Apple’s Tim Cook Warns Obama’s FBI Is Trying To “Backdoor” iPhone Security Protection

Apple CEO, Tim Cook, warns Apple customers, and Americans in general, that Obama's FBI is out of control, seeking to circumvent security protections put into iPhones and other Apple products in reaction to customer demands, following the revelations that Bush and Obama regimes regularly collected data from phones and computers of all Americans. Now, Obama's regime seeks to strike back against Apple and other companies, demanding that the increased encryption and security protections added over the last few years be made once again vulnerable to government intrusions. As Apple and other companies have argued, in addition to the risk of government abuses of power presented by creating backdoors to smartphone and computer security, the intentional vulnerabilities make it easier for hackers to gain access to the devices as well.
In “A Message to our Customers”, Apple’s CEO, Tim Cook, pushed back against Barack Obama’s FBI, which is demanding, through a court order, that Apple provide the federal government with a “backdoor” to the iPhone’s operating system security. This demand comes in relation to the FBI investigation into last December’s San Bernardino terrorist case.

Cook warned:
“Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.”
Cook indicated the FBI is really looking to add a backdoor to enable the feds to bypass iPhone security protection:

“The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.”

The language of the court document puts it this way, explaining specifically what Apple is being ordered to do by Obama’s government:
“Apple’s reasonable technical assistance shall accomplish the following three important functions: (1) it will bypass or disable the auto-erase function whether or not it has been enabled; (2) it will enable the FBI to submit passcode to the SUBJECT DEVICE for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available on the SUBJECT DEVICE; and (3) it will ensure that when the FBI submits passcode to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware.”
Maybe more concerning than the specific technical demands by the government in this matter, is the legal method the court is employing to justify the FBI’s demand to Apple. Cook, describing this method as “A Dangerous Precedent”, says:
“Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority…the implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.”
Anyone who thinks Barack Obama is somehow different from George W. Bush when it comes to anti-Constitutional contempt for the freedom and privacy of American citizens, need only examine the plentiful and plain evidence to the contrary, including this particularly egregious attempt by the FBI to set up a standing power to infringe the Fourth Amendment. That is in addition to the threat posed from widespread hacking by Apple creating an intentional security vulnerability in its products.

Comments