FBI v. Apple: Why CALEA Matters So Much

Author’s Note: For an outline of how I think FBI v. Apple will play out, please see HERE.

Today I want to focus on whether existing legislation precludes the FBI from compelling Apple to hack their own encryption. Next week, I will dive into the question of whether or not the FBI’s request is “unduly burdensome” under the All Writs Act.

All Writs Act

The essence of Apple’s legal argument is that the Courts do not have the authority, under the All Writs Act, to compel Apple to break their own encryption on the behalf of the FBI.

The government has acknowledged that the authority for their request rests solely upon the All Writs Act. So, to understand this case, we must first understand the All Writs Act. Let’s start by looking at the statute itself.

28 U.S. Code § 1651 – Writs

The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.

Over time, the courts have imposed some important limitations on the All Writs Act.

The All Writs Act is not a grant of power to the Courts. It is designed to allow the courts to use the power they have been granted, or already possess, in order to fill in any procedural gaps necessary to implement other, existing laws. Nor is the All Writs Act to be used merely because it is convenient to do so. It is to be used when inaction would otherwise cause an existing law to falter. This is why the Act does not apply where Congress has spoken or has elected not to speak.

Where a statute exists, the statute, not the All Writs Act, is controlling. ((See Pennsylvania Bureau of Correction v. U.S. Marshals Service, 474 U.S. 34, 43 (1985) (“Where a statute specifically addresses the particular issue at hand, it is that authority, and not the All Writs Act, that is controlling.”) ))

CALEA

The Communications Assistance for Law Enforcement Act is better known as CALEA. It presents four challenges to the FBI’s position in this case.

1.0. Four Challenges

1.1. Legislation Trumps The All Writs Act

The Supreme Court has stated that where a statutory scheme governs a particular subject matter, the All Writs Act’s residual power does not apply.

Where a statute specifically addresses the particular issue at hand, it is that authority, and not the All Writs Act, that is controlling. ~ U.S. Supreme Court, Pennsylvania Bureau of Correction v. U.S. Marshals Service, 474 U.S. 34, 43 (1985)

1.2. CALEA Is Controlling

CALEA forced telecommunications carriers (telephone companies) to design their networks to better enable wiretapping by law enforcement. A telecommunications carrier is defined as:

(An) entity engaged in the transmission or switching of wire or electronic communications as a common carrier for hire. ~ 47 U.S.C. 24 § 1001(8)(A)

When Congress enacted CALEA, it exempted “information services” from its terms.

(CALEA) does not include persons or entities insofar as they are engaged in providing information services. ~ 47 U.S.C. § 1001(8)(C)(i)

Apple squarely falls within the definition of “information services.”

(T)he government does not dispute, or even discuss, that CALEA excludes “information services” providers from the scope of its mandatory assistance provisions. 47 U.S.C. § 1002(b)(2). ~ Apple Pleadings

“Information providers,” like Apple, are not considered to be “telecommunications carriers,” (telephone companies) and CALEA does not compel Information providers to assist law enforcement in obtaining data stored on the devices that they sell.

1.3.Legislative History

In 2013, the FBI tried to broaden both the scope and the powers conveyed in CALEA. More specifically, the FBI wanted CALEA to cover a multitude of additional companies, including Apple, and they wanted the act to grant them more power regarding encryption and other like matters. The legislative history on this matter is clear and unambiguous. Congress considered the proposed legislation and declined to act.

Congress thus considered shifting to third parties like Apple the very burden the government now asks this Court to impose, but it declined, knowing full well this meant there would be some communications that law enforcement could not access. ~ Apple Pleadings

The quote, above, makes an important point. The FBI has been kvetching that Apple is using their encryption to “obstruct justice”; that they are placing their own selfish interests above the legitimate needs of law enforcement. But it was Congress, not Apple, that made those policy tradeoffs when they enacted CALEA. If Congress had felt that the FBI’s need to know trumped the public’s need for privacy and security, Congress should not have, would not have, passed CALEA.

1.4. Exempted Encryption

The CALEA statute was a compromise, reached only after long, contentious negotiations. At the time it was passed, CALEA was considered a victory for law enforcement and a defeat for privacy advocates. Law enforcement won an extensive, but specific, list of wiretapping assistance from the telephone companies but, in exchange, they had to give something up. That something was any say in the encryption being created and distributed by information services, such as Apple.

