comparemela.com
Home
Live Updates
Transcripts For CSPAN2 The Communicators 20160229 : comparem
Transcripts For CSPAN2 The Communicators 20160229 : comparem
Transcripts For CSPAN2 The Communicators 20160229
Capable of opening hundreds of millions of locks. Guest i think there is a lot of hyperbole in mr. Cooks letter. The existence, we like the analogy. The truth is when you look at physical world, all sorts of private information exists in the physical world, medical records, business records. Where those records are stored
Law Enforcement
with a warrant can access that evidence. It is available. There are keys to physical doors. There are keys to safe deposit boxes and also, private companies are required to comply with warrants in order to access even locked physical devices n this instance theyre, the fbi is asking for, asking for with a magistrates order apple to simply unlock their own device. This is technology, these are technical means they have admitted that they have at their disposal already. Guest if i could push back on that though. That is different. Were not asking them to unlock a device. They do not have right now a key in their position. What is being asked of them they build code to break their device. In other words that they actively create a way that they can access their device and make it less secure. Thats different. A warrant entitles you to search a place. It doesnt entitle someone, doesnt entitle you to get something. It entitles you to access if access is possible. Thats different than saying, oh, im going to actually make you build a vulnerability that can be reproduced or asked for by china or illicitly asked or, illicitly accessed by hacker. Guest on that point, chris, one of the things doj is saying, this is not a broader attempt to break encryption. This is really sort of reviving this encryption debate but they said we want to disable nonencryption barriers, auto deletes on the pass code. This is more narrowly tailored request. How do you push back when they say this is one time thing for one phone, were not undermining encryption. This is access and apple keep custody of the code they write . Guest it is true were not breaking encryption by doing this, but were breaking security features of the phone. I think policy debate got broader than just encryption versus not encryption. Thats the first point. I think reality there is already 12 cases outstanding where the fbi is asking them to do this in other cases. The reality if we set this precedent now we are going to be setting a precedent where i can get your help whether you want to give it to me or not, to turn your device into either something that can be accessed by the government or a listening device. I think that we dont want to precedent where the government is able to force people to turn devices we rely on into spies on us. Guest i think that is a significant overstatement of what the risk is here. What were describing here is the normal operation of the
Fourth Amendment
for hundreds of years which is that even the moss private areas, the most private locations, can be accessed with a warrant, with, were not talking about mass surveillance. Were not talking about government turning devices into listening devices. Were talking about
Court Supervised
warrants and ability to access evidence. The question people need to have what is the alternative . These devices have been intentionally designed to be impenetrable by normal
Legal Process
. That is not the way our system is designed to operate. That is a choice that apple and these companies have made for largely business reasons. And there is no question, he is correct, there is both an individual instance that were dealing with with the phone that was used by the san bernanadino terrorists. There is a larger question whether these companies should be able to mass
Market Technology
intentionally designed to frustrate the legal pros es. Guest to be clear, it is knot intentionally designed to frustrate the
Law Enforcement
. It is designed to be safe and secure for personal users. Whether it is your bank access, whether pin numbers, personal information about you, all your emails, theyre designing it to be safe, to be impenetrable not from
Law Enforcement
but everyone to say secure in our digital word. Host is this different than looking from somebodys emails going to jordan, per se . Guest that is book a different set of laws. There is different angle on policy debate. What is one that is valuable policy debate but i think it is important to note that these companies were and able to and did work with
Law Enforcement
for years in responding to
Legal Process
. To say that this was not intentionally designed to frustrate
Law Enforcement
i believe is misleading. In the announcement of this, part of the announcement and rollout of this technology was a declaration they would no longer work with
Law Enforcement
on these. This is the experience that our agents have had in the field where even outreach to these entities to participate in discussions on these topics have been met with the claim, that, from apple was met with silence and from google was met with a claim they would only respond to
Legal Process
