Apple - DOJ Motion To Compel
Apple - DOJ Motion To Compel
Apple - DOJ Motion To Compel
1
2
3
4
5
6
7
8
9
10
11
EILEEN M. DECKER
United States Attorney
PATRICIA A. DONAHUE
Assistant United States Attorney
Chief , National Security Division
TRACY L. WILKISON (California Bar No. 184948)
Assistant United States Attorney
Chief , Cyber and Intellectual Property Crimes Section
ALLEN W. CH IU (California Bar No. 240516)
Assistant United States Attorney
Terrorism and Export Crimes Section
15 00 United States Courthouse
312 North Spring Street
Los Angeles, California 90012
Telephone:
(2 1 3) 894-0622/2435
Facsimile:
(213) 894 - 8601
Email:
Tracy .Wilkison@usdoj . gov
Allen.Chiu@usdo j.gov
13
15
16
17
("".)
c-.>r
Clerk
DIST.
CENTRAL
12
14
BY
18
CM 16 i o
ED No.
(SP)
19
20
21
22
23
24
25
and Allen
26
27
28
w.
FBI and the underlying search warrantr and such further evidence and
7
8
9
10
11
12
13
14
15
16
Dated: February 19
2016
Respectfully submitted(
EILEEN M. DECKER
United States Attorney
PATRICIA A. DONAHUE
Assistant United States Attorney
Chiefr National Security Division
ALLEN W. CHIU
Assistant ~i'!!'ed,,~ates Attorneys
Attorneys for Applicant
UNITED STATES OF AMERICA
17
18
19
20
21
22
23
24
25
26
27
28
TABLE OF CONTENTS
DESCRIPTION
TABLE OF AUTHORITIES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
I.
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
II.
STATEMENT OF FACTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
A.
PAGE
This Court's All Writs Act Order is Lawful and Binding .... 7
10
1.
11
2.
12
3.
4.
5.
6.
13
14
15
16
17
18
B.
19
20
21
22
23
IV.
2.
CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
24
25
26
27
28
TABLE OF AUTHORITIES
DESCRIPTION
FEDERAL CASES
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
PAGE
(2014) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
25
26
27
28
ii
1
2
3
4
5
FEDERAL STATUTES
18
u.s.c.
2510 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
18
u.s.c.
3103 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
10
28
u.s.c.
1651 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
11
47
u.s.c.
1001 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
12
47
u.s.c.
1002 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22,
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
iii
23
1
2
INTRODUCTION
1.
technology, rather th2n the law, to control access to data which has
investigation.
See Exhibit
10
11
to obey it.
12
Before Syed Rizwan Farook ("Farook") and his wife Tafsheen Malik
13
14
15
iPhone.
16
17
18
19
may contain critical communications and data prior to and around the
20
21
may reside solely on the phonei and (3) cannot be accessed by any
22
23
obtained a warrant to search the iPhone, and the owner of the iPhone,
24
Farook's employer, also gave the FBI its consent to the search.
25
26
27
warrant.
28
Apple refused.
(1)
The government
The phone
(2)
The FBI
requires Apple to assist the FBI with respect to this single iPhone
the passcode.
"decrypt
11
2016.
The Order
11
11
to every
access to
its own phones; it does not give the government "the power
10
11
12
information.
13
14
15
16
See Exhibit 1.
11
In factr
17
18
19
versions of iOS.
20
21
it for years.
22
23
24
25
26
27
28
instead
S0,
11
appears to be based on its concern for its business model and public
While the Order includes the provision that "to the extent that Apple
statement makes clear that Apple will not comply with the Court's
Order.
10
heard, and expects these issues to be fully briefed before the Court;
11
12
that Apple has made its intention not to comply patently clear. 3
13
14
15
II.
16
17
STATEMENT OF FACTS
18
19
were filed on February 16, 2016, the FBI has been investigating the
20
21
22
23
24
25
26
27
28
Since that time, the FBI has been tirelessly investigating the
precise role of those who may have been involved in the attack.
search, among other locations and items, the digital devices and
As
10
11
12
13
14
15
16
Iraq and the Levant ("ISIL"), also referred to as the Islamic State
17
18
19
20
2004.
21
22
23
24
25
26
27
28
vehicle also ordered the search of digital devices located within it.
10
The
11
the owner's consent to search the SUBJECT DEVICE, the FBI has been
12
13
14
15
16
17
18
19
20
21
inaccessible) .
