The U.S. Justice Department, in a motion filed on Friday, accused Apple of “repudiating” the order ofMagistrate Judge Sheri Pym. The department dismissed the idea the FBI was seeking a “backdoor” into the iPhone, pointed out that Apple had previously complied with “a significant number of orders” related to the All Writs Act of 1789, and added Apple’s refusal to help “appears to be based on its concern for its business model and public brand marketing strategy.”
Apple, in a q-and-a posted on its website on Monday, denied it had ever unlocked an iPhone for law enforcement in the past and rejected the assertion its concerns were based on a business and marketing strategy. The company also urged the government to “withdraw its demands under the All Writs Act and … form a commission or other panel of experts on intelligence, technology, and civil liberties to discuss the implications for law enforcement, national security, privacy, and personal freedoms.”
Comey, in his blog post Sunday, said:
The particular legal issue is actually quite narrow. The relief we seek is limited and its value increasingly obsolete because the technology continues to evolve. We simply want the chance, with a search warrant, to try to guess the terrorist's passcode without the phone essentially self-destructing and without it taking a decade to guess correctly. That's it. We don't want to break anyone's encryption or set a master key loose on the land. I hope thoughtful people will take the time to understand that. Maybe the phone holds the clue to finding more terrorists. Maybe it doesn’t. But we can't look the survivors in the eye, or ourselves in the mirror, if we don't follow this lead.
Apple, in the q-and-a, also said the Apple ID linked to Farook’s iPhone 5c was changed soon after the government took possession of the device, and if that hadn’t happened, BuzzFeed reported, “a backup of the information the government was seeking may have been accessible.”
Here’s more from the BuzzFeed story:
The Apple executives said the company had been in regular discussions with the government since early January, and that it proposed four different ways to recover the information the government is interested in without building a backdoor. One of those methods would have involved connecting the iPhone to a known Wi-Fi network and triggering an iCloud backup that might provide the FBI with information stored to the device between the October 19th and the date of the incident.
Apple sent trusted engineers to attempt that method, the executives said, but they were unable to do it. It was then that they discovered that the Apple ID password associated with the iPhone had been changed sometime after the terrorist’s death — within 24 hours of the government taking possession of the phone. By changing the password, the government foreclosed its ability to obtain a fresh copy of the most recent device data via this back-up-to-known-wifi method.
The password was reportedly reset accidentally by the San Bernardino Health Department. The FBI acknowledged the password change, but downplayed its impact.
Apple’s lawyers are expected to file the company’s formal response to Pym’s order by next Friday.