Remember the cryptex, the little handheld safe from The Da Vinci Code where entering the correct combination will reveal the secret message and entering the wrong one will destroy it?
Now replace the little safe with an iPhone, and instead of a secret message, it's holding evidence in a terrorism case. The critical combination? It's a passcode — one the FBI doesn't know, and one that Apple is reluctant to help the agency figure out.
Of course, it's more complicated than that. Here are a few key questions and answers about the
dispute between the tech giant and federal investigators
Whose phone are investigators trying to access?
In December, Syed Farook and Tashfeen Malik
attacked the Inland Regional Center in San Bernardino, Calif.
During the investigation, the FBI obtained an iPhone 5c used by Syed Farook. The device was a company phone, owned by Farook's employer, San Bernardino County. Investigators have a warrant to search the phone and also have permission from the county — but the phone is protected by a passcode that the FBI does not know.
The agency has asked Apple to help it circumvent the phone's security features — a request Apple has denied. Now a federal judge
has ordered
What is the FBI looking for?
Investigators say they've already obtained the most recent backup of Farook's iCloud account — but that the iCloud account stopped updating a month and a half before the attack. That suggests there may be something valuable on the actual phone, the U.S. Attorney's Office for the Central District of California wrote in a
court filing
We don't know what, if anything, the phone contains. Law enforcement can typically access some information shared through a phone — such as social media posts, Web searches, some emails and text messages — with a subpoena to telecom and tech companies. But some information, such as iMessages or WhatsApp messages, gets encrypted on the sender's phone and only gets decrypted when delivered, while other data, like photos, might never get shared with another device.
Why does the FBI need Apple's help?
"The encryption is so well done and so hard that they know they're not going to be able to break the encryption or they would have already done that," says Joseph Lorenzo Hall, chief technologist at the Center for Democracy and Technology.
In fact, Apple designed iPhone security with exactly this kind of scenario in mind, saying the company made it
impossible even for Apple
The FBI has the phone, but not the PIN. So can't it just guess? Well, it's stumped by three security features: an auto-erase function that deletes a phone's content after 10 incorrect passcode entries, a mandatory delay between entering passcodes after a certain number of failed attempts, and the requirement that passcodes be entered manually instead of being quickly plugged in by a computer.
What does the FBI want Apple to do?
The FBI
wants the company
"There's breaking encryption, which is effectively either exhaustively guessing or finding a flaw in the actual way the encryption is performed. And there's messing with the security software that serves as glue around the encryption pieces to make the thing work," Hall says.
Here's a helpful analogy from Matthew Green,
cryptographer and associate professor
Think of your phone as a bank. Inside it is a safe that has your information — emails, messages, photos. The FBI is outside the bank, unable to get through the front door to try to crack the safe. So it's asking Apple to help get inside the bank so it can set up a safecracking team to try various combinations to open it.
If Apple complies with the judge's order, "all that would give [the FBI] is the ability to get close to that encryption core," says Green.
"I think the FBI acknowledged that Apple is not lying when it says that the best Apple can really potentially do is get them onto the phone and help them guess the passcode."
What would Apple's cooperation look like?
The FBI has proposed that Apple could get it closer to the safe inside that bank (to follow the earlier analogy) by building software that could be loaded onto the phone and would allow the FBI to try out unlimited passcodes to see which one works.
If Farook's passcode consisted only of four digits, security experts say, it could take as little as 30 minutes to find it (though of course far longer if it's a complex alphanumeric one). The FBI thinks that software is feasible — but it has to be made by Apple, not another developer, because only Apple has the proper security credentials to push new software to iPhones.
Why doesn't Apple want to comply?
Apple says building that kind of software would amount to building a whole "new version of the iPhone operating system," customized to lift the security restrictions. Here's what CEO Tim Cook
said in an open letter
So ... is the FBI asking for a "backdoor"?
Apple has described the FBI's request as amounting to asking for "a backdoor to the iPhone" — a flaw in a security system purposefully designed to help law enforcement break in for investigations.
But unlike the FBI's
policy demands for encryption backdoors
"They are not asking Apple to redesign its product or to create a new backdoor to one of their products. They're simply asking for something that would have an impact on this one device," White House spokesman Josh Earnest has said.
But Apple says such a tool, once created, would be too easy to reuse.
"They don't want this software in the world," Green says. "Once they build it, they're potentially going to have to break it out every time the FBI comes back."
How is the FBI trying to compel Apple to cooperate?
The FBI is citing a two-sentence law that dates to the birth of America's legal system.
The
All Writs Act
In 2014, at the Justice Department's request, a federal court in New York used the law to
order a phone-maker to unlock a password-protected device
But Apple says the use of the All Writs Act in this instance — pushing a manufacturer not to unlock a phone but to develop a system for breaking into a phone designed to be impossible to unlock — is "unprecedented."
"If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone's device to capture their data," Cook writes in his open letter.
What's next?
Apple has five business days to formally respond to the court order issued Tuesday.
Last fall, the Justice Department, using the All Writs Act, tried to force Apple to
unlock an iPhone running iOS 7
Regardless of how Apple chooses to respond, this case might turn into a lengthy battle — one that could eventually work its way to the U.S. Supreme Court.
Is this a new dispute between Apple and the government?
Not by a long shot.
Apple and the federal government have been arguing about encryption for years. The debate has taken various forms — fighting over the FBI's requests for
backdoors into Apple encryption
The rhetoric has been hot — expressed in life-or-death terms. In November 2014,
The Wall Street Journal reported
Apple isn't the only one in this fight — Google, too, has beefed up its encryption
within the past few years
"Some of our most personal data is on the phone: our financial data, our health information, our conversations with our friends and family and co-workers," he told
NPR in October 2015