1.4.1.Legalizing Encryption

CALEA made encryption legal.

Nothing in the bill is intended to limit or otherwise prevent the use of any type of encryption within the United States.

1.4.2. No Duty To Decrypt

CALEA explicitly stated that the government could not force information services (like Apple) to “decrypt[] or ensur[e] the government’s ability to decrypt” communications or information stored on their customers’ devices.

1.4.3. No Back Doors

CALEA specifically prohibited law enforcement agencies from requiring any specific design of equipment, facilities, services, features, or system configurations. In other words, Congress exempted Apple, and other companies, from creating backdoors — the very same back doors that the FBI now demands Apple create.

(CALEA) does not authorize any law enforcement agency…
(a) to require any specific design of equipment, facilities, services, features, or system configurations to be adopted by any provider of a wire or electronic communication service, any manufacturer of telecommunications equipment, or any provider of telecommunications support services;
(b) to prohibit the adoption of any equipment, facility, service, or feature by any provider of a wire or electronic communication service, any manufacturer of telecommunications equipment, or any provider of telecommunications support services.

The FBI’s demand that Apple create and implement a work-around for the iPhone’s security features is, in fact, doing exactly what CALEA prohibits.

2.0. Four Rebuttals

Let’s look at how the FBI rebuts the assertion that CALEA, and not the All Writs Act, is controlling.

2.1. Legislation Trumps The All Writs Act

The FBI concedes that where legislation applies, the legislation, not the All Writs Act, is controlling.

2.2. CALEA Is Controlling

However, the FBI denies that CALEA is controlling. They contend that CALEA is not directly applicable to the current circumstances and that it is necessary for the courts to use the All Writs Act in order to fill in the legislative holes, and make the legislation whole.

2.2.1. Not On Point

The FBI, in its own words, argues:

Contrary to Apple’s claims CALEA did not deprive this Court of its power to issue the Order.

The statute does not address the particular issue before this Court.

(T)he (All Writs Act) “is controlling” unless “a statute specifically addresses the particular issue at hand.” Pennsylvania Bureau of Correction v. U.S. Marshals Serv. , 474 U.S. 34, 43 (1985)

(I)t is not enough for other laws to brush up against similar issues. Rather, Congress must legislate so “intricately” as to leave “no gap to fill.” The Company v. United States , 349 F.3d 1132, 1145 n.26 (9th Cir. 2003) ~ FBI Pleadings

Eh, I don’t know about that.

It seems to me that CALEA is directly on point. Of course, that’s for the courts, not me, to decide. But then again, as we’ll soon see, the courts have decided.

The FBI leans heavily on the language used in “New York Telephone” to support its contention that CALEA is not applicable here:

New York Telephone Co. further illustrates that it is appropriate for a court to rely on the All Writs Act unless a statute specifically addresses the particular issue at hand.

What the FBI neglects to mention is that in “New York Telephone,” the Supreme Court emphasized that the All Writs Act had to be aligned with congressional intent and that it could only be used as a gap-filler when it “was consistent with the intent of congress.”

Frankly, I don’t see how Congress could had made CALEA any more applicable than it is already.

— CALEA legalizes encryption;
— CALEA says that law enforcement can’t forbid the use of encryption; and
— CALEA says that law enforcement can’t specify how that encryption is designed.

Yet the FBI says, “(t)he statute does not address the particular issues before the court”?

Really?

Seriously?

CALEA doesn’t just “brush up” against the facts in this case. It meets them head on.

2.2.2. Not Comprehensive, But Piecemeal

In addition to arguing that CALEA is not applicable, the FBI also argues that CALEA is not comprehensive, and that the courts need to exercise their power under the All Writs Act in order to fill in the legislative gaps that CALEA has left unattended.

CALEA, passed in 1994, does not “meticulously,” “intricately,” or “specifically” address when a court may order a smartphone manufacturer to remove barriers to accessing stored data on a particular smartphone.

(T)his piecemeal legislation indicates Congress’s incremental approach to legislating in this area, rather than Congress’s intent to comprehensively legislate.

CALEA not comprehensive? Say what now?

There are, in fact, few areas of the law where Congress has provided more legislative guidance than they have with CALEA.

2.3. Legislative History

The courts have long held that where legislation exists, the All Writs Act does not apply. But the courts have also held that even failed attempts to legislate may be indicative of when the courts should, and should not, apply the All Writs Act.

(The All Writs Act) cannot be a means for the executive branch to achieve a legislative goal that Congress has considered and rejected. ~ Magistrate Judge Orenstein

Emphasis added.

The FBI disagrees, claiming that the courts should not draw meaning from congressional silence. ((In F.T.C. v. Dean Foods Co. , 384 U.S. 597, 600 (1966) ))

The applicable case law weighs heavily against the FBI’s position…

The government wrongly asserts that legislative intent can never be discerned from an absence of affirmative legislation. Although silence is sometimes a weak indicator of intent, it is a different story when Congress actively considers legislation to address a major policy issue, yet deliberately declines to enact it, see, e.g., Bob Jones Univ. v. United States, 461 U.S. 574, 600 (1983) ~ Apple Pleadings

… and CALEA, and the proposed CALEA II, were not instances of “congressional silence.” Far from it.

(F)or years … the Department of Justice and the (FBI) have urged this committee to give them the authority to mandate that companies create backdoors (but Congress has) so far refused. ~ Ranking Member John Conyers of the House Judiciary Committee

Nevertheless, the FBI persists in their claim that where legislation is absent, legislative intent cannot be discerned. Magistrate Judge Orenstein points out the logical absurdity of the FBI’s position:

(T)he government’s construction of the (All Writs Act) produces absurd results in application. If, for example the President sent to Congress a bill explicitly authorizing a court to issue the kind of order the government seeks here, and if every single member of the House and Senate were to vote against the enactment of such a law citing the kinds of data security and personal privacy concerns that Apple now embraces, the government would nevertheless describe the order sought here as permissible because Congress had merely rejected the bill – however emphatically, and however clear its reasons for doing so – rather than affirmatively passing legislation to prohibit the executive branch’s proposal. ~ Magistrate Judge Orenstein

With the rejection of CALEA II, Congress denied the FBI the very powers that they are now seeking to obtain from the courts.

Congress surely did not intend to allow parties specifically exempted by CALEA (such as Apple) to be subjected to it. The government fails to address this truism. ~ Apple Pleadings

The All Writs Act was not designed to give the FBI that which Congress had denied them.

Where a court issues an order “that accomplishes something Congress has considered but declined to adopt – albeit without explicitly or implicitly prohibiting it” that order is not agreeable to the “usages and principles of law.” In re Order, 2016 WL 783565, at *9. ~ Magistrate Judge Orenstein

2.4. Exempted Encryption

The FBI also insists that:

(T)he (FBI’s requested) Order does not dictate “any specific design”

Query: How exactly does an order mandating that Apple has to disable three of its security features ((1) Delay in inputing passwords; 2) Not erase data after 10 incorrect attempts; 3) Allow for the passcode to be rapidly input by computer, rather than by hand.)) not dictate “any specific design”?

The government’s assertion that the order does not dictate “any specific design,” is baseless given that the order commands Apple to design specific new software with specific capabilities. ~ Apple Pleadings

In their pleadings, the FBI scolds Apple for selfishly placing their business interests above the law:

Apple has attempted to design and market its products to allow technology, rather than the law, to control access to data. ~ FBI Pleadings

The FBI has it exactly backwards. Under the aegis of CALEA, it is perfectly legal for Apple to create and market products that contain encryption. What CALEA made illegal was for the government to tell companies whether they could, or how they should, make encrypted products. Yet that is exactly what the oh-so-self-righteous FBI is attempting to do.

The Justice Department and FBI are seeking an order from this Court that would force Apple to create exactly the kind of operating system that Congress has thus far refused to require. ~ Apple Pleadings

Falling Down The Rabbit Hole

So, let’s recap. The FBI has denied that CALEA is applicable, denied that their failed attempts to expand CALEA should be taken into account, and denied that they, in defiance of CALEA, are dictating to Apple how they must design their encryption.

But it’s not enough for the FBI to show that CALEA doesn’t apply, they must also show that the All Writs Act does apply.

And now, like Alice of Wonderland fame, the FBI asks us to fall down the rabbit hole into a world of make believe and nonsense.

falling_down_the_rabbit_hole_by_journeybunny-d92x3ja

(CALEA) does not destroy any existing authority—or even speak to the courts’ power at all. ~ FBI Pleadings

Well, that’s not strictly accurate. Where CALEA applies, the All Writs Act does not.

But what exactly is the FBI driving at here? They seem to be implying that if Congress doesn’t specifically tell the courts that they CAN’T do a thing, then they CAN do that thing. Which is weird, because Congress doesn’t write laws and then say, “Oh, by the way, the Courts have no power to enable law enforcement to do what we’ve forbidden law enforcement to do.”

(CALEA) limits only the authority given to “law enforcement agenc[ies]” ~ FBI Pleadings

Whoa, whoa, whoa! Do you see where the FBI is headed here?

— First they say CALEA doesn’t apply to the Courts;
— Then they say CALEA only applies to law enforcement.

The alarming conclusion the FBI draws from these twin premises is:

— The Courts can use the All Writs Act to grant the FBI the power it seeks because Congress did not specifically prohibit the courts from doing so.

But wait, the FBI is not done yet. They then extend their train of thinking to its logical terminus:

— The Courts can use the All Writs Act to grant the FBI the power it seeks — even if Congress specifically denied the FBI that very selfsame power — because Congress did not specifically prohibit the courts from doing so.

The government thus asks me to read into the All Writs Act an empowerment of the judiciary to grant the executive branch authority to use investigative techniques either explicitly denied it by the legislative branch, or at a minimum omitted from a far-reaching and detailed statutory scheme that has received the legislature’s intensive and repeated consideration. Such a broad reading of the statute invites an exercise of judicial activism that is breathtaking in its scope…. ~ Magistrate Judge Orenstein

Under the FBI’s interpretation of the All Writs Act, CALEA simply does not matter. It’s irrelevant. Why? Because CALEA tells the FBI what they can and can’t do but it doesn’t tell the courts a damn thing. So the courts can do what they want, even if what they want is exactly the opposite of what Congress wants.

Well, I never heard it before, but it sounds uncommon nonsense. ~ Lewis Carroll, Alice in Wonderland

Through The Looking Glass

If the FBI’s interpretation of the All Writs Act is correct — and the courts can grant that which the legislature has denied — then you have to wonder:

— Why did the FBI even bother to ask Congress for the powers provided in CALEA?

— Why did the FBI go back to Congress and ask for more power in the proposed, but un-enacted, CALEA II?

— For that matter, if the All Writs Act has, since 1789, provided the courts with the authority to give the FBI the power it is now demanding — and the FBI assures us that it does — then why bother with Congress at all? Ever?

Curiouser and curiouser! ~ Lewis Carroll, Alice in Wonderland

And where exactly does the FBI’s interpretation of the All Writs Act leave Congress in the scheme of things? What is the sense of Congress passing a law that makes it clear that a manufacturer can develop the most secure product in the world, if the courts can then order that selfsame manufacturer to redesign the product to make it insecure whenever the government decides it needs access?

Like Alice, we’ve walked through the looking glass and emerged into an everted world where the courts have gained the power to legislate and the legislature has retained naught but the power to veto.

warrantproof.whitex2760
Image from: The Feds Are Wrong to Warn of “Warrant-Proof” Phones

(The FBI is contending that) the (All Writs) Act can authorize any and all relief except… where Congress enacts a specific statute prohibiting the precise action…. ~ Apple Pleadings

This is, of course, utter nonsense.

It is wholly implausible to suppose that with so many of the newly-adopted Constitution’s drafters and ratifiers in the legislature, the First Congress would so thoroughly trample on that document’s very first substantive mandate: “All legislative Powers herein granted shall be vested in a Congress of the United States[.]” U.S. Const. Art. I, § 1. And yet that is precisely the reading the government proposes when it insists that a court may empower the executive to exercise power that the legislature has considered yet declined to allow. ~ Magistrate Judge Orenstein

The All Powerful All Writs Act

The worst thing about the FBI’s interpretation of the All Writs Act is that it has no limiting principle.

(G)iven the government’s boundless interpretation of the All Writs Act, it is hard to conceive of any limits on the orders the government could obtain in the future. ~ Apple Pleadings

If today the courts can compel Apple, against its will, to create a GovtOS that breaks encryption, then why can’t they demand a LocationTracingOS, or an EavesdropingOS, or a PhotoFaceRecognitionOS ((Selfie takers, beware!)) , tomorrow?

(W)hat is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone’s user? Nothing. ~ Apple Pleadings

And why stop there?

(A)ccording to the government… the courts can order private parties to do virtually anything the Justice Department and FBI can dream up. The Founders would be appalled. ~ Apple Pleadings

Not just the founders. I’m pretty darn perturbed too.

The FBI vigorously disagrees with the assertion that there would be no limiting principle if their interpretation of the All Writs Act were to be adopted:

The Supreme Court’s approach to the (All Writs Act) does not create an unlimited source of judicial power, as Apple contends. The Act is self-limiting because it can only be invoked in aid of a court’s jurisdiction. Here, that jurisdiction rests on a lawful warrant, issued by a neutral magistrate pursuant to Rule 41. ~ FBI Pleadings

FULL STOP! Let’s parse the FBI’s reasoning, shall we?

The FBI is saying that the All Writs Act is self-limiting because it can only be invoked when a lawful warrant is issued.

A warrant. Issued by a Court. At the request of the FBI. Limits the Courts. From using the All Writs Act.

Sooooooo, if a Court doesn’t issue a warrant, then the Court is powerless to invoke the All Writs Act. Got it!

It’s like saying the courts are powerless to do a thing because they’d have to give themselves permission to do the thing before they’d be authorized to do the thing.

Yeah. That the FBI’s definition of “self-limiting”. ((Just as an aside, I’d be willing to bet that the FBI think’s their powers are “self-limiting” too.))

What the FBI is doing here is using legal alchemy in an attempt to transmute the innocuous All Writs Act into an all powerful all surveillance act.

The government attempts to rewrite history by portraying the Act as an all-powerful magic wand rather than the limited procedural tool it is. ~ Apple Pleading

When Magistrate Judge Orenstein was confronted with the FBI’s interpretation of the All Writs Act in a legally identical, but factually distinguishable case, he was having none of it.

(The FBI’s) preferred reading of the law — which allows a court to confer on the executive branch any investigative authority Congress has decided to withhold, so long as it has not affirmatively outlawed it — would transform the (All Writs Act) from a limited gap-filing statute that ensures the smooth functioning of the judiciary itself into a mechanism for upending the separation of powers by delegating to the judiciary a legislative power bounded only by Congress’s superior ability to prohibit or preempt.

I conclude that the constitutionality of such an interpretation is so doubtful as to render it impermissible as a matter of statutory construction.

Conclusion

Is Judge Orenstein’s ruling binding on other Courts? No. But the ruling has to be taken into account whenever other courts are confronted with the same question, and its reasoning may prove persuasive.

NEXT WEEK:

What? We’re not done? No. Of course not.

There are many, many legal issues involved in this case but, in my opinion, the two biggest, and the two most immediate, legal stumbling blocks that the FBI must hurdle are 1) CALEA; and 2) Whether the FBI’s demands of Apple are “unduly burdensome” under the terms of the All Writs Act. And before we can address whether the FBI’s requests are burdensome or not, we must first determine whether this matter is about one phone, one time, or if it is, instead, about many phones, any time.

Until next week.

Published by

John Kirk

John R. Kirk is a recovering attorney. He has also worked as a financial advisor and a business coach. His love affair with computing started with his purchase of the original Mac in 1985. His primary interest is the field of personal computing (which includes phones, tablets, notebooks and desktops) and his primary focus is on long-term business strategies: What makes a company unique; How do those unique qualities aid or inhibit the success of the company; and why don’t (or can’t) other companies adopt the successful attributes of their competitors?

43 thoughts on “FBI v. Apple: Why CALEA Matters So Much”

  1. How do you jump (repeatedly) from “CALEA does not not authorize” to “CALEA prohibits” ? That seems a straight up logic mistake to me, the 2 emphatically don’t mean the same. If CALEA doesn’t authorize something, another law/statute might ?

    1. How do you jump (repeatedly) from “CALEA does not not authorize” to “CALEA prohibits” ?

      It is not hard to understand (unless you’re trying hard to not understand it).

      CALEA can authorize things, it can prohibit things and it can not authorize things. They are three different things and when used in context, they are wholly compatible one with the other.

      I reviewed every use of the words “authorize” and “prohibit” used in the article. Every one of them was either used within a quote or was referring to a quote and used the exact same wording as the quote. I’m not, as you accuse, making a “straight up logic mistake”. I’m quoting the statute. No one I’m aware of has ever suggested that the CALEA statute contains internal inconsistencies, but I guess you can be the first, if you want.

      “I’m not debating the issue. I’m just trying to explain why I am right.” ~ @GSElevator

      1. How do you jump from my question about your translating “does not authorize” to “prohibits”‘ to saying I “suggested CALEA contains insternal inconsistencies”. I’m saying your jump from “does not authorize” to “prohibits” seems fishy, my problem is with your analysis, even before that, your language, not with CALEA.
        I’m doing a lot of things that have not been authorized every day. Luckily for me, they aren’t prohibited either.

        1. I think the wording used clearly prohibits the FBI from exercising authority their are explicitly denied.

          Joe

        2. “How do you jump from my question about your translating “does not authorize” to “prohibits”‘ to saying I “suggested CALEA contains insternal inconsistencies”. ~ Obarthelemy

          The words “prohibit” and “authorize” are portrayed exactly as they appear in the statute. If you have a problem with how the words “prohibit” and “authorize” are used, then you have a problem with the statute, not me.

          “It is impossible to carry the torch of truth through a crowd without singeing someone’s beard.” ~ Georg Christoph Lichtenberg

  2. So the Ten Commandments aren’t enough for the FBI, there must be 10,467 commandments and counting for them to be under control. So simple. So expected.

  3. That’s the clearest explanation I’ve read of the AWA and CALEA machinations in this case. I’ve not heard or read anyone explain it as the FBI using the courts to do what they can’t.

    Thanks,
    Joe

  4. “I write to understand as much as to be understood.” ~ Elie Wiesel

    The above quote by Elie Wiesel has always rung true with me, but it has never resonated more deeply than it did in the writing of this article.

    1. When I heard a lawyer say “People want to know the rules so they can justify why the rules don’t apply to them”, I can’t say I’ve seen it as exemplified as I have with the FBI here.

      Joe

  5. No fault of the author, but I have no idea over what any of this legal stuff means.
    Not that I don’t understand the author’s assertions, rather:

    -Under the law, specifically CALEA, what constitutes ‘information services’?
    -Having defined that, is having an ‘informational services’ arm enough to protect a company from encumbrance from law enforcement?
    -Conversely, is having services outside ‘information services’ sufficient to disqualify such protection?
    -If my smartphone is protected from surveillance, is now my landline, my PC, my home, my bank account, my underwear drawer, etc? If not, why not?

    1. “If my smartphone is protected from surveillance…”

      I don’t think anyone, including Apple, iPhone users, and other smartphone users are saying the smartphone is “protected from surveillance”.

      The contention is that Apple and others are allowed to make a secure device (if they can), and they are not bound to help the govt penetrate it by weakening it.

      Obtaining evidence is one thing (the actual phone, a call record, or a recording). The substance of the evidence is another thing. They can record you talking in your sleep through a bug placed in your underwear drawer, but can the FBI compel your wife or your mother to interpret your ramblings for them?

      1. Yes, me and my wife can’t incriminate myself under the 5th Amendment. That is we can’t be compelled to offer any information of our guilt or innocence.

        All this issue revolves around the 4th, prohibiting unreasonable search and seizure.

        1. Apparently it revolves around CALEA and AWA as well. The FBI thinks anything they want to do is reasonable and they can use AWA to authorise it. Others think CALEA has put a limit on what is reasonable, either by explicitly limiting what the FBI would like to do, or by not positively authorising it when the legislature was asked to explicitly authorise it.

        2. There are no fourth amendment issues in this case. The phone is owned by the employer and the employer has give the FBI permission to search the phone.

          The only issue is whether the courts can use the All Writs Act to order a company to defeat their own encryption.

          1. Very true, and you clarified that in a prior article. Kizedek and I have been discussing the broader question on surveillance, over several threads. I was replying in that spirit.

    2. This is how CALEA defines information services

      (6) The term “information services”—

      (A) means the offering of a capability for generating, acquiring, storing, transforming, processing, retrieving, utilizing, or making available information via telecommunications; and

      (B) includes—

      (i) a service that permits a customer to retrieve stored information from, or file information for storage in, information storage facilities;

      (ii) electronic publishing; and

      (iii) electronic messaging services; but

      (C) does not include any capability for a telecommunications carrier’s internal management, control, or operation of its telecommunications network.

      Source: https://www.law.cornell.edu/uscode/text/47/1001

      1. Thank you. It’s not incumbent upon you to answer the remaining questions (though that would be appreciated), rather I leave them as ‘thought seeds’.

    3. 1) Telephone services ARE compelled to comply with the requirements in CALEA.

      2) Information Services are specially EXCLUDED from the requirements of CALEA.

      3) In addition, CALEA says that a) Encryption is legal, b) law enforcement can’t stop anyone from making or using encryption, and c) law enforcement can’t tell anyone how their encryption must be designed (i.e., adding back doors for the conveniences of law enforcement).

      4) I don’t want to go into the details of surveillance. Just assume that the FBI can do it legally with a warrant, the NSA can probably do it illegally whenever they want and, of course criminals and renegade foreign governments don’t respect laws and they don’t respect political boundaries either. All the more reason to have the option of obtaining and using the best encryption possible.

      1. Great, so CALEA covers Apple in this case. It covers all other mobile phone manufacturers as well. How the NSA is still allowed to break the law is beyond me.

        I also know that my laptop can be seized and inspected, or held, at the border. No warrant needed. There appear to my legally unblemished eyes great inequities in the law.

        1. This is an over generalization, but essentially the courts have ruled that we don’t have any rights at the border.

          1. “essentially the courts have ruled that we don’t have any rights at the border.”

            Which is a pile of crock on a par with declaring that separate but equal is legal. Sadly it’s going to take another decade at least of egregious rights violations by border guards before that particular pile of crock gets overturned.

          2. If your at the border, your not on US territory, so not under US jurisdiction. So your rights, recognised in the US, count for nothing.

            Also my understanding is that US citizens, or anyone else, have no right to be “ALLOWED” to enter US territory. Which is one reason why during the Cold War defectors preferred English passports.

          3. “If your at the border, your not on US territory, so not under US jurisdiction.”

            Nope, you are inside the US when you are questioned and searched by border agents. If you weren’t inside the US, they wouldn’t have the power they do to screw you over without probable cause and without due process. Actually, considering the US’s recently implemented 100 mile “buffer zone,” you can be well inside the border and still be subject to warrantless searches by border agents.

            “US citizens, or anyone else, have no right to be “ALLOWED” to enter US territory.”

            I don’t know about the cold war, but today, US border agents cannot deny a US citizen the right to re-enter the US. According to the customs and border patrol manual for border agents,

            [12.1] It must be emphasized that the grounds of inadmissibility contained in 212(a) of the INA are applicable only to aliens. Consequently, the examination of a person claiming to be a United States citizen is limited to matters required to establish present citizenship. Once you are satisfied the person being
            examined is a U.S. citizen and any required lookout query has been completed, the examination is
            over.

  6. In the Apple vs. FBI case, I’m on Apple’s side, because…

    “Only this one phone” claims made by the FBI are absurd.

    Many encryption programs besides Apple’s are available to bad people.

    Steganography is available to bad people, and in some ways it’s superior to encryption.

    If a “back door” is created in Apple’s encryption, it will be discovered at some point.

    WAY too many members of the public are at serious risk after a back door is discovered.

  7. The premise of your entire analysis is false. The limitations provision you cite regarding specific design and encryption is not an island. It constrains the provision right above it, namely the capability requirements. Because those don’t apply here (they deal with interception capabilities of a telecom before ever receiving an order), nor do the limitations.

    1. Hmm. I’ve read all the pleadings and I don’t think even the government believes the distinction you’re making is relevant.

      But perhaps I simply don’t understand what you’re trying to say. You’ve stated what you think I got wrong, but you haven’t explained why it matters. Can you please clarify how your observation should change my analysis? Thanks.

      1. There is not a general prohibition on imposing a specific software design. There is a prohibition on law enforcement dictating a specific design in how the CALEA obligations are implemented. Same with the encryption language, it relates to implementation of the CALEA obligations and safe harbor. If these were such grand and broad privacy protections, why would they be nestled within the capabilities subsection and titled limitations? They have no relevance outside of the context of implementing a telecom’s interception capability before ever receiving an order. Meanwhile there is an entire provision in another section allowing courts to impose specific designs under certain circumstances. And the FCC does it. Your conclusion is at odds with statute and legislative history.

        1. Nice try.

          This article addresses the ridiculous claim that simply because every conceivable instance of prohibited behavior was not enumerated, it doesn’t imply that congress’ intentions weren’t clear.

          The FCC concluded (correctly) that VOIP qualifies as a telecommunications service (not merely information services) and that those abilities would fall under the same guidelines as the traditional telecom companies.

          Nothing in the act is ambiguous where it concerns companies like Apple and the devices they sell. And your assertion that CALEA has a special section for the courts is a finding unique to you. Perhaps you should tell the courts and the FBI about it.

        2. There are no provisions in CALEA or any statute that authorize law enforcement to dictate the design of encryption services to information service providers. If there were, the FBI would be shouting them from the rooftops…or, at the very least, they would be touting them in their pleadings. The government’s silence on the matter is deafening.

          “Never assume you have all the answers…because I have all the answers.” ~ Anonymous

    2. The conclusion of your premise is misguided. It precludes the underlying assumption of capabilities that hitherto are offered unsolicited.

      Since that doesn’t apply here, neither does the outcome nor the consequence, but only the intended aforementioned limitations forthwith.

      Which should go without saying. Know what I’m saying?

  8. Your well-written and logical post skewering the FBI over CALEA has compelled them to ask to vacate tomorrow’s hearing, and instead try to break into the phone with outside, but not Apple’s, help.

    The FBI is hoping you will not write, or at least not humiliate them, in your 3rd post. Will you or won’t you? (Can the FBI get a judge, on the basis of the AWA, to issue a warrant to compel you not to?)

    1. Well, you’re sort of right. The FBI read my article and said to themselves, “Geez, if even John Kirk can figure this out, then any dope can. We’d better come up with a better theory.”

      As for my third article, I may grant it an “indefinite stay” until after I see the results of the FBI’s presentation on April 5.

      P.S. Thank you for your tongue-in-cheek comment. Much appreciated.

  9. “Unprejudiced happened to falter upon your fantastic article, and couldn’t serve but effectuate the importance of owning a worth hazmat suit nuclear . On those notwithstanding in search, I’ve found this matchless resource which outlines the foremost hazmat suits currently available. Take a look and insure your shelter!”

  10. Thank you for the sensible critique. Me & my neighbor were just preparing to do some research about this. We got a grab a book from our local library but I think I learned more from this post. I’m very glad to see such great information being shared freely out there.

  11. A lot of of the things you articulate happens to be astonishingly accurate and it makes me wonder why I had not looked at this with this light before. This piece really did turn the light on for me as far as this topic goes. However at this time there is 1 position I am not too cozy with and whilst I make an effort to reconcile that with the actual central idea of the position, permit me see what the rest of the readers have to say.Very well done.

  12. Hello, i believe that i noticed you visited my web site so i came to go back the desire?.I am attempting to in finding issues to enhance my website!I guess its adequate to use some of
    your concepts!!

    My page – vpn special

  13. Thanks for a marvelous posting! I seriously enjoyed reading it, you
    may be a great author. I will remember to bookmark your blog and will
    eventually come back in the foreseeable future. I want to
    encourage you to definitely continue your great posts, have a nice
    holiday weekend!

    My site … vpn special coupon

Leave a Reply

Your email address will not be published. Required fields are marked *