Apple
vs.
FBI
San Bernardino
Terrorist Attack
12/2/15
› 14 civilians killed
› 22 civilians and 2
police officers
severely injured
› Second deadliest
mass shooting in CA
since 1984
› Deadliest US mass
shooting since 2012
Sandy Hook incident
› Worst terrorist attack
since 9/11
Couple fled.
Killed in a shoot out 4 hours later.
FBI declares counter-terrorism
investigation the next day.
The Dilemma
› The two attackers both
destroyed their
personal cell phones
before the attack
› However, the iPhone
5C of Farook issued to
him by his company
was recovered intact
› However the phone is
locked with a 4 digit
passcode
FBI wants
Apple’s help
Because if the wrong password is entered too
many times, the phone is locked and the data
can be potentially erased.
What does the FBI really want?
› New version of iOS that can be installed and run in Farook’s
phone RAM to disable certain built in security features
› This would allow a passcode to be inputted electronically
instead of manually and would make it easier to unlock an
iPhone using brute force methods (trying out millions of
passcode combos)
How did Apple react?
› Apple declined to help FBI in that case because it has policy to
never undermine product security features
› However they have already complied with FBI by provided
Farook’s iCloud storage files that were present a few weeks
before the attack
How did the FBI respond to that?
› Successfully applies to federal judge to issue court order under
the All Writs Act of 1789 (227 years old) so that Apple can create
and provide the requested software
All Writs Act of 1789
› A writ is basically a formal order that is issued by a court and
represents a sweeping legal gesture to issue orders
compelling people to do things, so long as it’s for a legal and
necessary reason.
› Part of the Judiciary Act of 1789 which was adopted during
the first session of the first US Congress and signed into law
by the first president, George Washington.
Data privacy
is a big deal.
All of your data is protected using
encryption. But the law has not kept
pace.
“This dispute concerns
whether or not the US
federal courts can compel
manufacturers to assist in
unlocking cell phones
whose contents are
cryptographically
protected”
Essentially the FBI is asking
Apple for a cheat code that
hackers could get access to.
First, it’s one iPhone.
Then it’s an Android.
Then it’s your data.
A MESSAGE TO OUR CUSTOMERS
The US Government has demanded
Apple takes an unprecedented
step that threatens the security of
all their customers. We oppose this
order, which has implications far
beyond the legal case at hand.
Apple Has A Lot of Support Already
(Reform Government Surveillance)
Edward
Snowden
NSA Whistleblower
› Has stated the FBI
already has the
technical means to
unlock Apple’s
devices
› FBI saying it can’t
unlock iPhone is
“bullshit”
“The global
technological
consensus is against
the FBI”
Our verdict?
While we believe the FBI has good
intentions, it would be terrible if the
government got hold of a backdoor to all
iOS based products. Such a demand
undermines the very freedom that our
government is meant to protect.
We stand with Apple.
How does iPhone Security work ?
Every iOS device
combines
software,
hardware, and
services
designed to
work together
for maximum
security and a
transparent user
experience.
How Text Messages are Received
Setting a Passcode
FBI and Security Risks
If backdoors are created for the FBI
› Companies a Apple and Facebook will receive similar
demands from other governments.
› Less trustworthy countries will demand access also.
“Is Apple more concerned with
protecting a dead ISIS terrorist’s
privacy over the security of the
American people?”
THANKS!
Any questions,
comments, or concerns?
Credits
Special thanks to all the people who made and released these awesome resources for
free:
› Presentation template by SlidesCarnival
› http://www.hbo.com/last-week-tonight-with-john-oliver
› https://www.wikiwand.com/en/2015_San_Bernardino_attack
› http://time.com/4262480/tim-cook-apple-fbi-2/
› http://www.huffingtonpost.com/entry/nbc-live-tv-images-san-bernardino-shooting-
suspects_us_5661d3bce4b072e9d1c5f047
› http://www.apple.com/customer-letter/
› http://fortune.com/2016/03/09/snowden-fbi-apple-iphone/
› http://www.popularmechanics.com/technology/a19483/what-is-the-all-writs-act-of-1789-the-225-
year-old-law-the-fbi-is-using-on-apple/
› https://www.youtube.com/watch?v=SGCSy2Ogoa4
› http://www.wired.com/2016/02/magistrate-orders-apple-to-help-fbi-hack-phone-of-san-
bernardino-shooter
› https://support.apple.com/en-us/HT204060
› http://ios.wonderhowto.com/how-to/disable-security-lockouts-from-too-many-failed-passcode-
attempts-your-iphone-0150884/
› https://www.apple.com/business/docs/iOS_Security_Guide.pdf
› http://9to5mac.com/2016/02/17/apple-fbi-court-order-method/
› http://www.newsmax.com/Newsfront/US-Apple-Encryption-End-Run/2016/02/17/id/714858/

Apple vs FBI on Data Privacy

  • 1.
