Home
/
RELIGION & LIBERTY ONLINE
/
Explainer: Apple’s Fight with the FBI Over iPhone Encryption
Explainer: Apple’s Fight with the FBI Over iPhone Encryption
Jan 12, 2026 10:29 PM

What is the issue about?

In December, 14 people were killed and 22 were seriously injured in a terrorist attack in San Bernardino, California. The two terrorists, Syed Rizwan Farook and Tashfeen Malik, were later killed in a shootout with police. Law enforcement recovered Farook’s iPhone 5c, which they believe may contain information relevant to the terror investigation.

Farook’s iPhone is protected by a passcode set to wipe the contents of the smartphone after 10 attempts to log in with the wrong code. A federal court in California has ordered Apple to “provide reasonable technical assistance” by either creating a special version of the operating system that’s currently on Farook’s phone, in order to disable the 10-try maximum and allow puter to connect to the phone and guess every possible passcode, or to provide an alternative means of accessing the phone.

The Obama administration defended the Justice Department’s request Wednesday, vowing that the government would solely use the new program on Farook’s phone.

Apple is currently refusing ply with the request. Apple CEO Tim Cook issued a statement, “A Message To Our Customers”, in which he says, “The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.”

What is the case plying with the order?

Opponents of the order fear that it gives the government power over the smartphone’s encryption technology by building a “backdoor” to the iPhone. As Tim Cook claims,

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limitedto this case, there is no way to guarantee such control.

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

Google CEO Sundar Pichai agreed with Cook, saying on Twitter that forcing panies to hack users’ devices “could be a troubling precedent.”

Many privacy rights groups have also weighed in, claiming that, once created, this “backdoor” could be exploited by criminals or abused by the government.

What is the case plying with the order?

Advocates plying with the order claim that the fears of critics are overblown and that Apple is merely grandstanding to ingratiate themselves with privacy-rights advocates.

As Gabriel Malor explains, until this week, no one claimed that removing the auto-erase and delay features of passcodes constituted a “backdoor.” “Uses of the term to refer to the order in this case are thus misleading,” says Malor. “This order does not require Apple to hand over a key to its encryption that could be used on other devices.”

Malor also says this case would not set a new precedent since it already relies on an old precedent:

The All Writs Act derives from the Founders’ acknowledgment that sometimes courts require aid from third parties to administer justice. To the extent that Apple and other phone manufactures worry they may be asked to help law enforcement in the future, the Supreme Court set that precedent in a 1977 case calledUnited States v. New York Telephone Co.

Gus Hurwitz says that Apple’s refusal actually does more harm than good for the privacy-rights cause:

Cook’s concerns at best overstate the threat, and by doing so make it harder rather than easier to get some consensus around legitimately difficult but very important issues: the ongoing technological disruption of the delicate relationship between individuals and the state — between privacy and liberty on the one hand, and security on the other.

Hurwitz also explains why we should not be concerned about this issue:

Contrary to Tim Cook’s concerns, courts do not have plenary authority to “intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.” And, where they may have some authority to authorize such conduct, it is limited at least by the 4th Amendment and usually limited even further by statute. The All Writs Act doesn’t expand a court’s authority — it only allows them to exercise what authority they clearly do have, including mandeering the assistance of those who would otherwise deliberately obstruct a lawful court order.

Charles Krauthammer adds,“The grandstanding that Apple is doing I think is deplorable.” He says the solution is simple: “What you do is, you go to Apple and you say, ‘Look, you take this, you take this one phone, you open it wherever you want, in some secret lab, underwater, off the Pacific Isles, all we want is the information. If you like, you can incinerate the phone after all this is done — give us the information.”

Is there a way to resolve the issue?

Apple will appeal the case, but will likely lose the legal battle and may be forced ply with the order.