. So were, we are at this location because we were forced to be here by these
Companies Business
decisions. Guest talk about
Legal Process
though. Is there any concern that the statute, the law is government is relying on in this case goes back to our founding, centuries old, that is the legal rationale theyre currently using in this debate . Guest i dont think so, the all writs act, talks to procedures available to the court to enforce a warrant and been applied to modernize
Technology Many
times over the years. This is not the first time it has been used with a technology that didnt exist with the time the all writs act was enacted. It has been applied to security video, applied to credit card records. None of those existed in the 18th century. Guest it is pretty wideranging change now. While i agreed we clearly applied the all writs act in the past, this is make no mistake, this is policy dispute. Were deciding if we decide to allow access of this type, a
Magistrate Court
would essentially be saying there is little or no argument to keep china from doing this exact same thing. There is little or no discussion of who else might be able to access this or, will the security implications of creating a book door that might be misused by hacker. So this goes far beyond what a magistrate can honestly grapple with in the course of interpreting the all writs act to a sea change around privacy and security of our device. Host what exactly is the all writs act . Guest the all writs act is 1789 statute that essentially says you must give assistance to lewd enforcement when they come to you with a warrant and essentially producing information on that warrant but thats a little bit different. What we have here is not just assistance, not the landlord uses his key. Its the landlord drills a hole in the safe, or worse yet, the safe company is required to put a backdoor lock on their safe that
Law Enforcement
can use to open. So were taking a substantial set beyond assisting in pursuit of a warrant to essentially rebuilding security and access control. Guest but we do have to ask the question what the alternative is . We can debate, there are a variety of mechanisms that exist to address this issue. There are split key options. There are backdoor master key, whatever you choose to characterize. There are a range of options. However right now none of those options have been used and what is true is that these devices are locked to
Law Enforcement
. Apple is refusing to comply with this and other warrants. As a result, those phones act as active safe havens for people who want to conduct criminal activity. How valuable is this phone . This was county owned work phone owned by syed farook one of the shooters in the attack. He and his wife devoid them. They dropped other electronics in a lake. They went to
Great Lengths
to cover their tracks elsewhere. This is countyowned phone. Do you believe this is that important to investigators . Guest i believe we have a
Fourth Amendment
process we dont force people to answer the question before you have seen the evidence. If you have probable cause and obtain a lawful warrant, that you look for the evidence then. The whole point we dont know whats on that phone. So pointing to that lack of knowledge as evidence that we shouldnt see whats on that phone turns warrant system on its head. Guest i do think it is worth acknowledging here while it is fine to say we should have this debate the reality there is vastly more
Information Available
to the fbi now than there was 20 years ago, vastly more. We are communicating in texts. We are sending, hundreds or thousands of emails a day. All of this information is out there, much of it is accessible not on the phone but in the cloud and other devices. So when we say, we need information to build a criminal case,
Location Information
is available routinely, the reality is that we have a ton of information. What were saying is that in a very narrow case when other security interests are at stake we may not have universal access to all information because were potentially recall haing the security of every phone, everyone who hold as phone. Host critical la brees, do you have a problem with mr. Critical la brees, to you have a problem with mr. Farooks cloud being addressed . There is question of
Legal Standard
. Right now the
Legal Standard
for accessing information in the cloud is not a warrant. The law that deals with that is very out of date. There is a bill before congress that would update that. It is being held up by civil agencies and
Law Enforcement
interests. We can actually have a question about what the right standard is. Accessible with a warrant . We dont have a problem. Guest glad you brought up that law. Fbi executes wants for all that, even though it is not required under the
Electronic Communications
privacy act. The fbi uses warrant for all content. We have serious questions about other aspects of that law. The discussion of electronic privacy law like the law chris mentions provide a very useful tool to have that this discussion. If you dont think all writs act is the proper tool, if people have concerns the fact, yes, there are broader ways to access this information, so creating this tool for even cyber criminals, which is, one impenetrable tool in a tool of accessible information, we think that debate should be, should be joined by congress and that legislation would provide ample opportunity of that discussion. Based on what you know of the case and your expertise, do you believe investigators made a mistake telling
