Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Apple vs FBI

Apple vs FBI

Research Presentation 2 for CSC 405.
Spring 2016.

Frances Coronel

March 22, 2016
Tweet

More Decks by Frances Coronel

Other Decks in Technology

Transcript

  1. San Bernardino Terrorist Attack 12/2/15 › 14 civilians killed ›

    22 civilians and 2 police officers severely injured › Second deadliest mass shooting in CA since 1984 › Deadliest US mass shooting since 2012 Sandy Hook incident › Worst terrorist attack since 9/11
  2. Couple fled. Killed in a shoot out 4 hours later.

    FBI declares counter-terrorism investigation the next day.
  3. The Dilemma › The two attackers both destroyed their personal

    cell phones before the attack › However, the iPhone 5C of Farook issued to him by his company was recovered intact › However the phone is locked with a 4 digit passcode
  4. FBI wants Apple’s help Because if the wrong password is

    entered too many times, the phone is locked and the data can be potentially erased.
  5. What does the FBI really want? › New version of

    iOS that can be installed and run in Farook’s phone RAM to disable certain built in security features › This would allow a passcode to be inputted electronically instead of manually and would make it easier to unlock an iPhone using brute force methods (trying out millions of passcode combos)
  6. How did Apple react? › Apple declined to help FBI

    in that case because it has policy to never undermine product security features › However they have already complied with FBI by provided Farook’s iCloud storage files that were present a few weeks before the attack
  7. How did the FBI respond to that? › Successfully applies

    to federal judge to issue court order under the All Writs Act of 1789 (227 years old) so that Apple can create and provide the requested software
  8. All Writs Act of 1789 › A writ is basically

    a formal order that is issued by a court and represents a sweeping legal gesture to issue orders compelling people to do things, so long as it’s for a legal and necessary reason. › Part of the Judiciary Act of 1789 which was adopted during the first session of the first US Congress and signed into law by the first president, George Washington.
  9. Data privacy is a big deal. All of your data

    is protected using encryption. But the law has not kept pace.
  10. “This dispute concerns whether or not the US federal courts

    can compel manufacturers to assist in unlocking cell phones whose contents are cryptographically protected”
  11. Essentially the FBI is asking Apple for a cheat code

    that hackers could get access to. First, it’s one iPhone. Then it’s an Android. Then it’s your data.
  12. A MESSAGE TO OUR CUSTOMERS The US Government has demanded

    Apple takes an unprecedented step that threatens the security of all their customers. We oppose this order, which has implications far beyond the legal case at hand.
  13. Edward Snowden NSA Whistleblower › Has stated the FBI already

    has the technical means to unlock Apple’s devices › FBI saying it can’t unlock iPhone is “bullshit” “The global technological consensus is against the FBI”
  14. Our verdict? While we believe the FBI has good intentions,

    it would be terrible if the government got hold of a backdoor to all iOS based products. Such a demand undermines the very freedom that our government is meant to protect. We stand with Apple.
  15. How does iPhone Security work ? Every iOS device combines

    software, hardware, and services designed to work together for maximum security and a transparent user experience.
  16. FBI and Security Risks If backdoors are created for the

    FBI › Companies a Apple and Facebook will receive similar demands from other governments. › Less trustworthy countries will demand access also.
  17. “Is Apple more concerned with protecting a dead ISIS terrorist’s

    privacy over the security of the American people?”
  18. Credits Special thanks to all the people who made and

    released these awesome resources for free: › Presentation template by SlidesCarnival › http://www.hbo.com/last-week-tonight-with-john-oliver › https://www.wikiwand.com/en/2015_San_Bernardino_attack › http://time.com/4262480/tim-cook-apple-fbi-2/ › http://www.huffingtonpost.com/entry/nbc-live-tv-images-san-bernardino-shooting- suspects_us_5661d3bce4b072e9d1c5f047 › http://www.apple.com/customer-letter/ › http://fortune.com/2016/03/09/snowden-fbi-apple-iphone/ › http://www.popularmechanics.com/technology/a19483/what-is-the-all-writs-act-of-1789-the-225- year-old-law-the-fbi-is-using-on-apple/ › https://www.youtube.com/watch?v=SGCSy2Ogoa4 › http://www.wired.com/2016/02/magistrate-orders-apple-to-help-fbi-hack-phone-of-san- bernardino-shooter › https://support.apple.com/en-us/HT204060 › http://ios.wonderhowto.com/how-to/disable-security-lockouts-from-too-many-failed-passcode- attempts-your-iphone-0150884/ › https://www.apple.com/business/docs/iOS_Security_Guide.pdf › http://9to5mac.com/2016/02/17/apple-fbi-court-order-method/ › http://www.newsmax.com/Newsfront/US-Apple-Encryption-End-Run/2016/02/17/id/714858/