22
23
24
the iCloud account associated with the SUBJECT DEVICE indicates that
25
Farook communicated with victims who were later killed during the
26
27
28
government has been able to obtain for the account ends on October
19, 2015.
that Farook communicated with Malik using the SUBJECT "DEVICEE between
July and November 2015, but this information is not found in the
communications and data prior to and around the time of the shooting
that thus far has not been accessed, may reside solely on the SUBJECT
DEVICE; and cannot be accessed by any other means known to either the
10
11
government or Apple.
When the government first realized that Apple retained the means
12
to obtain that data from the SUBJECT DEVICE and that due to the way
13
that Apple created the software Apple was the only means of obtaining
14
15
16
17
18
19
Act, compelling Apple to assist the FBI in its search of the SUBJECT
20
DEVICE.
21
Apple
22
See
23
Exhibit 1.
24
25
26
time- or labor-intensive.
27
28
III. THE COURT SHOULD ISSUE AN ORDER COMPELLING APPLE TO COMPLY WITH
ITS ORDER REQUIRING ASSISTANCE WITH THE FBI'S SEARCH OF THE
SUBJECT DEVICE PURSUANT TO THE ALL WRITS ACT
A.
To the extent that Apple objects that the Court does not have
authority under the All Writs Act to compel Apple to assist in the
10
11
12
13
14
15
16
17
1.
The All Writs Act provides in relevant part that "all courts
18
19
20
21
22
23
24
25
the power,
26
27
officers."
28
Cir. 1979)
(1985).
28 U.S.C.
1651(a).
As the
Plum Creek Lumber Co. v. Hutton, 608 F.2d 1283, 1289 (9th
(citing United States v. New York Telephone Co., 434 U.S.
7
159 (1977)).
omitted) .
Act.")
(citation omitted) .
10
In New York Telephone Co., the Supreme Court held that courts
11
have authority under the All Writs Act to issue supplemental orders
12
13
Court held that "[t]he power conferred by the Act extends, under
14
15
16
17
administration of justice, ... and encompasses even those who have not
18
19
20
21
41.
22
23
Tel. Facilities (Mountain Bell), 616 F.2d 1122, 1132-33 (9th Cir.
24
1980)
25
26
27
172)).
28
Id. at 174.
The
In
New York Telephone Co. also held that "Rule 41 is not limited
cause."
trace device
Co. and Mountain Bell, the Court had authority pursuant to the All
Further, based on the authority given under the All Writs Act,
10
courts have issued orders, similar to the one the Court issued here,
11
12
13
originally contemplated.
14
15
16
(S.D.N.Y. Oct. 31, 2014); see also United States v. Navarro, No. 13-
17
18
19
20
and trace device (Mountain Bell, 616 F.2d at 1129); ordering a credit
21
22
23
24
25
26
27
28
See,
e.g.,
In
Apple has long recognized this application, and has complied with
10
11
12
factors in concluding that the issuance of the All Writs Act order to
13
14
company was not "so far removed from the underlying controversy that
15
16
Second, it concluded that the order did not place an undue burden on
17
18
19
warrant.
20
21
22
23
24
25
26
27
28
See id.
2.
Id. at 174.
10
Apple designed, manufactured and sold the SUBJECT DEVICE, and wrote
to the SUBJECT DEVICE or any other Apple device, and has marketed its
www.apple.com/business/docs/iOS_Security_Guide.pdf.
See,
which software is
e.g.,Apple's
Security Guide,
Apple designed
the
10
11
12
13
14
15
process take too long to enable the access ordered by the Court.
16
Especially but not only because iPhones will only run software
17
18
19
20
21
22
customer and that customer has created a passcode does not mean that
23
the close software connection ceases to exist; Apple has designed the
24
25
connection is required.
26
The same
27
28
lawfully used."
10
11
12
13
14
15
16
17
source code necessary to modify and install the software, and where
18
that very software now must be used to enable the search ordered by
19
20
Telephone Co.
21
Moreover, other courts have directed All Writs Act orders based
22
For example,
23
neither the credit card company in Hall nor the landlord in Access to
24
25
26
27
28
12
Apple's close
3.
The Order has also not placed any unreasonable burden on Apple.
Telephone Co., 434 U.S. at 175 (holding that All writs Act order was
10
11
12
13
14
15
16
17
18
19
Mountain Bell,
20
21
22
23
24
code that may not now exist in the exact form required does not an
25
which is
is
26
27
28
All Writs Act has been compelled to provide something that did not
previously exist
10
11
12
13
14
15
16
17
18
19
that Apple was responsible for writing to begin with would not be
20
unduly burdensome.