San Bernardino
county to reset the apple i. D. Password on a phone in a way that precluded another attempt at backing up that data on the cloud that would have been available . Did they make a mistake . Guest im far removed from every detail how apple conducts backups. I still cant get rid of that u2 album off my itunes. There is fact all dispute between fbi and apple how that exactly played out. It is a separate question from the one presented here. Should apple comply with that magistrates order or not. Guest i think there is no question they made a mistake. To be fair every investigation will not be conduct the perfectly. Putting that aside i think reality is, if we have a device that is likely not going to con an taken useful information, that could have been accesses without this mistake, access that information, this really the hill that we want to create a huge new precedental louing, to allow
Law Enforcement
to build weaknesses and backdoors into devices . I think it is not. I think this discussion should go to congress and continue on past this court proceeding. Despite those issues that you raiseed, people came out on monday pew came out on monday, one poll, some polling may have different polling with different numbers, in this poll, 51 side with the fbi. 38 side with apple. Is apple losing this this is very public fight. Are they losing this in the public court of opinion . Guest i dont think they are, perhaps im a sunny optimist. The fact were talking about a highprofile terrorism investigation and the fact that 40 of people on fairly esoteric issue understand that like, their privacy is so at stake and their phones are so sensitive theyre willing to say even in this most extreme of circumstances, highprofile shooting, we still dont want to see that phone accessed, i think thats big deal. Guest i would contrast that to i think that number speaks to something different, which is if you take into account massive amount of resources that these very
Large Companies
have the put into public relations, and lobbying, and outside groups that are, serving as advocates on these issues, in the face of all of that, that 51 of the people, many of whom who are loyal apple customers, including myself, still have questions about these companies choices, marketing choice, i think that number is actually very persuasive. Host josh zive, has apple ever unlocked phones for a criminal case . Guest sure, although i think we both would agree the newer operating system presents a different technological issue than the past ones. They certainly cooperated with
Law Enforcement
scores of times in the past with their technology. Guest to my mine that only underscores the seriousness how they view this incursion into their device. I mean, listen, josh said it, well, there are billions people buying iphones. Theyre in the business of selling phones to lots and lots of people. If they thought there was a risk of alienating their customers i think the smart corporate money in a lot of places, would have said, you know what . I will not pick this fight but i think they recognize this is a sea change. This is us turning the device, this is companies being forced to turn devices on their users. If we go down that road, no one is going to trust these devices. That will have bigger impact on apple than anything. Guest i continuathathathatf if we have a device that is secure and does not have a backdoor, protecting rights of human rights advocates in china, protecting my information against a hacker. That may have a greater benefit than the marginal effect on
Law Enforcement
. That is a legitimate position to be in. I think that we shouldnt for close that discussion in any way guest we agree, but this discussion, this discussion should have occurred before these
Companies Put
millions and millions of these devices on the market because implications of this for
Law Enforcement
are already being felt. Our local and state
Law Enforcement
brethren report multiple investigations on things ranging from low level crime, child pornography, abduction being frustrated by this. It will only increase. We can have this discussion but we cant have, there needs to be action and there should have been responsibility from these companies on the front end, certainly
Law Enforcement
warned about these implications at the beginning and i think somehow convincing people their information is secure as a result of this device is frankly misleading. Are lawmakers acting in bad faith when, a lot of lawmakers support apple and strong encryption, they come out and saying we node to deal with it. They havent dealt with it because guest it has been a difficult issue. A lot of lawmakers are hesitant to get involved in complicated technological investigations. Sometimes take as moment to clarify a topic. There is no question, being faced with looking at cell phone used by terrorists knowing that there is information in there we dont know what it is and we cant get it because of choices made by these companies, i think that certainly has clarified issue for a lot of people. Congress doesnt act, this wind up in the