  • 2.
    San Bernardino Terrorist Attack 12/2/15 ›14 civilians killed › 22 civilians and 2 police officers severely injured › Second deadliest mass shooting in CA since 1984 › Deadliest US mass shooting since 2012 Sandy Hook incident › Worst terrorist attack since 9/11
  • 3.
    Couple fled. Killed ina shoot out 4 hours later. FBI declares counter-terrorism investigation the next day.
  • 4.
    The Dilemma › Thetwo attackers both destroyed their personal cell phones before the attack › However, the iPhone 5C of Farook issued to him by his company was recovered intact › However the phone is locked with a 4 digit passcode
  • 5.
    FBI wants Apple’s help Becauseif the wrong password is entered too many times, the phone is locked and the data can be potentially erased.
  • 6.
    What does theFBI really want? › New version of iOS that can be installed and run in Farook’s phone RAM to disable certain built in security features › This would allow a passcode to be inputted electronically instead of manually and would make it easier to unlock an iPhone using brute force methods (trying out millions of passcode combos)
  • 7.
    How did Applereact? › Apple declined to help FBI in that case because it has policy to never undermine product security features › However they have already complied with FBI by provided Farook’s iCloud storage files that were present a few weeks before the attack
  • 8.
    How did theFBI respond to that? › Successfully applies to federal judge to issue court order under the All Writs Act of 1789 (227 years old) so that Apple can create and provide the requested software
  • 9.
    All Writs Actof 1789 › A writ is basically a formal order that is issued by a court and represents a sweeping legal gesture to issue orders compelling people to do things, so long as it’s for a legal and necessary reason. › Part of the Judiciary Act of 1789 which was adopted during the first session of the first US Congress and signed into law by the first president, George Washington.
  • 10.
    Data privacy is abig deal. All of your data is protected using encryption. But the law has not kept pace.
  • 11.
    “This dispute concerns whetheror not the US federal courts can compel manufacturers to assist in unlocking cell phones whose contents are cryptographically protected”
  • 12.
    Essentially the FBIis asking Apple for a cheat code that hackers could get access to. First, it’s one iPhone. Then it’s an Android. Then it’s your data.
  • 13.
    A MESSAGE TOOUR CUSTOMERS The US Government has demanded Apple takes an unprecedented step that threatens the security of all their customers. We oppose this order, which has implications far beyond the legal case at hand.
  • 14.
    Apple Has ALot of Support Already (Reform Government Surveillance)
  • 15.
    Edward Snowden NSA Whistleblower › Hasstated the FBI already has the technical means to unlock Apple’s devices › FBI saying it can’t unlock iPhone is “bullshit” “The global technological consensus is against the FBI”
  • 17.
    Our verdict? While webelieve the FBI has good intentions, it would be terrible if the government got hold of a backdoor to all iOS based products. Such a demand undermines the very freedom that our government is meant to protect. We stand with Apple.
  • 18.
    How does iPhoneSecurity work ? Every iOS device combines software, hardware, and services designed to work together for maximum security and a transparent user experience.
  • 19.
    How Text Messagesare Received
  • 20.
  • 22.
    FBI and SecurityRisks If backdoors are created for the FBI › Companies a Apple and Facebook will receive similar demands from other governments. › Less trustworthy countries will demand access also.
  • 23.
    “Is Apple moreconcerned with protecting a dead ISIS terrorist’s privacy over the security of the American people?”
  • 24.
  • 25.
    Credits Special thanks toall the people who made and released these awesome resources for free: › Presentation template by SlidesCarnival › http://www.hbo.com/last-week-tonight-with-john-oliver › https://www.wikiwand.com/en/2015_San_Bernardino_attack › http://time.com/4262480/tim-cook-apple-fbi-2/ › http://www.huffingtonpost.com/entry/nbc-live-tv-images-san-bernardino-shooting- suspects_us_5661d3bce4b072e9d1c5f047 › http://www.apple.com/customer-letter/ › http://fortune.com/2016/03/09/snowden-fbi-apple-iphone/ › http://www.popularmechanics.com/technology/a19483/what-is-the-all-writs-act-of-1789-the-225- year-old-law-the-fbi-is-using-on-apple/ › https://www.youtube.com/watch?v=SGCSy2Ogoa4 › http://www.wired.com/2016/02/magistrate-orders-apple-to-help-fbi-hack-phone-of-san- bernardino-shooter › https://support.apple.com/en-us/HT204060 › http://ios.wonderhowto.com/how-to/disable-security-lockouts-from-too-many-failed-passcode- attempts-your-iphone-0150884/ › https://www.apple.com/business/docs/iOS_Security_Guide.pdf › http://9to5mac.com/2016/02/17/apple-fbi-court-order-method/ › http://www.newsmax.com/Newsfront/US-Apple-Encryption-End-Run/2016/02/17/id/714858/