Home
/
RELIGION & LIBERTY ONLINE
/
Explainer: Apple’s Fight with the FBI Over iPhone Encryption
Explainer: Apple’s Fight with the FBI Over iPhone Encryption
Dec 9, 2025 4:33 PM

What is the issue about?

In December, 14 people were killed and 22 were seriously injured in a terrorist attack in San Bernardino, California. The two terrorists, Syed Rizwan Farook and Tashfeen Malik, were later killed in a shootout with police. Law enforcement recovered Farook’s iPhone 5c, which they believe may contain information relevant to the terror investigation.

Farook’s iPhone is protected by a passcode set to wipe the contents of the smartphone after 10 attempts to log in with the wrong code. A federal court in California has ordered Apple to “provide reasonable technical assistance” by either creating a special version of the operating system that’s currently on Farook’s phone, in order to disable the 10-try maximum and allow puter to connect to the phone and guess every possible passcode, or to provide an alternative means of accessing the phone.

The Obama administration defended the Justice Department’s request Wednesday, vowing that the government would solely use the new program on Farook’s phone.

Apple is currently refusing ply with the request. Apple CEO Tim Cook issued a statement, “A Message To Our Customers”, in which he says, “The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.”

What is the case plying with the order?

Opponents of the order fear that it gives the government power over the smartphone’s encryption technology by building a “backdoor” to the iPhone. As Tim Cook claims,

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limitedto this case, there is no way to guarantee such control.

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

Google CEO Sundar Pichai agreed with Cook, saying on Twitter that forcing panies to hack users’ devices “could be a troubling precedent.”

Many privacy rights groups have also weighed in, claiming that, once created, this “backdoor” could be exploited by criminals or abused by the government.

What is the case plying with the order?

Advocates plying with the order claim that the fears of critics are overblown and that Apple is merely grandstanding to ingratiate themselves with privacy-rights advocates.

As Gabriel Malor explains, until this week, no one claimed that removing the auto-erase and delay features of passcodes constituted a “backdoor.” “Uses of the term to refer to the order in this case are thus misleading,” says Malor. “This order does not require Apple to hand over a key to its encryption that could be used on other devices.”

Malor also says this case would not set a new precedent since it already relies on an old precedent:

The All Writs Act derives from the Founders’ acknowledgment that sometimes courts require aid from third parties to administer justice. To the extent that Apple and other phone manufactures worry they may be asked to help law enforcement in the future, the Supreme Court set that precedent in a 1977 case calledUnited States v. New York Telephone Co.

Gus Hurwitz says that Apple’s refusal actually does more harm than good for the privacy-rights cause:

Cook’s concerns at best overstate the threat, and by doing so make it harder rather than easier to get some consensus around legitimately difficult but very important issues: the ongoing technological disruption of the delicate relationship between individuals and the state — between privacy and liberty on the one hand, and security on the other.

Hurwitz also explains why we should not be concerned about this issue:

Contrary to Tim Cook’s concerns, courts do not have plenary authority to “intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.” And, where they may have some authority to authorize such conduct, it is limited at least by the 4th Amendment and usually limited even further by statute. The All Writs Act doesn’t expand a court’s authority — it only allows them to exercise what authority they clearly do have, including mandeering the assistance of those who would otherwise deliberately obstruct a lawful court order.

Charles Krauthammer adds,“The grandstanding that Apple is doing I think is deplorable.” He says the solution is simple: “What you do is, you go to Apple and you say, ‘Look, you take this, you take this one phone, you open it wherever you want, in some secret lab, underwater, off the Pacific Isles, all we want is the information. If you like, you can incinerate the phone after all this is done — give us the information.”

Is there a way to resolve the issue?

Apple will appeal the case, but will likely lose the legal battle and may be forced ply with the order.