Supreme Court
. What does that look like . Guest those may be separate questions. This litigation will unquestionably proceed regardless of the outcome at
District Court
level. Also should be a policy discussion that occurs. Guest i think were at the beginning of exploring legal issues. I mean we havent even talked about the free speech implication of requiring apple to essentially certify that a device is secure when they know its not. Essentially forcing the company to the
Say Something
to its user, i. E. , this device is secure, this update i am sending the device is update you can trust when they know that is not the case. We havent even talked about that. I think idea of the government preapproving technological changes is terrifying. I think we should worry about that. We should worry about saying, well, i cant roll out, strong, powerful safe devices until i have gotten signoff from the fbi. Nobody wants that. Guest i think that is interesting concept. It was not one that barred apple from running their security protocols by the
Chinese Government
when they wanted to get access to that market. Theyre concerned about human rights seemed not as strong when it came to actually building those phones in those markets. I think idea these companies are acting purely out of civil libertarian desires, i am literally the fan of
Civil Liberties
youll fine. I dont think it is true. Host back to tim cooks letter, mr. Zieve, we find no precedent
American Company
being forced to expose its customers to risk of attack. For
Years Technology
experts have been warning of weakening encryption. Guest i dont think that is accurate there. Is range of precedent requiring private companies to
Law Enforcement<\/a> with a warrant can access that evidence. It is available. There are keys to physical doors. There are keys to safe deposit boxes and also, private companies are required to comply with warrants in order to access even locked physical devices n this instance theyre, the fbi is asking for, asking for with a magistrates order apple to simply unlock their own device. This is technology, these are technical means they have admitted that they have at their disposal already. Guest if i could push back on that though. That is different. Were not asking them to unlock a device. They do not have right now a key in their position. What is being asked of them they build code to break their device. In other words that they actively create a way that they can access their device and make it less secure. Thats different. A warrant entitles you to search a place. It doesnt entitle someone, doesnt entitle you to get something. It entitles you to access if access is possible. Thats different than saying, oh, im going to actually make you build a vulnerability that can be reproduced or asked for by china or illicitly asked or, illicitly accessed by hacker. Guest on that point, chris, one of the things doj is saying, this is not a broader attempt to break encryption. This is really sort of reviving this encryption debate but they said we want to disable nonencryption barriers, auto deletes on the pass code. This is more narrowly tailored request. How do you push back when they say this is one time thing for one phone, were not undermining encryption. This is access and apple keep custody of the code they write . Guest it is true were not breaking encryption by doing this, but were breaking security features of the phone. I think policy debate got broader than just encryption versus not encryption. Thats the first point. I think reality there is already 12 cases outstanding where the fbi is asking them to do this in other cases. The reality if we set this precedent now we are going to be setting a precedent where i can get your help whether you want to give it to me or not, to turn your device into either something that can be accessed by the government or a listening device. I think that we dont want to precedent where the government is able to force people to turn devices we rely on into spies on us. Guest i think that is a significant overstatement of what the risk is here. What were describing here is the normal operation of the
Fourth Amendment<\/a> for hundreds of years which is that even the moss private areas, the most private locations, can be accessed with a warrant, with, were not talking about mass surveillance. Were not talking about government turning devices into listening devices. Were talking about
Court Supervised<\/a> warrants and ability to access evidence. The question people need to have what is the alternative . These devices have been intentionally designed to be impenetrable by normal
Legal Process<\/a>. That is not the way our system is designed to operate. That is a choice that apple and these companies have made for largely business reasons. And there is no question, he is correct, there is both an individual instance that were dealing with with the phone that was used by the san bernanadino terrorists. There is a larger question whether these companies should be able to mass
