The government's impatience is evident in its third filing asking for Apple's cooperation in unlocking the iPhone used by one of the San Bernardino terrorists. The document is a point-by-point rebuttal that reads like the government taking a final, very deep breath before it completely loses its temper.
Siri, Cortana Are Listening: How 5 Digital Assistants Use Your Data
First discovered by the The Verge, the document is a point-by-point rebuttal that reads like the government is taking a final, very deep breath before it completely loses its temper.
"[Apple] -- which grosses hundreds of billions of dollars a year -- would need to set aside as few as six of its 100,000 employees for perhaps as little as two weeks," it stated. "This burden, which is not unreasonable, is the direct result of Apple's deliberate marketing decision to engineer its products so that the government cannot search them, even with a warrant."
The filing further goes on to color Apple as a child having a tantrum, trying every argument to get its way.
Gain insight into the latest threats and emerging best practices for managing them. Attend the Security Track at Interop Las Vegas, May 2-6. Register now!
"The government and the community need to know what is on the terrorist's phone … Instead of complying, Apple attacked the All Writs Act as archaic, the Court's Order as leading to a 'police state,' and the FBI's investigation as shoddy, while extolling itself as the primary guardian of America's privacy."
The government also takes a jab at Apple's "amici," the 15 tech companies that filed a friends of the court brief in support of Apple's stance.
"Apple and its amici try to alarm this Court with issues of network security, encryption, back doors, and privacy, invoking larger debates before Congress and in the news media. That is a diversion," stated the filing. "Apple desperately wants -- and desperately needs -- this case not to be 'about one isolated iPhone.' But there is probable cause to believe there is evidence of a terrorist attack on that phone, and our legal system gives this Court the authority to see that it can be searched pursuant to a lawful warrant … even if Apple would rather its products be warrant-proof."
While Apple has argued that building the software tool the FBI is requesting would set a "precedent" for many, many more cases to come, the government reigned in the issue, related to the "terrorist mass murder of 14 Americans."
"Apple alone can remove those barriers so that the FBI can search the phone, and it can do so without undue burden," wrote the government. "Under those specific circumstances, Apple can be compelled to give aid. That is not lawless tyranny. Rather, it is ordered liberty vindicating the rule of law."
Apple's vice president and general counsel Bruce Sewell told reporters that the brief "reads like an indictment," The New York Times reported.
"In 30 years of practice," Sewell continued, "I don't think I've ever seen a legal brief that was more intended to smear the other side with false accusations and innuendo."
This is the third motion the prosecution has filed (the first two came Feb. 16 and Feb 19) insisting that Apple help it unlock Farook's iPhone, which was running iOS 9. With iOS 8, and later versions of its mobile software, Apple made data encryption the default mode, making a device's data inaccessible to anyone without its password.
The Verge article noted that the FBI has been criticized for resetting the iCloud password after obtaining the device, but the FBI has testified that Farook "reset the password three days after the final backup, potentially cutting off any subsequent backups."
Michelle Maisto is a writer, a reader, a plotter, a cook, and a thinker whose career has revolved around food and technology. She has been, among other things, the editor-in-chief of Mobile Enterprise Magazine, a reporter on consumer mobile products and wireless networks for ... View Full Bio
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.