However, an alternative solution has beenoffered by John McAfee, the controversial cybersecurity expert who is running for president as a member of the Libertarian Party. McAfee says,

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

Comments
Welcome to mreligion comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
RELIGION & LIBERTY ONLINE
Woe un2mnkind!
A British mobile pany has hired a professor of literature to write up short quotations from various masterpieces. The goal is to help make “great literature more accessible” by offering short, truncated, text messages to students via cell phones. A Reuters story quoted pany: “We are confident that our version of ‘text’ books will genuinely help thousands of students remember key plots and quotes, and raise up educational standards rather than decrease levels of literacy,” pany, Dot Mobile, said in...
Bishops against death penalty
The US Bishops have issued a statement calling for an end to the use of the death penalty, part of their larger campaign to end the death penalty. I’m sympathetic to the thrust of the statement and to many of its claims. The statement makes its case firmly, yet invites dialogue and debate. It adverts to the Catechism of the Catholic Church, accurately reflecting the Church’s teaching on the matter. It pelling arguments against the death penalty on theological and...
Digital rights fiasco
The newest phase in the fight for digital/intellectual property rights involves the recent Digital Rights Management software from Sony. Apparently, Sony’s “protected” audio CDs have been installing a “rootkit” onto puter, and opening up puter to yet more malicious software on the Internet (as if it isn’t bad enough already without a Sony rootkit). There are a couple of things I want to say about this – first, a short description of exactly what the problem is; and secondly, a...
Faith in science
To expand the “scientist” as “priest” metaphor a bit, you may find it interesting to read what Herman Bavinck has to say on the fundamental place of “faith” with respect to all kinds of knowledge, including not only religious but also scientific: Believing in general is a mon way in which people gain knowledge and certainty. In all areas of life we start by believing. Our natural inclination is to believe. It is only acquired knowledge and experience that teach...
Don’t wait for government
This month’s Esquire magazine is the annual “Genius” issue (with Bill Clinton as the coverboy, which might seem strange until you realize that the word “genius” is related to the words “genii” and “jinn,” which in mythology were often negative spiritual beings, monly believed to be responsible for diseases and for the manias of some lunatics”). Speaking about the trouble with working through and for bureaucratic governments in his article “What I Did on My Summer Vacation: I Went to...
‘Your mind makes it real’
Check out this Marketplace story about real money being spent in the virtual world. modities of online gaming have real-world value to people, to the extent that a virtual island can cost upwards of $26,000 in the world of Project Entropia. This leads me to ask with the Matrix’s Morpheus: ‘What is “real”? How do you define “real”? If you’re talking about what you can feel, what you can smell, what you can taste and see, then “real” is simply...
“If it moves, tax it. If it keeps moving, regulate it. If it stops moving, subsidise it.”
Alan Anderson of the Sydney Morning Herald notes that Ronald Reagan’s joke about the Government’s view of the economy has e United Nations policy toward the internet. The Belmont Club blog notes that placing control of the Web into the hands of UN regulators will have far reaching negative consequences: One of the reasons the Internet has been so successful is that it has so far escaped the restraints of Filipino judges, Tunisian government officials and United Nations bureaucrats. Addresses...
The fair-trade fallacy
Let me quickly respond to this week’s Acton Commentary: While I agree in broad strokes with Dr. Larrivee’s analysis of the questionable assumptions of the fair trade movement, with respect to coffee in particular, I don’t agree that the problem is “low productivity in the countries in which farmers live.” I have previously argued that the source of the issue is in fact too much coffee, so that the market is saturated and cannot sustain high prices given the declining...
Lime green trickle down machine
At the the UN net summit in Tunis, MIT’s Nicholas Negroponte has showcased his hundred puter. The small, durable, lime colored, rubber-encased laptop is powered by a hand crank, and is designed to make technology more accessible to poor children in countries around the world. If I may speak of ‘trickle-down’ technology, this is the perfect example. This announcement–an announcement of a tool to help poor countries–may not be the best time to note the virtues of richer ones; and...
Run, don’t walk
Among the ways the UN’s World Food Programme (WFP) is going about attempting to raise public awareness of hunger issues is the use of “celebrity” athlete spokesmen. Paul Tergat, who won this year’s New York City Marathon, was a recipient of WFP aid when he was growing up in Kenya. Listen to a Morning Edition story on Tergat and the WFP here. Tergat is specifically the pitchman for the WFP’s Race Against Hunger project, targeted at about 300 million schoolchildren...
Related Classification
Copyright 2023-2025 - www.mreligion.com All Rights Reserved