Habeas Data_Privacy vs. The Rise of Surveillance Tech
Page 32
When the clock struck midnight: Sebastian Anthony, “Tim Cook Says Apple Will Fight US Gov’t Over Court-Ordered iPhone Backdoor,” Ars Technica, February 17, 2016. Available at: https://arstechnica.com/gadgets/2016/02/tim-cook-says-apple-will-fight-us-govt-over-court-ordered-iphone-backdoor/.
“We have great respect”: Tim Cook, “A Message to our Customers,” February 16, 2016. https://www.apple.com/customer-letter/.
Seventy-two hours later: UNITED STATES V. IN THE MATTER OF THE SEARCH OF AN APPLE IPHONE, GOVERNMENT’S MOTION TO COMPEL, February 19, 2016. https://www.documentcloud.org/documents/2715997-Apple-iPhone-Access-MOTION-to-COMPEL.html.
The entire text of the law: 28 U.S. Code § 1651. Available at: https://www.law.cornell.edu/uscode/text/28/1651.
The two-sentence law: Dimitri Portnoi, “RESORTING TO EXTRAORDINARY WRITS: HOW THE ALL WRITS ACT RISES TO FILL THE GAPS IN THE RIGHTS OF ENEMY COMBATANTS,” New York University Law Review, December 10, 2007. Available at: https://www.documentcloud.org/documents/3863455-SSRN-id1009340.html#document/p11/a357561.
In 1995, it was used: US v. William Li, Nos. 94-2630, Reply Brief for Defendant (7th Cir. 1995). Available; at: https://www.documentcloud.org/documents/3863512-United-States-of-America.html#document/p40/a357643.
In 2005, it was invoked: Thomas F. Liotti, “Enjoining State Courts under the All Writs Act,” The Nassau Lawyer, October 2010. Available at: https://www.nassaubar.org/Articles/Archive/Article345.aspx.
In 2012, it was used: Order Granting Application Under the All Writs Act, US v. Ramona Camelia Fricosu, 1:10-cr-00509-REB, USDC Colorado, 2012. Available at: https://www.documentcloud.org/documents/3863634-Decrypt.html.
As Jonathan Mayer, then: Jonathan Mayer, “Assistance for Current Surveillance,” Stanford University, November 28, 2014. Available at: https://www.youtube.com/watch?v=PoNJvmB16bQ.
In March 1976 : Preliminary Memorandum, United States v. New York Telephone Co., 434 U.S. 159 (1977). https://www.documentcloud.org/documents/3727203-76-835-US-NewYorkTelephoneCo.html#document/p2/a396623.
“These devices do not hear sound”: United States v. New York Telephone Co., 434 U.S. 159 (1977). Available at: https://www.law.cornell.edu/supremecourt/text/434/159.
This entire question of modern cryptography: Whitfield Diffie and Martin E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. IT 22, No 6, November 1976 Available at: https://www.documentcloud.org/documents/3866958-24.html.
Others expounded upon: Vin McLellan, “Data Network to Use Code to Insure Privacy,” The New York Times, March 21, 1989. Available at: http://www.nytimes.com/1989/03/21/business/data-network-to-use-code-to-insure-privacy.html.
Mailsafe: Harold Joseph Highland, “Encryption packages offer business users a choice,” Computerworld, July 13, 1987. Available at: https://books.google.com/books?id=-_HA2pUErI8C&pg=PT94&dq=%22rsa+mailsafe%22&hl=en&sa=X&ved=0ahUKEwjDrPHLhMPUAhWV8oMKHdVwBhoQ6AEIMTAC#v=onepage&q=%22rsa%20mailsafe%22&f=false.
Around that same time, Phil Zimmerman: Steven Levy, Crypto (Penguin Books, 2002), p. 191.
Pretty Good Privacy: John Markoff, “Move on Unscrambling Of Messages Is Assailed,” The New York Times, April 17, 1991. Available at: http://www.nytimes.com/1991/04/17/business/move-on-unscrambling-of-messages-is-assailed.html.
“to obtain the plaintext contents”: Joseph Biden, “All Information (Except Text) for S.266 - Comprehensive Counter-Terrorism Act of 1991,” January 24, 1991. https://www.congress.gov/bill/102nd-congress/senate-bill/266/all-info.
This notion ended up becoming: Office of the Press Secretary, “Statement by the Press Secretary,” April 16, 1993. Available at: http://cd.textfiles.com/hackersencyc/PC/CRYPTO/CLIPPER.TXT.
Clipper chip would not: John Markoff, “Big Brother and the Computer Age,” The New York Times, May 6, 1993. Available at: http://www.nytimes.com/1993/05/06/business/big-brother-and-the-computer-age.html.
Many of them—notably FBI: Levy, p. 245.
