Home
/
RELIGION & LIBERTY ONLINE
/
Explainer: Apple’s Fight with the FBI Over iPhone Encryption
Explainer: Apple’s Fight with the FBI Over iPhone Encryption
Jan 20, 2026 6:49 AM

What is the issue about?

In December, 14 people were killed and 22 were seriously injured in a terrorist attack in San Bernardino, California. The two terrorists, Syed Rizwan Farook and Tashfeen Malik, were later killed in a shootout with police. Law enforcement recovered Farook’s iPhone 5c, which they believe may contain information relevant to the terror investigation.

Farook’s iPhone is protected by a passcode set to wipe the contents of the smartphone after 10 attempts to log in with the wrong code. A federal court in California has ordered Apple to “provide reasonable technical assistance” by either creating a special version of the operating system that’s currently on Farook’s phone, in order to disable the 10-try maximum and allow puter to connect to the phone and guess every possible passcode, or to provide an alternative means of accessing the phone.

The Obama administration defended the Justice Department’s request Wednesday, vowing that the government would solely use the new program on Farook’s phone.

Apple is currently refusing ply with the request. Apple CEO Tim Cook issued a statement, “A Message To Our Customers”, in which he says, “The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.”

What is the case plying with the order?

Opponents of the order fear that it gives the government power over the smartphone’s encryption technology by building a “backdoor” to the iPhone. As Tim Cook claims,

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limitedto this case, there is no way to guarantee such control.

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

Google CEO Sundar Pichai agreed with Cook, saying on Twitter that forcing panies to hack users’ devices “could be a troubling precedent.”

Many privacy rights groups have also weighed in, claiming that, once created, this “backdoor” could be exploited by criminals or abused by the government.

What is the case plying with the order?

Advocates plying with the order claim that the fears of critics are overblown and that Apple is merely grandstanding to ingratiate themselves with privacy-rights advocates.

As Gabriel Malor explains, until this week, no one claimed that removing the auto-erase and delay features of passcodes constituted a “backdoor.” “Uses of the term to refer to the order in this case are thus misleading,” says Malor. “This order does not require Apple to hand over a key to its encryption that could be used on other devices.”

Malor also says this case would not set a new precedent since it already relies on an old precedent:

The All Writs Act derives from the Founders’ acknowledgment that sometimes courts require aid from third parties to administer justice. To the extent that Apple and other phone manufactures worry they may be asked to help law enforcement in the future, the Supreme Court set that precedent in a 1977 case calledUnited States v. New York Telephone Co.

Gus Hurwitz says that Apple’s refusal actually does more harm than good for the privacy-rights cause:

Cook’s concerns at best overstate the threat, and by doing so make it harder rather than easier to get some consensus around legitimately difficult but very important issues: the ongoing technological disruption of the delicate relationship between individuals and the state — between privacy and liberty on the one hand, and security on the other.

Hurwitz also explains why we should not be concerned about this issue:

Contrary to Tim Cook’s concerns, courts do not have plenary authority to “intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.” And, where they may have some authority to authorize such conduct, it is limited at least by the 4th Amendment and usually limited even further by statute. The All Writs Act doesn’t expand a court’s authority — it only allows them to exercise what authority they clearly do have, including mandeering the assistance of those who would otherwise deliberately obstruct a lawful court order.

Charles Krauthammer adds,“The grandstanding that Apple is doing I think is deplorable.” He says the solution is simple: “What you do is, you go to Apple and you say, ‘Look, you take this, you take this one phone, you open it wherever you want, in some secret lab, underwater, off the Pacific Isles, all we want is the information. If you like, you can incinerate the phone after all this is done — give us the information.”

Is there a way to resolve the issue?

Apple will appeal the case, but will likely lose the legal battle and may be forced ply with the order.