Market Technology<\/a> intentionally designed to frustrate the legal pros es. Guest to be clear, it is knot intentionally designed to frustrate the
Law Enforcement<\/a>. It is designed to be safe and secure for personal users. Whether it is your bank access, whether pin numbers, personal information about you, all your emails, theyre designing it to be safe, to be impenetrable not from
Law Enforcement<\/a> but everyone to say secure in our digital word. Host is this different than looking from somebodys emails going to jordan, per se . Guest that is book a different set of laws. There is different angle on policy debate. What is one that is valuable policy debate but i think it is important to note that these companies were and able to and did work with
Law Enforcement<\/a> for years in responding to
Legal Process<\/a>. To say that this was not intentionally designed to frustrate
Law Enforcement<\/a> i believe is misleading. In the announcement of this, part of the announcement and rollout of this technology was a declaration they would no longer work with
Law Enforcement<\/a> on these. This is the experience that our agents have had in the field where even outreach to these entities to participate in discussions on these topics have been met with the claim, that, from apple was met with silence and from google was met with a claim they would only respond to
Legal Process<\/a>. So were, we are at this location because we were forced to be here by these
Companies Business<\/a> decisions. Guest talk about
Legal Process<\/a> though. Is there any concern that the statute, the law is government is relying on in this case goes back to our founding, centuries old, that is the legal rationale theyre currently using in this debate . Guest i dont think so, the all writs act, talks to procedures available to the court to enforce a warrant and been applied to modernize
Technology Many<\/a> times over the years. This is not the first time it has been used with a technology that didnt exist with the time the all writs act was enacted. It has been applied to security video, applied to credit card records. None of those existed in the 18th century. Guest it is pretty wideranging change now. While i agreed we clearly applied the all writs act in the past, this is make no mistake, this is policy dispute. Were deciding if we decide to allow access of this type, a
Magistrate Court<\/a> would essentially be saying there is little or no argument to keep china from doing this exact same thing. There is little or no discussion of who else might be able to access this or, will the security implications of creating a book door that might be misused by hacker. So this goes far beyond what a magistrate can honestly grapple with in the course of interpreting the all writs act to a sea change around privacy and security of our device. Host what exactly is the all writs act . Guest the all writs act is 1789 statute that essentially says you must give assistance to lewd enforcement when they come to you with a warrant and essentially producing information on that warrant but thats a little bit different. What we have here is not just assistance, not the landlord uses his key. Its the landlord drills a hole in the safe, or worse yet, the safe company is required to put a backdoor lock on their safe that
Law Enforcement<\/a> can use to open. So were taking a substantial set beyond assisting in pursuit of a warrant to essentially rebuilding security and access control. Guest but we do have to ask the question what the alternative is . We can debate, there are a variety of mechanisms that exist to address this issue. There are split key options. There are backdoor master key, whatever you choose to characterize. There are a range of options. However right now none of those options have been used and what is true is that these devices are locked to
Law Enforcement<\/a>. Apple is refusing to comply with this and other warrants. As a result, those phones act as active safe havens for people who want to conduct criminal activity. How valuable is this phone . This was county owned work phone owned by syed farook one of the shooters in the attack. He and his wife devoid them. They dropped other electronics in a lake. They went to
Great Lengths<\/a> to cover their tracks elsewhere. This is countyowned phone. Do you believe this is that important to investigators . Guest i believe we have a
Fourth Amendment<\/a> process we dont force people to answer the question before you have seen the evidence. If you have probable cause and obtain a lawful warrant, that you look for the evidence then. The whole point we dont know whats on that phone. So pointing to that lack of knowledge as evidence that we shouldnt see whats on that phone turns warrant system on its head. Guest i do think it is worth acknowledging here while it is fine to say we should have this debate the reality there is vastly more
Information Available<\/a> to the fbi now than there was 20 years ago, vastly more. We are communicating in texts. We are sending, hundreds or thousands of emails a day. All of this information is out there, much of it is accessible not on the phone but in the cloud and other devices. So when we say, we need information to build a criminal case,