In 1995, Kallstrom: James C. McKinley, Jr., “Wiretap Expert Named to Head New York City Office of F.B.I.,” The New York Times, February 17, 1995. Available at: http://www.nytimes.com/1995/02/17/nyregion/wiretap-expert-named-to-head-new-york-city-office-of-fbi.html.
Over 1993 and 1994: Testimony of Jerry J. Berman, Executive Director Electronic Frontier Foundation before the Committee on Science, Space and Technology Subcommittee on Technology, Environment and Aviation U.S. House of Representatives Hearing on Communications and Computer Surveillance, Privacy and Security, May 3, 1993. Available at: https://totseans.com/totse/en/zines/cud_a/cud644.html.
Not a month later, a young AT&T: John Markoff, “Flaw Discovered in Plan for Federal Wiretapping,” The New York Times, June 2, 1994. Available at: http://www.nytimes.com/1994/06/02/us/flaw-discovered-in-federal-plan-for-wiretapping.html.
one of Clipper chip’s critical flaws: Matt Blaze’s Clipper attack—details, sci. crypt, May 3, 1994. Available at: https://groups.google.com/d/msg/sci.crypt/J5QT1l6t8Vk/3howjM9tNx0J.
By the summer, the White House: “White House Wants a Clipper Alternative,” Washington Technology, July 14, 1994. Available at: https://washingtontechnology.com/articles/1994/07/14/white-house-wants-a-clipper-alternative.aspx?m=.1
But at the same time: Anthony Ramirez, “FBI’s Proposal on Wiretaps Criticized by Federal Agency,” The New York Times, January 15, 1993. Available at: http://www.nytimes.com/1993/01/15/us/fbi-s-proposal-on-wiretaps-criticized-by-federal-agency.html
And in the end, the FBI’s efforts: John Markoff, “Big Brother and the Computer Age,” The New York Times, May 6, 1993. Available at: http://www.nytimes.com/1993/05/06/business/big-brother-and-the-computer-age.html.
The law primarily targeted: Nate Anderson, The Internet Police (W. W. Norton & Company, 2014). p. 107.
Crucially, the law does: 47 U.S. Code § 1002. Available at: https://www.law.cornell.edu/uscode/text/47/1002.
In late June 1996: Philip Zimmermann, “Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation,” June 26, 1996. Available at: http://www.philzimmermann.com/EN/testimony/index.html.
In 2000, the public: John Schwartz, “FBI’s Internet Wiretaps Raises Privacy Concerns,” The Washington Post, July 12, 2000. Available at: https://www.washingtonpost.com/archive/politics/2000/07/12/fbis-internet-wiretaps-raise-privacy-concerns/2bc839c0-d5f0-4d96-85b6-390d49e59fb2/?utm_term=.1a473bab125e.
Years later, Thomas: Subsentio, “Former FBI Official Takes Charge of Tech Development at U.S. Surveillance Industry’s Leading Lawful Intercept Service Bureau,” December 10, 2013. Available at: http://www.subsentio.com/ssio_pr/subsentio-names-marcus-thomas-chief-technology-officer/.
“Everything is digging”: Author’s interview with Marcus Thomas, August 2, 2017.
One notable and creative: Thomas Fox-Brewster, “Cartapping: How Feds Have Spied on Connected Cars for 15 Years,” Forbes, January 15, 2017. Available at: https://www.forbes.com/sites/thomasbrewster/2017/01/15/police-spying-on-car-conversations-location-siriusxm-gm-chevrolet-toyota-privacy/.
ATX had to remotely activate: In the matter of the emergency application for an order compelling ATX Technologies to show cause, 2:01-cv-01495-LDG, USDC Nevada, December 19, 2001. Available at: https://www.documentcloud.org/documents/3868115-Show-Temp-55.html.
The company attempted: In the matter of the application of the United States for an order authorizing the roving interception, 2:01-cv-01495-LDG, USDC Nevada, December 21, 2001. Available at: https://www.documentcloud.org/documents/3868114-Show-Temp-56.html.
Then, on January 10, 2002: ATX mo
tion to reconsider, In the matter of the application of the United States for an order authorizing the roving interception, 2:01-cv-01495-LDG, USDC Nevada, February 8, 2002. Available at https://www.documentcloud.org/documents/3868117-Show-Temp-57.html#document/p2/a358580.
“In order to comply”: Ibid. https://www.documentcloud.org/documents/3868117-Show-Temp-57.html#document/p7/a358607.
“The question remains whether”:. Opinion, The Company v. United States, No. 02-15635, DC No. CV-01-01495-LDG, November 18, 2003. Available at: https://www.documentcloud.org/documents/3868104-629.html#document/p22/a358610.
“The FBI, however well-intentioned”: Ibid. https://www.documentcloud.org/documents/3868104-629.html#document/p25/a358612.