However, an alternative solution has beenoffered by John McAfee, the controversial cybersecurity expert who is running for president as a member of the Libertarian Party. McAfee says,

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

Comments
Welcome to mreligion comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
RELIGION & LIBERTY ONLINE
Radio Free Acton: Discussing ‘Communism & Christian Faith’; Upstream with mystery novelist Sally Wright
On this episode of Radio Free Acton, Acton’s Drew McGinnis and Dan Hugger discuss the book Communism & Christian Faith with Pavel Hanes, professor in the department of theology at Matej Bel University in Slovakia. Communism & Christian Faith was written by Lester DeKoster at the height of the Cold War and is newly reissued in the Acton bookshop. Then we have an Econ Quiz segment on trade deficits: what are they and how are they measured? Finally, on the...
Adam Smith on the causes—and cures—of crony capitalism
“For Adam Smith, crony capitalism fails on two grounds,” says Lauren Brubaker. “It is unjust, favoring a few at the expense of the many, and it is destructive of the desired end of political economy—economic growth.” Brubaker says Smith’s writings can help us properly frame the problems of crony capitalism, understand the causes, and formulate solutions for preventing or mitigating the corruption of free markets: For Smith, the tendencies to cronyism, which are anchored in human nature, can be tempered...
5 facts about the assassination of Martin Luther King, Jr.
Today marks the 50thanniversary of the assassination of Martin Luther King, Jr. Here are five facts you should know about the killing of the civil rights leader in Memphis, Tennessee. 1. The killing of King in 1968 was the second attempt on his life. A decade before he was assassinated, King was nearly stabbed to death in Harlem when amentally ill African-American womanwho believed he was conspiring against her munists, stabbed him in the chest with a letter opener. He...
How the principle of ‘eye for an eye’ advanced human equality
“An eye for an eye leaves the whole world blind” is a claim frequently attributed to Mohandas Gandhi. But while the quote might fit the attitude of a non-violent civil rights leader, it misses how the concept of “eye for an eye” changed the world for the better. The phrase “eye for an eye” is taken from passages in the Old Testament that refer to what is often called thelex talionis, the “law of retaliation.” While it sounds harsh, it...
Taxation and Catholic Social Teaching
“Tax policies and tax levies are an unavoidable part of civilized life,” says Robert G. Kennedy in this week’s Acton Commentary. “The social tradition of the Church emphasizes the duty of citizens to support their government as well as the duties of civil authorities to govern wisely and to respect the ownership rights of individuals and families.” Kennedy outlines five things the tradition Catholic social teaching teaches us about taxation and four things it does not. What the Tradition teaches:...
It’s Friday—but Sunday’s comin’
memoratesthecrucifixion of Jesus and his death at Calvary, the most significantly tragic event in human history. But as pastorS.M. Lockridge(1913-2000) reminds us in this brief Easter meditation, the darkness of this historical Friday pales parison to the light es on Sunday morning. It’s Friday Jesus is praying Peter’s a sleeping Judas is betraying But in’ It’s Friday Pilate’s struggling The council is conspiring The crowd is vilifying They don’t even know That in’ It’s Friday The disciples are running Like...
‘I, Pencil,’ continued: How man cooperates with nature
In Leonard Read’s famous essay,“I, Pencil,”he marvels over the cooperation and collaboration involved in the assemblyof a simple pencil — plex coordination among global creators that is, quite miraculously,uncoordinated. Read’s lesson is simple: Rather than try to stifle or control these creative energies, we ought to “organize society to act in harmony with this lesson,” permitting “these creative know-hows to freely flow.” In doing so, we will see similar stories manifest, fostering further evidence fora faith “as practical as the...
Gresham’s Law and social media for sale
In his latest column for Forbes, Alejandro Chafuen, the managing director of Acton’s international activities, has a ranking of free-market think tanks measured by social media impact, and discussesGresham’s Law as it relates to social media: The current discussions about the manipulation of social media for political purposes and mercial interests of social-media giants has raised important questions about its impact and deserves much further analysis. In his surprising announcement that he was going to retire in 16 months, Arthur...
Study: How overregulation is stifling the food truck revolution
As protestors continue to boldly decry “corporate greed” with little definition or discernment, progressive policymakers are just as quick to push a range of wage controls and market manipulations to mitigate the supposed vices of free and open exchange. The painful irony, of course, is that the victims of such policies are not the fat-cat cronyists at the top, but the scrappy challengers at the bottom. We’ve seen it with the recent embrace of the $15 minimum wage, which continues...
Why we should learn how to ‘kill American democracy’
During the Cold War, the U.S. military would conduct wargaming simulations in which some units would act as the United States (the blue team) and some would pretend to be Soviet troops (the red team). Through such exercises the military discover the weak points in their strategy before they were exposed bat situations. Over the years, the term “red teaming” came to be used to describe this practice of viewing a problem from an adversary petitor’s perspective. The military and...
Related Classification
Copyright 2023-2026 - www.mreligion.com All Rights Reserved