Location Information<\/a> is available routinely, the reality is that we have a ton of information. What were saying is that in a very narrow case when other security interests are at stake we may not have universal access to all information because were potentially recall haing the security of every phone, everyone who hold as phone. Host critical la brees, do you have a problem with mr. Critical la brees, to you have a problem with mr. Farooks cloud being addressed . There is question of
Legal Standard<\/a>. Right now the
Legal Standard<\/a> for accessing information in the cloud is not a warrant. The law that deals with that is very out of date. There is a bill before congress that would update that. It is being held up by civil agencies and
Law Enforcement<\/a> interests. We can actually have a question about what the right standard is. Accessible with a warrant . We dont have a problem. Guest glad you brought up that law. Fbi executes wants for all that, even though it is not required under the
Electronic Communications<\/a> privacy act. The fbi uses warrant for all content. We have serious questions about other aspects of that law. The discussion of electronic privacy law like the law chris mentions provide a very useful tool to have that this discussion. If you dont think all writs act is the proper tool, if people have concerns the fact, yes, there are broader ways to access this information, so creating this tool for even cyber criminals, which is, one impenetrable tool in a tool of accessible information, we think that debate should be, should be joined by congress and that legislation would provide ample opportunity of that discussion. Based on what you know of the case and your expertise, do you believe investigators made a mistake telling
San Bernardino<\/a> county to reset the apple i. D. Password on a phone in a way that precluded another attempt at backing up that data on the cloud that would have been available . Did they make a mistake . Guest im far removed from every detail how apple conducts backups. I still cant get rid of that u2 album off my itunes. There is fact all dispute between fbi and apple how that exactly played out. It is a separate question from the one presented here. Should apple comply with that magistrates order or not. Guest i think there is no question they made a mistake. To be fair every investigation will not be conduct the perfectly. Putting that aside i think reality is, if we have a device that is likely not going to con an taken useful information, that could have been accesses without this mistake, access that information, this really the hill that we want to create a huge new precedental louing, to allow
Law Enforcement<\/a> to build weaknesses and backdoors into devices . I think it is not. I think this discussion should go to congress and continue on past this court proceeding. Despite those issues that you raiseed, people came out on monday pew came out on monday, one poll, some polling may have different polling with different numbers, in this poll, 51 side with the fbi. 38 side with apple. Is apple losing this this is very public fight. Are they losing this in the public court of opinion . Guest i dont think they are, perhaps im a sunny optimist. The fact were talking about a highprofile terrorism investigation and the fact that 40 of people on fairly esoteric issue understand that like, their privacy is so at stake and their phones are so sensitive theyre willing to say even in this most extreme of circumstances, highprofile shooting, we still dont want to see that phone accessed, i think thats big deal. Guest i would contrast that to i think that number speaks to something different, which is if you take into account massive amount of resources that these very
Large Companies<\/a> have the put into public relations, and lobbying, and outside groups that are, serving as advocates on these issues, in the face of all of that, that 51 of the people, many of whom who are loyal apple customers, including myself, still have questions about these companies choices, marketing choice, i think that number is actually very persuasive. Host josh zive, has apple ever unlocked phones for a criminal case . Guest sure, although i think we both would agree the newer operating system presents a different technological issue than the past ones. They certainly cooperated with
Law Enforcement<\/a> scores of times in the past with their technology. Guest to my mine that only underscores the seriousness how they view this incursion into their device. I mean, listen, josh said it, well, there are billions people buying iphones. Theyre in the business of selling phones to lots and lots of people. If they thought there was a risk of alienating their customers i think the smart corporate money in a lot of places, would have said, you know what . I will not pick this fight but i think they recognize this is a sea change. This is us turning the device, this is companies being forced to turn devices on their users. If we go down that road, no one is going to trust these devices. That will have bigger impact on apple than anything. Guest i continuathathathatf if we have a device that is secure and does not have a backdoor, protecting rights of human rights advocates in china, protecting my information against a hacker. That may have a greater benefit than the marginal effect on