21
have the technical ability to comply with the Order, or that the
22
23
development task.
By
24
25
assistance ordered by the Court "could be used over and over again,
26
27
to hack our own users," the Order is tailored for and limited to this
28
particular phone.
efforts to search the phone; it does not require Apple to conduct the
and make clear to the world that it does not apply to other devices
Order presents no danger for any other phone and is not "the
10
11
of locks."
To the extent that Apple claims that the Order is unreasonably
12
13
14
15
16
17
to our traditions."
18
19
20
21
22
23
24
cause.
25
26
customers.
27
28
The
Apple
As
15
phone, and the owner of the phone consents both to the search of the
ramifications of compliance.
For example, an All Writs Act order may be used to require the
10
F. 3d 325, 329 (7th Cir. 1995), even though the subject may face
11
12
13
14
15
16
17
18
19
4.
Apple's
20
In New York Telephone Co., the Court held that the order met that
21
22
23
24
25
26
27
28
terrorism investigation.
murderer who caused the death of a large number of his coworkers and
the shooting of many others, and who built bombs and hoarded weapons
backups for the SUBJECT DEVICE, and executed a warrant to obtain all
Evidence in
10
Importantly,
11
however, the most recent backup of the iCloud data obtained by the
12
government was dated October 19, 2015, approximately one and a half
13
14
communications and data around the time of the shooting that may
15
reside solely on the SUBJECT DEVICE and can only be obtained if the
16
17
18
19
cryptographically sign code for the SUBJECT DEVICE that only Apple
20
has, the FBI cannot attempt to determine the passcode without fear of
21
22
23
data from the SUBJECT DEVICE with Apple, technicians from both Apple
24
and the FBI agreed that they were unable to identify any other
25
methods - besides that which is now ordered by this Court - that are
26
27
28
17
SUBJECT DEVICE. 7
issued.
5.
4
5
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
The four suggestions that Apple and the FBI discussed (and
their deficiencies) were: (1) to obtain cell phone toll records for
the SUBJECT DEVICE (which, while the government has of course done
so, is insufficient because there is far more information on the
SUBJECT DEVICE than simply toll records); (2) to determine if any
computers were paired with the SUBJECT DEVICE to obtain data (which
the government has determined that none were); (3) to attempt an
auto-backup of the SUBJECT DEVICE with the related iCloud account
(which would not work in this case because neither the owner nor the
government knew the password to the iCloud account, and the owner, in
an attempt to gain access to some information in the hours after the
attack, was able to reset the password remotely, but that had the
effect of eliminating the possibility of an auto-backup) ; and (4)
obtaining previous back-ups of the SUBJECT DEVICE (which the
government has done, but is insufficient because these backups end on
October 19, 2015, nearly one-and-a-half months prior to the IRC
shooting incident, and also back-ups do not appear to have the same
amount of information as is on the phone itself). After subsequent
conversations, though, Apple conceded that none of these suggestions
would work to execute the search warrant or to sufficiently obtain
the information sought.
18
criminals who want to access it, steal it, and use it without our
knowledge or permission."
unlawful access
accessing it.
See Exhibit 1.
[their]
[their] location, or
10
11
12
permission."
13
14
15
16
Americans and wounded 22 others on our own soil, the other directing
17
18
19
20
21
inaccurate characterization.
22
application for the All Writs Act Order, the government asks that
23
24
25
26
27
has coded into its operating system, for the SUBJECT DEVICE only.
28
19
In
determining the passcode without risk that the data subject to search
wrong attempts.
turned off.
The Order
10
11
12
13
14
over software to the government so that the government can run the
15
16
the SUBJECT DEVICE to load the programs in its own secure location,
17
similar to what Apple has done for years for earlier operating
18
systems, and permit the government to make its passcode attempts via
19
remote access.
20
21
have access to the software required by the Order unless Apple itself
22
23
required by the Order would go into the "wrong hands" and lead to
24
25
26
In this fashion,
27
28
court-issued warrants.
6.
Strong public policy interests favor enforcing the All Writs Act
10
11
12
13
14
search warrant.
15
16
17
("a warrant may be issued to search for and seize any property that
18
19
California, 134 S. Ct. 2473, 2495 (2014), the Supreme Court set the
20
21
22
23
24
25
26
27
28
B.
Here, this
"get a warrant."
3103a(a)
Recently, in Riley v.
comply with the Order because the All Writs Act has been limited by
Congress.