However, an alternative solution has beenoffered by John McAfee, the controversial cybersecurity expert who is running for president as a member of the Libertarian Party. McAfee says,

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

Comments
Welcome to mreligion comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
RELIGION & LIBERTY ONLINE
PowerBlog Updates
Taking a cue from No Straw Men, I’m updating the look and feel of the Acton PowerBlog. Jonathan Rick suggests pletely separating your blog from your organization’s main Web site is a bad idea because you cut off access to useful information and create two distinct audiences rather than integrating traffic between two distinct sections of one Web site. Acton’s blog has always been on the same domain as the main Acton site (www.acton.org) but we’ve recently given the blog...
A Heartwarming Story for Thanksgiving
Thanks to Rob Chaney at the Missoulian, the touching story of young Caden Stufflebeam is told. Chaney wrote a piece titled, “Rocks to riches: Missoula boy sells stones he finds to buy food for needy.” Appropriately noted as the top story for the paper in Missoula, Mont., Caden has been collecting and selling rocks and donating the proceeds to the less fortunate. The young boy is filled with an abundance of generosity and spiritual knowledge. Christ declared in Matthew, “I...
2008 Novak Award Nominations Being Accepted
The nomination process has begun for the international 2008 Novak Award. Named after theologian Michael Novak, this $10,000 award rewards new outstanding research into the relationship between religion and economic liberty. Over the past seven years, this award has been given to young, promising scholars throughout the world. To nominate an emerging scholar, plete the online form. We encourage professors, university faculty, and other scholars to nominate those who pleting exceptional research into themes relevant to the mission and vision...
No Plan? No Problem
The Cato Institute and Randal O’Toole offer an appealing new book, The Best Laid Plans—a recounting of the failures of government planning. Think of it as extensive documentation of the truth Hayek observed half a century ago: it is impossible for a central authority to collect all the information or make all the predictions necessary to foresee how economic activity will play out. Therefore, it is impossible to plan centrally the operation of major sectors of the economy such as...
Reports on Globalization and National Capital
Last month the World Bank published a report titled, “Where is the Wealth of Nations?” (HT: From the Heartland). The report describes estimates of wealth and ponents for nearly 120 countries. The book has four sections. The first part introduces the wealth estimates and highlights the level position of wealth across countries. The second part analyzes changes in wealth and their implications for economic policy. The third part deepens the analysis by considering the importance of human and institutional capital,...
Alarmism and Corruption
Regis Nicoll over at The Point notes a WaPo story that is getting a lot of play on the blogosphere about the UN’s downgrade of the estimate of the extent of the AIDS epidemic, “U.N. to Cut Estimate Of AIDS Epidemic: Population With Virus Overstated by Millions.” Nicoll writes that while of course it is good news that fewer people are infected than were previously thought, “The bad news is that previous estimates were inflated because of politics, bad science,...
Wichita Business Journal: The Call of the Entrepreneur
Pat Sangimino wrote an article for the Wichita Business Journal titled, “Documentary seeks to dispel negative images of entrepreneurs ” (subscription required). A premiere of The Call of the Entrepreneur took place in Wichita, Kan., on November 14th. Sangimino noted in his piece: Some consider Wichita to be the Midwest’s cradle of entrepreneurship. Evidence of that is the original Pizza Hut building, which was moved to the Wichita State University campus in 1984 to serve as a reminder of what...
Latin America’s Messengers for Recycled Marxism
An assortment of radical socialist chums gathered in Caracas, Venezuela for a lively discussion on the issue, “United States: A possible revolution.” The event was part of the third annual Venezuela International Book Fair on November 9-18, and featured the usual campus radicals, anti-American crusaders, and Marxist activists. As usual mitted Marxists, the main target of evil and oppression in the world is the United States. Writing a summary of events for the Militant, Olympia Newton’s article is titled, “Venezuela...
A Puritan Legacy
There’s no better time to re-examine the legacy of the Puritans than on the Thanksgiving holiday, which is so closely associated with the Pilgrim’s exodus to America in 1621. With that in mind, here are a few resources for understanding the worldview that Max Weber called a “worldly asceticism.” “Eat, Drink, and Relax: Think the Pilgrims would frown on today’s football-tossing, turkey-gobbling Thanksgiving festivities? Maybe not.” Christian History & Biography.“History and Theology of the Puritans.” The Shepherd’s Scrapbook (links to...
On History, Education, and Great Books
Does a good education demand an appreciation for history? It would seem so. What arguments are there to support such a contention? Neil Postman writes, There is no escaping ourselves. The human dilemma is as it always has been, and it is a delusion to believe that the future will render irrelevant what we know and have long known about ourselves but find it convenient to forget. In quoting this passage from Postman’s Building a Bridge to the Eighteenth Century,...
Related Classification
Copyright 2023-2026 - www.mreligion.com All Rights Reserved