu/posts/how-terrorists-use-encryption">https://ww...
<p style="text-align:justify;"><a href="https://www.youtube.com/watch?v=peAkiNu8mHY">https://www.youtube.com/wat...
<p style="text-align:justify;"><a href="https://www.youtube.com/watch?v=DZz86r-AGjI">https://www.youtube.com/wat...
Encryption and the extent of privacy
link:
https://techlawforum.wordpress.com/2016/09/24/encryption-and-the-extent-of-privacy/