Over a decade later: Apple Inc’s reply brief to government’s opposition, In the Matter of the Search of an Apple iPhone, ED No. CM 16-10 (SP), USDC Central California, March 15, 2016. https://www.documentcloud.org/documents/2762147-Reply-Brief-in-Support-of-Apple-s-Motion-to-Vacate.html#document/p13/a283423.
“if you give a mouse a cookie”: Laura Numeroff, If You Give a Mouse a Cookie (HarperCollins, 1985).
The All Writs Act cropped up: In the Matter of an Application of the United States for an Order, 2:05-mj-01093-JO, Memorandum and Order, August 25, 2005. Available at: https://www.documentcloud.org/documents/3868140-12311369538.html.
The government’s legal argument: “Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations,” Department of Justice, 2004. https://www.documentcloud.org/documents/3868141-Searching-Seizing-Computers-and-Obtaining.html#document/p172/a358622.
In other words, Judge Orenstein: “Magistrate Judge James Orenstein,” USDC Eastern District of New York. Available at: https://www.nyed.uscourts.gov/content/magistrate-judge-james-orenstein.
The government was not pleased: AUSA Letter to Magistrate Judge Orenstein, September 9, 2005. https://www.documentcloud.org/documents/3868137-1231936443.html.
A week later, an outside group: EFF Letter to Judge James Orenstein, September 23, 2005. Available at: https://www.documentcloud.org/documents/3868138-EFF-letter-to-Judge-Orenstein-Sept-23-2005.html.
The dispute largely turned: 47 U.S. Code § 1002. Available at: https://www.law.cornell.edu/uscode/text/47/1002.
The government interpreted: “Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations,” Department of Justice, 2004. https://www.documentcloud.org/documents/3868141-Searching-Seizing-Computers-and-Obtaining.html#document/p172/a358622.
The organization felt that: EFF Letter to Judge James Orenstein, September 23, 2005. Available at: https://www.documentcloud.org/documents/3868138-EFF-letter-to-Judge-Orenstein-Sept-23-2005.html.
On October 11, 2005: AUSA response to EFF, October 11, 2005. Available at: https://www.documentcloud.org/documents/3868136-12312009118.html#document/p8/a358614.
“Thus, as far as I can tell”: In the Matter of an Application of the United States for an Order, 2:05-mj-01093-JO, Memorandum and Order, August 25, 2005. Available at: https://www.documentcloud.org/documents/3868139-1231998558.html#document/p55/a358621.
In 2006, the FBI created: “FBI Announces Restructuring,” FBI, July 26, 2006. Available at: https://archives.fbi.gov/archives/news/pressrel/press-releases/fbi-announces-restructuring.
“In today’s digital world”: Vanessa Thomas, “High-tech lab fights crime of digital age,” Buffalo News, September 8, 2006. Available at: https://www.rcfl.gov/western-new-york/news/high-tech-lab-fights-crime-of-digital-age-fbis-1-5-million-facility-can-recover-data-zero-in-on-such-offenses-as-child-pornography.
In fact, the same month: “Marcus C. Thomas Named Assistant Director of the Operational Technology Division,” FBI, January 5, 2007. Available at: https://archives.fbi.gov/archives/news/pressrel/press-releases/marcus-c.-thomas-named-assistant-director-of-the-operational-technology-division.
assistant director of the Operational Technology Division: “FBI Experts Deliver Technical Tools,” FBI, November 7, 2008. Available at: https://cryptome.org/eyeball/fbi-otd/fbi-otd-eyeball.htm.
By at least early 2008: CTO Marcus Thomas: “The Wicked Problem of Going Dark.” Available at: http://www.subsentio.com/cto-marcus-thomas-wicked-problem-going-dark/.
What worried Haynes and Thomas: FBI FOIA response, December 17, 2010. https://www.documentcloud.org/documents/3868150-20110207-Fbi-Going-Dark-Release-Part-1.html#document/p2/a360128.
In 2009, the FBI asked: FBI Budget Request Fiscal Year 2010. Available at: https://www.documentcloud.org/documents/3866762-Fbi-Bud-Summary-2011.html#document/p3/a358428.
By FY 2017: James Comey, Statement Before the House Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies Washington, D.C. February 25, 2016 FBI Budget Request for Fiscal Year 2017. Available at: https://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year-2017.
“We’re talking about lawfully”: Charlie Savage, “U.S. Tries to Make It Easier to Wiretap the Internet,” The New York Times, September 27, 2010. http://www.nytimes.com/2010/09/27/us/27wiretap.html?pagewanted=all
“Many agencies that need”: Statement of Chief Mark Marshall President International Association of Chiefs of Police Before the Committee on the Judiciary Subcommittee on Crime, Terrorism and Homeland Security United States House of Representatives February 17, 2011. Available at: https://www.documentcloud.org/documents/3868110-Marshall02172011.html#document/p3/a360129.