Law Enforcement<\/a>. That is a legitimate position to be in. I think that we shouldnt for close that discussion in any way guest we agree, but this discussion, this discussion should have occurred before these
Companies Put<\/a> millions and millions of these devices on the market because implications of this for
Law Enforcement<\/a> are already being felt. Our local and state
Law Enforcement<\/a> brethren report multiple investigations on things ranging from low level crime, child pornography, abduction being frustrated by this. It will only increase. We can have this discussion but we cant have, there needs to be action and there should have been responsibility from these companies on the front end, certainly
Law Enforcement<\/a> warned about these implications at the beginning and i think somehow convincing people their information is secure as a result of this device is frankly misleading. Are lawmakers acting in bad faith when, a lot of lawmakers support apple and strong encryption, they come out and saying we node to deal with it. They havent dealt with it because guest it has been a difficult issue. A lot of lawmakers are hesitant to get involved in complicated technological investigations. Sometimes take as moment to clarify a topic. There is no question, being faced with looking at cell phone used by terrorists knowing that there is information in there we dont know what it is and we cant get it because of choices made by these companies, i think that certainly has clarified issue for a lot of people. Congress doesnt act, this wind up in the
Supreme Court<\/a> . What does that look like . Guest those may be separate questions. This litigation will unquestionably proceed regardless of the outcome at
District Court<\/a> level. Also should be a policy discussion that occurs. Guest i think were at the beginning of exploring legal issues. I mean we havent even talked about the free speech implication of requiring apple to essentially certify that a device is secure when they know its not. Essentially forcing the company to the
Say Something<\/a> to its user, i. E. , this device is secure, this update i am sending the device is update you can trust when they know that is not the case. We havent even talked about that. I think idea of the government preapproving technological changes is terrifying. I think we should worry about that. We should worry about saying, well, i cant roll out, strong, powerful safe devices until i have gotten signoff from the fbi. Nobody wants that. Guest i think that is interesting concept. It was not one that barred apple from running their security protocols by the
Chinese Government<\/a> when they wanted to get access to that market. Theyre concerned about human rights seemed not as strong when it came to actually building those phones in those markets. I think idea these companies are acting purely out of civil libertarian desires, i am literally the fan of
Civil Liberties<\/a> youll fine. I dont think it is true. Host back to tim cooks letter, mr. Zieve, we find no precedent
American Company<\/a> being forced to expose its customers to risk of attack. For
Years Technology<\/a> experts have been warning of weakening encryption. Guest i dont think that is accurate there. Is range of precedent requiring private companies to
Access Private<\/a> information that was private. Such as credit
Card Companies<\/a>. Credit
Card Companies<\/a> under all writs act there was no precedent until the precedent was set requiring those companies to turn over sensitive financial information. If you read what the motion to compel actually requires, the software that is being asked to be used to essentially turn off the boobytrap built into this phone that would destroy it upon 10 password uses, that will be held by the company the same way that the expertise to create that software is already held by the company. So, i dont think you have a marked difference. Dig into the technology for a second here, right . At least as an initial matter, yes, im going to send, probably end up happening i would send the device itself to apple, right . Apple then would essentially create software which would trick this device into changing its operating system, say you can trust this download. Were going to certify that to your device. That is fine it is held in apples hands today. The reality if that precedent is set, i will have a precedent that updates me be falsified. If you put five
Security Experts<\/a> around this room i think they would tell you one of the single greatest innovations and most important changes in cybersecurity last 10 or 15 years is the universal update. Were auto updating devices so we know when there are security vulnerabilities they get patched. If we break that process if we say, dont update your devices because you dont know whats in there, you cant trust the company to tell you that this is actually a secure update. It may be
Something Else<\/a> or worse, that this update process could be subverted in some way by a hacker, we have broken huge, huge improvements to cybersecurity and rolled us back a substantial amount. That is something we should worry about independently. Why this is
