{"id":191499,"date":"2016-02-17T17:05:27","date_gmt":"2016-02-18T01:05:27","guid":{"rendered":"http:\/\/chinadigitaltimes.net\/?p=191499"},"modified":"2016-02-18T22:15:01","modified_gmt":"2016-02-19T06:15:01","slug":"waves-from-apples-battle-with-fbi-could-reach-china","status":"publish","type":"post","link":"https:\/\/chinadigitaltimes.net\/2016\/02\/waves-from-apples-battle-with-fbi-could-reach-china\/","title":{"rendered":"Waves from Apple vs. FBI May Reach China [Updated]"},"content":{"rendered":"
On Tuesday, a U.S. federal court ordered Apple to help the FBI gain access to an iPhone 5c<\/a> used by an attacker in December\u2019s San Bernardino shooting. In a technical analysis of the court\u2019s demands<\/strong><\/a> at Trail of Bits Blog (via Daring Fireball<\/a>), Dan Guido explains:<\/p>\n In plain English, the FBI wants to ensure that it can make an unlimited number of PIN guesses, that it can make them as fast as the hardware will allow, and that they won\u2019t have to pay an intern to hunch over the phone and type PIN codes one at a time for the next 20 years \u2014 they want to guess passcodes from an external device like a laptop or other peripheral. [Source<\/strong><\/a>]<\/p><\/blockquote>\n Apple, though, has vowed to resist the court order<\/strong><\/a>. CEO Tim Cook explained the decision in an open letter on the company\u2019s website:<\/p>\n We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.<\/p>\n [\u2026] The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.<\/p>\n [\u2026] The implications of the government\u2019s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone\u2019s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone\u2019s microphone or camera without your knowledge. [Source<\/strong><\/a>]<\/p><\/blockquote>\n The company has attracted strong criticism, with Republican presidential frontrunner Donald Trump asking \u201cwho do they think they are<\/a>?\u201d and Senator Tom Cotton accusing it of choosing \u201cto protect a dead ISIS terrorist\u2019s privacy over the security of the American people<\/a>.\u201d (See more responses via The Washington Post<\/a>.) But others have supported Apple. Announcing its intention to submit an amicus brief to that effect, the Electric Frontier Foundation commented that \u201ceven if you trust the U.S. government, once this master key is created, governments around the world will surely demand that Apple undermine the security of their citizens<\/a> as well.\u201d Spencer Ackerman reports at The Guardian<\/strong><\/a>:<\/p>\n Senator Ron Wyden of Oregon, a leading legislator on privacy and tech issues, warned the FBI to step back from the brink or risk setting a precedent for authoritarian countries.<\/p>\n \u201cThis move by the FBI could snowball around the world. Why in the world would our government want to give repressive regimes in Russia and China a blueprint for forcing American companies to create a backdoor?\u201d Wyden told the Guardian.<\/p>\n [\u2026] The impact of the mutual distrust between Washington and Beijing can be seen in China\u2019s new cybersecurity and counter-terrorism bill, passed last December. [See background at CDT<\/a>.] The far-reaching law mandates that internet firms and telecos doing business in China provide law enforcement with decryption keys in terrorism cases. Analysts and foreign firms are waiting to see how far China goes in enforcing the controversial measure, particularly in light of Apple\u2019s standoff with the FBI.<\/p>\n Last March, Obama personally objected to the Chinese law as a draconian measure that would force US firms to \u201cturn over to the Chinese government mechanisms where they can snoop and keep track of all the users of those services.\u201d Obama said he had personally raised the issue with Xi Jinping, his Chinese counterpart.<\/p>\n \u201cImagine how hollow these objections will ring if a US court can order what China was trying to compel by statute,\u201d said Greg Nojeim of the Center for Democracy and Technology. [Source<\/a><\/strong>]<\/p><\/blockquote>\n From Katie Benner and Eric Lichtblau at The New York Times<\/strong><\/a>:<\/p>\n [\u2026] Analysts say that the Chinese government does take cues from the United States when it comes to encryption regulations, and that it would most likely demand that multinational companies provide accommodations similar to those in the United States.<\/p>\n Last year, Beijing backed off several proposals that would have mandated that foreign firms provide encryption keys for devices sold in China after heavy pressure from foreign trade groups. Nonetheless, a Chinese antiterrorism law passed in December required foreign firms to hand over technical information and to aid with decryption when the police demand it in terrorism-related cases.<\/p>\n While it is still not clear how the law might be carried out, it is possible a push from American law enforcement agencies to unlock iPhones would embolden Beijing to demand the same. China would also most likely push to acquire any technology that would allow it to unlock iPhones. Just after Apple introduced tougher encryption standards in 2014, Apple users in China were targeted by an attack that sought to obtain login information from iCloud users. [Source<\/strong><\/a>]<\/p><\/blockquote>\n [Updated at 21:26 PST on Feb 18, 2016:<\/strong> The passage on China has now been removed from the New York Times article.]<\/p>\n The American Civil Liberties Union also protested that the ruling sets \u201ca dangerous precedent. If the FBI can force Apple to hack into its customers\u2019 devices, then so too can every repressive regime in the rest of the world<\/a>. Apple deserves praise for standing up for its right to offer secure devices to all of its customers.\u201d<\/p>\n Nicholas Weaver, a Berkeley-based computer security researcher involved in the unveiling of China\u2019s \u201cGreat Cannon\u201d cyberweapon<\/a> last year, warned that the case \u201cis not a tip-toe down a slippery slope but a direct leap into a dangerous world<\/strong><\/a>, one which would compromise all our security.\u201d While he found the request to Apple itself unobjectionable, he argued at Lawfare that the precedent would be \u201ccatastrophic,\u201d both domestically and internationally.<\/p>\n [\u2026 T]he problems don\u2019t end with the economic impact on US businesses. Every other foreign law enforcement and intelligence agency would demand the same access, pointing to the same precedent. At least for other countries, Silicon Valley may succeed in restricting these updates to only targets in the country giving the order. This still means that US travelers overseas would face greatly increased risk: a US based Lawfare reader could not install an OS update if touring France or Israel, as the DGSE or Unit 8200 could invoke the same authorities and precedents to attack what they would term a \u201clawful foreign intelligence target\u201d under French or Israeli domestic law.<\/p>\n The situation grows worse when one considers the \u201cAthens Affair<\/a>\u201d problem with law enforcement \u201cexceptional access\u201d mechanisms. What happens to US government systems if an adversary manages to surreptitiously gain access to Microsoft\u2019s [hypothetical] \u201cAll Writs Lawful Update\u201d mechanism in the same way that unknown attackers accessed Vodafone Greece\u2019s CALEA interface or the Chinese hacked Google for surveillance<\/a>? [Source<\/strong><\/a>]<\/p><\/blockquote>\n