For the most part, mainstream: 2010 Report of the Director of the Administrative Office of the United States Courts on Applications for Orders Authorizing or Approving the Interception of Wire, Oral, or Electronic Communications. Available at: https://www.documentcloud.org/documents/3879529-2010wiretapreport.html#document/p7/a360130.
“The lock screen is merely”: Jonathan Zdziarski, “Your iOS device isn’t as encrypted as you think,” April 18, 2013. Available at: https://www.zdziarski.com/blog/?p=2149.
However, everyone’s notion: Dan Goodin, “Guardian Reporter Delayed E-mailing NSA Source Because Crypto Is a Pain,” Ars Technica, June 11, 2013. Available at: https://arstechnica.com/security/2013/06/guardian-reporter-delayed-e-mailing-nsa-source-because-crypto-is-a-pain/.
Within months, companies began hardening: Sean Gallagher, “Googlers Say ‘F*** You’ to NSA, Company Encrypts Internal Network,” Ars Technica, November 6, 2013. Available at: https://arstechnica.com/information-technology/2013/11/googlers-say-f-you-to-nsa-company-encrypts-internal-network/; Sean Gallagher, “Yahoo Will Encrypt Between Data Centers, Use SSL for All Sites,” Ars Technica, November 18, 2013. Available at: http://arstechnica.com/information-technology/2013/11/yahoo-will-encrypt-between-data-centers-use-ssl-for-all-sites/; Sean Gallagher, “Microsoft to Harden Networks, Code Against Government Snooping,” Ars Technica, December 5, 2013. Available at: https://arstechnica.com/information-technology/2013/12/microsoft-to-harden-networks-code-against-government-snooping/.
“Recent press stories have reported”: Jeffrey Meisner, “Protecting Customer Data from Government Snooping,” Microsoft Blog, December 4, 2013. Available at: https://blogs.technet.microsoft.com/microsoft_blog/2013/12/04/protecting-customer-data-from-government-snooping/.
The term came from an April 2014: Ann E. Marimow and Craig Timberg, “Low-Level Federal Judges Balking at Law Enforcement Requests for Electronic Evidence,” The Washington Post, April 24, 2014. Available at: https://www.washingtonpost.com/local/crime/low-level-federal-judges-balking-at-law-enforcement-requests-for-electronic-evidence/2014/04/24/eec81748-c01b-11e3-b195-dd0c1174052c_story.html?utm_term=.a94945fb82ee.
The article focused on: Cyrus Farivar, “Judge Denies
Gov’t Request to Search Suspect’s iPhone in Ricin Case,” Ars Technica, March 26, 2014. Available at: https://arstechnica.com/tech-policy/2014/03/judge-denies-govt-request-to-search-suspects-iphone-in-ricin-case/.
“On devices running iOS”: Cyrus Farivar, “Apple Expands Data Encryption Under iOS 8, Making Handover to Cops Moot,” Ars Technica, September 18, 2014. Available at: https://arstechnica.com/apple/2014/09/apple-expands-data-encryption-under-ios-8-making-handover-to-cops-moot/.
That same day, in an open letter: “A mess age from Tim Cook about Apple’s commitment to your privacy.” September 18, 2014. Available at: https://web.archive.org/web/20141112091320/https://www.apple.com/privacy/
Google followed suit the next day: Craig Timberg, “Newest Androids Will Join iPhones in Offering Default Encryption, Blocking Police,” The Washington Post, September 18, 2014. https://www.washingtonpost.com/news/the-switch/wp/2014/09/18/newest-androids-will-join-iphones-in-offering-default-encryption-blocking-police/?utm_term=.17ccabf42fca.
Government officials were not going: Brent Kendall, “FBI Director Raises Concerns About Smartphone-Security Plans,” Wall Street Journal, September 25, 2014. Available at: http://online.wsj.com/articles/fbi-director-raises-concerns-about-smartphone-security-plans-1411671434?mod=WSJ_TechWSJD_NeedToKnow.
“It is fully possible to permit law enforcement”: Craig Timberg, “Holder Urges Tech Companies to Leave Device Backdoors Open for Police,” The Washington Post, September 30, 2014. Available at: https://www.washingtonpost.com/news/the-switch/wp/2014/09/30/holder-urges-tech-companies-to-leave-device-backdoors-open-for-police/?utm_term=.324a4cd7ae49.
The next month, they took: James Cole declined the author’s invitation to be interviewed for this book.
According to the Wall Street Journal: Devlin Barrett, Danny Yadron, and Daisuke Wakabayashi, “Apple and Others Encrypt Phones, Fueling Government Standoff,” Wall Street Journal, November 18, 2014. Available at: http://online.wsj.com/articles/apple-and-others-encrypt-phones-fueling-government-standoff-1416367801.