NEW YORK: The US government is keeping its encryption battle with Apple alive by pressing the high-tech giant to help crack an iPhone for evidential purpose in a drug case in New York.
The US Justice Department filed a letter with a District Court on Friday telling the judge it still wants Apple to extract pictures, text messages and other digital data from an iPhone used by someone accused of trafficking methamphetamines.
Also on Friday, court documents were unsealed showing that Apple rebuffed an order to help break into a locked iPhone for police investigation in Boston. The news came after a high-stakes showdown between Apple and the FBI, over access to an iPhone of the California gunman, ended with investigators saying they had extracted the data on their own.
Timing of the Massachusetts case lent support to Apple’s ongoing argument that the US government was out to set legal precedent that would essentially open a back door into all iPhones.
A judge in Boston on February 1 ordered Apple to help police extract data from an iPhone confiscated last year from an alleged gang member, according to documents posted online by the American Civil Liberties Union.
Apple told AFP it immediately challenged the order on legal grounds, and advised the court it could not unlock the handset as it was powered by the iOS 9 software with updated security features.
The deadline passed for the US government to respond to Apple’s stance on the order, indicating the effort was dropped.
Meanwhile, on February 16, Apple received the legal demand to help FBI in the San Bernardino case, which grabbed headlines as a terror attack and promised to win public support for the government.
Key questions remain about how much access law enforcement agencies should be granted to encrypted devices and how to balance security issues with user privacy rights.
In the New York case, lawyers from the US Justice Department told District Court Judge Margo Brodie in a written filing that “the government continues to require Apple’s assistance in accessing the data as it was authorized to search by a warrant.”
Apple lawyers said they were disappointed by the government’s appeal, arguing that it was an attempt to set a dangerous legal precedent and not really a pursuit of vital information for fighting crime.
In the New York case, the accused drug trafficker confessed and is set to be sentenced, Apple attorneys claimed. Apple is being asked to extract data from an iPhone for sentencing purposes.
By contrast, in the San Bernardino case, the government called on Apple to create a new tool to bypass iPhone security systems to crack into an iPhone used by one of the shooters in a December rampage that left 14 dead.
Apple attorneys said they planned to oppose the government’s effort in the New York case by pressing in court to find out whether it has done everything possible without the company’s help to get the data it seeks and by continuing to argue that the request is not backed by law.
The US Drug Enforcement Agency and the FBI went to court in New York to compel Apple to help it break into an iPhone confiscated in June 2014 from a suspected methamphetamine trafficker, according to court documents.
The US government sought Apple’s assistance to help break into the iPhone under the auspices of the All Writs Act — a 1789 law that gives wide latitude to law enforcement, the same one cited in the San Bernardino case.
Earlier this year a lower court judge in New York sided with Apple, saying law enforcement agencies lacked authority to compel the high-tech giant to comply.
Apple on Friday maintained its position that the government is overreaching its authority, saying elected lawmakers should decide the degree to which third parties can be compelled to work for the government.
Congress is indeed expected to consider legislation that would require technology firms to retain “keys” that could retrieve data under court orders in criminal investigations.
A broad coalition of technology companies and activists have argued against any encryption rules that would allow “special access” for law enforcement, claiming they would create vulnerabilities that hackers or repressive governments could exploit, threatening the security of banking, electronic commerce, trade secrets and more.