Something Congress<\/a> should be considering, not a magistrate judge in california. Seems like every week we have a new story how
Silicon Valley<\/a> and washington are not getting along. This seems to a lot of us borne out of the
Edward Snowden<\/a> revelations of 2013 that really affected relationship. Is this sort of the new normal . Are we having this debate now because of those revelations . This is why apple and other companies decided to go this far on the side of
Digital Privacy<\/a> . I cant speak to their motivation in terms of snowden. It certainly hurt them. No question they suffered really unfair reputational loss based on legal harms they couldnt do anything about. I mean right now, not to get too far afield, but right now there is something called the
Privacy Shield<\/a> which is the framework that allows information to be flow from the e. U. , from europe, to the united states. That agreement was essentially wiped away by european courts because of their concerns about, about domestic surveillance and requiring companies to comply with that surveillance. So that threw thousands much companies into disarray and their practice. They clearly felt harm. There is nothing they can do. Theyre complying with legal orders. Hard to look at them and turn around and say, you must continue to comply with these legal orders even though it is likely to cause you even more financial harm. I mean at minimum the fbi and other
Law Enforcement<\/a> need to recognize what theyre doing is causing
Financial Hardship<\/a> to companies, as well as harming devices. Guest i mean, im sure we feel bad that they, marketing choice that these companies, which are very
Successful Companies<\/a> have made, that we are proposing a solution that in order to solve very dangerous crimes, may not be fully consistent with their investor goals but the truth is nobody is more sensitive to cybercrime than the 13,000 agents who are member of the fbi agents association. Not only are these crimes that our members are dedicated to trying to solve every single day, because as director comey often says, cybercrime now is crime, right . It perpetrates all types of crime. And our members were also, almost everyone of them, was a victim of the recent, very large, hack into the office of personnel management. Our people are very sensitive to these issues but they also know that in the midst of this, it means that our constitutional system should set the rules for how you access information. Not marketing teams. I am glad you mentioned omb hack. For folks that arent familiar with it, 24 million people, federal employees, most personal information held by the federal government hacked this was their personal background checks, right . Literally
Mental Health<\/a> history, they have a drinking problem, everything in their background check. I cant think of anything more secure than that. If we cant keep that secure, is anybody really believe well be able to keep whatever technique we develop as part of this process secure . Guest that is kind of the point. That information is all hackable. All these companies have done, the one thing that hasnt been a big source of threat is the physician cool phone. Guest but they could have kept it secure because they built the security. Guest until the recent operating system we didnt have problems before, youre creating a tool for very hackers, our agents make their jobs substantially more difficult to investigate and prosecute those kind of people. Youre handing that tool, for profit to criminals around the world. Host chris, how does the center for democracy and
Technology Want<\/a> to see this play out . Guest i think we want to make sure we protect peoples privacy. At the end of the day, we dont want to see apple forced to build malware. I dont want to see apple doing a cyber criminals job for them, forcing them to build a product that is going to hack their device. To me thats a terrible outcome likely to make all of us less safe. Host josh zive . Guest we would like to see apple stop selling malware for initial phones being used by the very people and being marketed based on the false promise of security. Because their information is already vulnerable. But what is really a tool that frustrates and inconsistent with our constitutional system of search and seizure. Host josh is special counsel for the fbi agents association. Chris calabrese is
Vice President<\/a> of technology and democracy. Spent several years at aclu. Dustin volz. Thank you. Gentlemen. Guest thank you. Fbi director james comey talked about the bureaus attempt to have apple help in the san bernanadino investigation at a
House Appropriations<\/a> subcommittee","publisher":{"@type":"Organization","name":"archive.org","logo":{"@type":"ImageObject","width":"800","height":"600","url":"\/\/ia601301.us.archive.org\/8\/items\/CSPAN2_20160229_130200_The_Communicators\/CSPAN2_20160229_130200_The_Communicators.thumbs\/CSPAN2_20160229_130200_The_Communicators_000001.jpg"}},"autauthor":{"@type":"Organization"},"author":{"sameAs":"archive.org","name":"archive.org"}}],"coverageEndTime":"20240624T12:35:10+00:00"}