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
The Supreme Court has made clear that "[t]he All Writs Act is a
residual source of authority to issue writs that are not otherwise
covered by statute[,]" such that courts may not rely on the All Writs
Act "[w]here a statute specifically addresses the particular issue at
hand[.]"
In this
1002,
Id.
information.
present dispute and does not limit this Court's authority under the
a search warrant.
10
appropriate for a
11
12
decided New York Telephone Co. in 1977, Congress had enacted Title
13
14
15
non-content information.
16
of 1986
17
18
court
19
20
21
22
23
24
25
26
27
28
23
addressing pen registers, the Supreme Court held that an All Writs
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
2.
The current lack of congressional action regarding encryptionrelated issues does not deprive this Court of its authority to issue
the Order in this case.
courts may not rely on the All Writs Act where "a statute
specifically addresses" an issue.
Courts may not categorically refuse to rely on the All Writs Act
Apple would seemingly want the Court to do
declined to legislate.
as
These
lose an authority to issue orders under the All Writs Act merely
All Writs Act Order ccnsistent with New York Telephone Co.
IV.
10
CONCLUSION
This Court issued a valid Order pursuant to the All Writs Act
10
11
stated that it will oppose this Order, and has not agreed to comply.
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
10
EXHIBIT 1
Customer
Letter- Apple
Page
I of3
Case 5:16-cm-00010-SP
Document 1 Filed 02/19/16 Page 32 of 35 Page ID
#:32
http://www.apple.com/customer-letter/
2/17/2016
Customer
Letter - Apple
Page
2 of3
Case 5:16-cm-00010-SP
Document 1 Filed 02/19/16 Page 33 of 35 Page ID
#:33
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing
several important security features, and install it on an iPhone recovered during the investigation. In
the wrong hands, this software- which does not exist today -would have the potential to
unlock any iPhone in someone's physical possession.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS
that bypasses security in this way would undeniably create a backdoor. And while the government
may argue that its use would be limited to this case, there is no way to guarantee such control.
A Dangerous Precedent
Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented
use of the All Writs Act of 1789 to justify an expansion of its authority.
The government would have us remove security features and add new capabilities to the operating
system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone
by "brute force," trying thousands or millions of combinations with the speed of a modern computer.
The implications of the government's demands are chilling. If the government can use the All Writs Act
to make it easier to unlock your iPhone, it would have the power to reach into anyone's device to
capture their data. The government could extend this breach of privacy and demand that Apple build
surveillance software to intercept your messages, access your health records or fmancial data, track
your location, or even access your phone's microphone or camera without your knowledge.
Opposing this order is not something we take lightly. We feel we must speak up in the face of what we
see as an overreach by the U.S. government.
http://www.apple.com/customer-letter/
2/17/2016
Customer
Letter - Apple
Page
3 of3
Case 5:16-cm-00010-SP
Document 1 Filed 02/19/16 Page 34 of 35 Page ID
#:34
We are challenging the FBI's demands with the deepest respect for American democracy and a love
of our country. We believe it would be in the best interest of everyone to step back and consider the
implications.
While we believe the FBI's intentions are good, it would be wrong for the government to force us to
build a backdoor into our products. And ultimately, we fear that this demand would undermine the very
freedoms and liberty our government is meant to protect.
Tim Cook
Apple Store
For Education
a Store
Account
About Apple
Apple Info
Job Opportunities
iCloud.corn
Prest~ Info
iPad
Genius Bar
iPhone
Watch
Youth Programs
For Business
TV
iPhone in Business
Apple Values
Refu urbished
1Pad in Business
Environment
Hot News
Financ1ng
Mac
Supplier Responsibility
Legal
Accessibility
Contact Apple
and Recycling
iPod
ReUse
~...._ccessones
Order Status
in 8usiness
Investors
Events
Privacy
Inclu.sion and Diversity
..
See Map
http://www.apple.com/customer-letter/
2/17/2016
2
3
4
CERTIFICATE OF SERVICE
I, REBECCA EVANS, declare:
That I am a citizen of the United States and resident or employed in Riverside
County, California ; that my business address is the Office of United States Attorney , 3403
Tenth Street, Suite 200, Riverside , CA 92501 ; that I am over the age of eighteen years , and
am not a party to the above-entitled action ; That I am employed by the United States
8
9
10
11
12
13
Attorney for the Central District of California who is a member of the Bar of the United States
District Court for the Central District of California, at whose direction I served a copy:
14
15
16
17
18
Ms . Nicola T. Hanna
Gibson , Dunn & Crutcher LLP
nhanna@gibsondunn .com
19
20
21
22
23
24
25
26
27
28