Menu
Man whose iPhone passcode DOJ wanted Apple to bypass enters guilty plea

Man whose iPhone passcode DOJ wanted Apple to bypass enters guilty plea

The development removes pressure on a New York court for an expedited decision on the dispute

Jun Feng, a defendant in a criminal case, has entered a guilty plea, removing pressure from a New York court to decide quickly whether Apple is required to aid investigators by bypassing his iPhone 5s passcode.

Feng had been indicted on three counts related to the possession and distribution of methamphetamine. The U.S. Department of Justice had asked the U.S. District Court for the Eastern District of New York for an expedited decision so as to secure evidence in a trial scheduled to begin on Nov. 16.

But on Thursday, DOJ informed the court that Feng has entered a guilty plea. "The government persists in the application pending before the Court, but in view of the guilty plea, no longer requests expedited treatment," U.S. Attorney Robert L. Capers wrote in a letter to Magistrate Judge James Orenstein.

The guilty plea will probably raise questions as to whether access to the iPhone data was really critical to the DOJ's investigations.

The dispute over whether Apple is required to assist the DOJ in its investigations is one of many controversies surrounding the use of access protection and encryption by tech companies in their products and services.

Federal Bureau of Investigation Director James Comey, for example, has complained that the encryption comes in the way of monitoring terrorists who use these encrypted channels for recruitment and other communications. But he ruled out legislation at this point to force tech companies to provide access to these devices and communications, indicating that the government was in negotiations with the companies.

Civil rights and tech industry groups have, meanwhile, asked President Barack Obama to take a stand on the issue by ruling out any dilution of encryption, such as mandating the creation of backdoors for law enforcement.

In the Feng investigation, a magistrate judge in the New York court had issued a warrant to search the phone for evidence but law enforcement was unable to do so because of the passcode mechanism, and asked Apple for assistance.

In the lawsuit, Apple questioned the applicability to the case of the All Writs Act, a federal statute invoked by the DOJ. It has also argued that a company cannot be forced to "take possession of a device outside of its possession or control and perform services on that device."

But at the request of the New York court it provided information on the feasibility and likely burden of executing the DOJ requirement.

The company said it was possible to extract certain types of unencrypted user data from the iPhone 5s phone running iOS 7, though it would not have been possible if it was a device running iOS 8 or higher. But it added that accessing the information on the phone and the possible requirement that Apple staff testify at trial would put an unnecessary burden on the company as the number of government requests increase.

As significant was Apple's comment that forcing it to extract data in the case, without a clear legal authority, could threaten the trust between Apple and its customers and substantially tarnish the Apple brand, which would be a harm to its reputation that could have a longer term economic impact beyond the mere cost of performing the single extraction at issue. "Public sensitivity to issues regarding digital privacy and security is at an unprecedented level. This is true not only with respect to illegal hacking by criminals but also in the area of government access—both disclosed and covert," it said in a filing.

Judge Orenstein had earlier expressed his doubt whether the government could use the All Writs Act to force an electronics device provider to assist law enforcement in its investigations and had asked for comments from Apple on whether executing the order would be unduly burdensome.

The DOJ said that Apple had previously helped law enforcement in federal criminal cases to extract data from password-locked iPhones under court orders. Apple countered that its previous acquiescence to judicial orders does not mean it consents to the process and cannot take a position in response to the court's inquiry. 

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments