{"id":143159,"date":"2014-09-19T12:01:57","date_gmt":"2014-09-19T16:01:57","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/volokh-conspiracy-apples-dangerous-game.php"},"modified":"2014-09-19T12:01:57","modified_gmt":"2014-09-19T16:01:57","slug":"volokh-conspiracy-apples-dangerous-game","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/fourth-amendment-2\/volokh-conspiracy-apples-dangerous-game.php","title":{"rendered":"Volokh Conspiracy: Apples dangerous game"},"content":{"rendered":"<p><p>        Apple has announced that it has designed its new operating    system, iOS8, to thwart lawful search warrants. Under Apples    old operating system, if an iPhone is protected by a passcode    that the government cant bypass, the government has to send    the phone to Apple together with a search warrant. Apple will    unlock at least some of the contents of the phone pursuant to    the warrant. Under the new operating system, however, Apple has    devised a way to defeat lawful search warrants. Unlike our    competitors,     Apples new privacy policy boasts, Apple cannot bypass    your passcode and therefore cannot access this data. Warrants    will go nowhere, as its not technically feasible for [Apple]    to respond to government warrants for the extraction of this    data from devices in their possession running iOS 8. Anyone    with any iPhone can download the new warrant-thwarting    operating system for free, and it comes automatically with the    new iPhone 6.  <\/p>\n<p>    I find Apples new design very troubling. In this post, Ill    explain why Im troubled by Apples new approach coded into    iOS8. Ill then turn to some important legal issues raised by    Apples announcement, and conclude by thinking ahead to what    Congress might do in response.  <\/p>\n<p>    Lets begin with a really important point: In general,    cryptography is an awesome thing. Cryptography protects our    data from hackers, trespassers, and all sorts of wrongdoers.    Thats hugely important. And under Apples old operating    system, cryptography protects iPhones from rogue police    officers, too. Thanks to the Supreme Courts recent decision in        Riley v. California, the Fourth Amendment requires a    warrant to search a cell phone. Apples old operating system    effectively enforced the warrant requirement technologically by    requiring the government to serve a warrant on Apple to decrypt    the phone.  <\/p>\n<p>    Up to that point, I think its all good. But the design of    Apples new operating system does something really different.  <\/p>\n<p>    If I understand how it works, the only time the new design    matters is when the government has a search warrant, signed by    a judge, based on a finding of probable cause. Under the old    operating system, Apple could execute a lawful warrant and give    law enforcement the data on the phone. Under the new operating    system, that warrant is a nullity. Its just a nice piece of    paper with a judges signature. Because Apple demands a warrant    to decrypt a phone when it is capable of doing so, the only    time Apples inability to do that makes a difference is when    the government has a valid warrant. The policy switch doesnt    stop hackers, trespassers, or rogue agents. It only stops    lawful investigations with lawful warrants.  <\/p>\n<p>    Apples design change one it is legally authorized to make, to    be clear. Apple cant intentionally obstruct justice in a    specific case, but it is generally up to Apple to design its    operating system as it pleases. So its lawful on Apples part.    But heres the question to consider: How is the public    interest served by a policy that only thwarts lawful search    warrants?  <\/p>\n<p>    The civil libertarian tradition of American privacy law,    enshrined in the Fourth Amendment, has been to see the warrant    protection as the Gold Standard of privacy protections. The    government cant invade our private spaces without a showing    that the invasion is justified by the expectation that the    search will recover evidence. And the government must go to a    neutral magistrate and make that case before it conducts the    search. When the government cant make the showing to a neutral    judge, the thinking runs, the public interest in privacy    outweighs the public interest in solving crime. But when the    government does make that showing, on the other hand, the    public interest in solving crime outweighs the privacy    interest. Thats the basic balance of the Fourth Amendment,    most recently found in the stirring civil libertarian language    in Riley just a few months ago.  <\/p>\n<p>    Apples new policy seems to thumb its nose at that great    tradition. It stops the government from being able to access    the phone precisely when it has a lawful warrant signed by a    judge. Whats the public interest in that?  <\/p>\n<p>    One counterargument I have heard is that there are other ways    the government can access the data at least some of the time.    With the warrant required under Riley, agents could    take a stab at guessing the passcode. Perhaps the phones owner    used one of the popular passwords; according to     one study, the top 10 most often-used passcodes will unlock    about 15% of phones. Alternatively, if the phones owner has    backed up his files using iCloud, Apple will turn over whatever    has been backed up pursuant to a lawful warrant.  <\/p>\n<p>    These possibilities may somewhat limit the impact of Apples    new policy. But I dont see how they answer the key question of    whats the public interest in thwarting valid warrants. After    all, these options also exist under the old operating system    when Apple can comply with a warrant to unlock the phone. And    while the alternatives may work in some cases, they wont work    in other cases. And that brings us back to how its in the    public interest to thwart search warrants in those cases when    the alternatives wont work. Id be very interested in    the answer to that question from defenders of Apples policy.    And Id especially like to hear an answer from Apples General    Counsel, Bruce    Sewell.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/feeds.washingtonpost.com\/c\/34656\/f\/636635\/s\/3e9f38dd\/sc\/4\/l\/0L0Swashingtonpost0N0Capples0Edangerous0Egame0C20A140C0A90C190C65a283ed0Ef6e10E45680E80Ab50E1dcb74b0A3cff0Istory0Bhtml0Dwprss0Frss0Inational\/story01.htm\/RK=0\/RS=Ef_JaqMkFrXq8_VDTTsnd42YvRg-\" title=\"Volokh Conspiracy: Apples dangerous game\">Volokh Conspiracy: Apples dangerous game<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Apple has announced that it has designed its new operating system, iOS8, to thwart lawful search warrants. Under Apples old operating system, if an iPhone is protected by a passcode that the government cant bypass, the government has to send the phone to Apple together with a search warrant. Apple will unlock at least some of the contents of the phone pursuant to the warrant <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/fourth-amendment-2\/volokh-conspiracy-apples-dangerous-game.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261461],"tags":[],"class_list":["post-143159","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/143159"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=143159"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/143159\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=143159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=143159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=143159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}