Court-Ordered Access to Smart Phones: In Brief (CRS Report for Congress)
Premium Purchase PDF for $24.95 (10 pages)
add to cart or
subscribe for unlimited access
Pro Premium subscribers have free access to our full library of CRS reports.
Subscribe today, or
request a demo to learn more.
Release Date |
Feb. 23, 2016 |
Report Number |
R44396 |
Report Type |
Report |
Authors |
Finklea, Kristin M.;Thompson, Richard M., II;Jaikaran, Chris |
Source Agency |
Congressional Research Service |
Summary:
The tension between the benefits and challenges of encryption has been an issue for law enforcement and policymakers since the 1990s, and was reinvigorated in 2014 when companies like Apple and Google implemented automatic enhanced encryption on mobile devices and certain communications systems. Companies using such strong encryption do not maintain "back door" keys and, therefore, now cannot easily unlock, or decrypt, the devicesânot even when presented with a valid legal order. Law enforcement concerns about the lack of back door keys were highlighted by the November and December 2015 terrorist attacks in Paris, France, and San Bernardino, CA. Questions arose as to whether the attackers used strong encryption and, more importantly, if they did, whether and how this might have hindered investigations.
Following the December 2, 2015, terrorist attack in San Bernardino, CA,, U.S. investigators recovered a cell phone reportedly used by one of the shooters. Federal Bureau of Investigation (FBI) Director James B. Comey testified before Congress two months later, indicating that the Bureau was still unable to access the information on that device. On February 16, 2016, the U.S. District Court for the Central District of California ordered Apple to provide "reasonable technical assistance to assist law enforcement agents in obtaining access to the data" on the cell phone. The order directs Apple's assistance to feature three components:
bypass or disable the iPhone's auto-erase after 10 incorrect passcode attempts function (even if the function has not been enabled);
enable the FBI to electronically input passcodes for testing; and
ensure there is no added delay between passcode attempts.
The order is not for Apple to decrypt the device itself, something which Apple has publicly stated it cannot do. Instead, this order would enable the FBI to automate the attempts of every possible passcode for the device until the right combination of characters is hit upon by pushing a software update to the iPhone in question's operating system.
Apple is contesting the order, which will require the magistrate judge, and perhaps the district and appeals courts, to assess whether the All Writs Act (28 U.S.C. §1651) can be interpreted broadly to grant the relief the government seeks. The All Writs Act, enacted as part of the first Judiciary Act of 1789, provides a residual source of legal authority to federal judges to enforce the orders of their courts. Whether the All Writs Act can be read to include such an order will largely depend on two inquiries: first, whether a reviewing court would view the FBI's request as an "unreasonable burden" on Apple under the 1977 Supreme Court case United States v. New York Tel. Co.; and, second, whether such a command is consistent with the intent of Congress. This is a fact-intensive inquiry, the contours of which are uncertain.
Policymakers may ask a number of questions with respect to the order from the Central District of California and the larger ongoing encryption debate. Apple has indicated that it is possible to develop an alternate operating system for the iPhone in question that would accomplish the items in the court order. As such, a main question now is whether it should be done. Will doing so effectively create a "back door" to the encryption? What precedent might be set by Apple providing the court-ordered assistance? If Apple develops an alternate operating system to comply with this order, would Apple and other companies have to comply with similar requests in other law enforcement investigations? In addition, as a multinational corporation, would Apple need to comply with requests from other national governments?