against
Apple Inc. and
Google: The United States federal government has revived use of the All Writs Act in the 21st century, notably to gain access to password-protected
mobile phones in domestic terrorism and narcotics investigations. The government has been trying to use the All Writs Act since at least 2008 to force various companies to provide assistance in cracking their customers' phones. The
American Civil Liberties Union has confirmed at least 76 cases in 22 states where the government applied for an order under the All Writs Act. In addition, Apple has identified 12 pending cases in its court documents, and the ACLU has found one additional case in
Massachusetts. On October 31, 2014, a judge in the
United States District Court for the Southern District of New York authorized a writ directing a mobile phone manufacturer, whose identity was not disclosed, to assist an investigation of credit card fraud by bypassing a phone's password screen. On November 3, 2014, the Oakland Division of the U.S. Attorney's Office named
Apple Inc. in papers invoking the Act, which were filed in the
United States District Court for the Northern District of California. Federal law enforcement sought to require Apple to extract data from a locked
IPhone 5s as part of a criminal case. On February 16, 2016, the Act was invoked again in an order that Apple Inc. create a special version of its
iOS operating system with certain security features removed for Federal law enforcement officers to use as part of an investigation into the
2015 San Bernardino terrorist attack. The head of the FBI stated that what was requested was that Apple disable the iPhone's feature that erases encrypted data on the device after ten incorrect password attempts. Apple claimed that complying with the order would make
brute force password attacks trivial for anyone with access to a phone using this software. Apple CEO
Tim Cook in an
open letter warned of the precedent that following the order would create. On the same day, the
Electronic Frontier Foundation announced its support for Apple's position. Several public figures have joined the debate. On March 20, 2017, the
United States Court of Appeals for the Third Circuit stated that a decryption order issued under the Act did not violate the
Fifth Amendment privilege against
self-incrimination if the contents of a hard drive were a "foregone conclusion." In court filings, Apple has argued that
Congress has established guidelines for what is required of private entities in such circumstances in the
Communications Assistance for Law Enforcement Act of 1992 (CALEA). The DOJ has argued, both in October in Brooklyn and in filings on February 19, 2016, that CALEA does not apply to these cases, which involve "data at rest rather than in transit", an important distinction for determining whether CALEA applies, nor does it alter the authority granted the courts under the All Writs Act. On February 29, 2016, Magistrate Judge James Orenstein issued an order denying the government's request in its effort to decrypt an iPhone for admission as evidence. Senator
Ron Wyden (D-OR), a privacy advocate on the
United States Senate Select Committee on Intelligence, argued: "If the FBI can force Apple to build a key, you can be sure authoritarian regimes like
China and
Russia will turn around and force Apple to hand it over to them. They will use that key to oppress their own people and steal U.S. trade secrets." ==References==