{"id":13951,"date":"2016-04-02T01:00:36","date_gmt":"2016-04-02T06:00:36","guid":{"rendered":"http:\/\/hcstx.org\/?p=13951"},"modified":"2016-04-02T01:00:36","modified_gmt":"2016-04-02T06:00:36","slug":"modern-crime-feds-try-to-unlock-phones-because-of-drugs-not-terrorism","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/04\/02\/modern-crime-feds-try-to-unlock-phones-because-of-drugs-not-terrorism\/","title":{"rendered":"Modern Crime: Fed&#8217;s Try To Unlock Phones Because of Drugs NOT Terrorism"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-13952\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/04\/ohones.jpg?w=620\" alt=\"ohones\" width=\"620\" height=\"349\" \/><\/p>\n<p><span class=\"lede\">UNTIL THE FBI <\/span><a href=\"http:\/\/www.wired.com\/2016\/03\/fbi-drops-case-apple-finding-way-iphone\/\" target=\"_blank\" rel=\"noopener\">backed down from its battle with Apple<\/a> over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen a near-perfect case on which to make its stand against encryption. By refusing to write software to help law enforcement crack Farook\u2019s phone, Apple was made to look like it was defending an indefensible terrorist.<\/p>\n<p>But as the public learns more about the other investigations in which the feds have demanded Apple or Google help crack their phones\u2019 security, it now looks like the government has made those decryption demands far more often while fighting a more pedestrian sort of crime: drugs.<\/p>\n<p>On Tuesday the ACLU released the results of its digging through court records, seeking information about any cases in which the feds had used the All Writs Act to ask that Apple or Google assist in accessing data on locked phones or\u00a0tablets. It found that since 2008, there have been at least 63 of those cases across the country, showing that Apple\u2019s standoff with the FBI was about more than \u201c<a href=\"http:\/\/www.wired.com\/2016\/03\/apple-and-fbi-iphone-hacking-fight-congressional-hearing\/\">one iPhone<\/a>,\u201d as FBI director Jim Comey had argued. And in the two-thirds of those cases in which the ACLU could determine the crime being investigated, the group tells WIRED that 41 percent were related to drugs, far more than any other category of crime. \u201cThe narrative was that they would only do this in cases where the crimes were particularly severe and a serious threat to national security, and that seems to be disproven,\u201d says Ezekiel Edwards, the director of the ACLU\u2019s Criminal Law Reform Project. \u201cI\u2019m certainly displeased to find that so many of these cases in which the government has forced companies to unlock phones have been drug cases. But I\u2019m not surprised.\u201d<sup>1<\/sup><\/p>\n<p>Of the total of 41 cases in which the ACLU could determine the crime that caused the Department of Justice to demand access to a device, 17 were related to drugs, compared to just one known case of terrorism: the San Bernardino case. In fact, those 17 cases by far outnumbered the 10 financial crime cases, eight child pornography cases, and three counterfeiting cases, the next most common crimes on the ACLU\u2019s list. (The ACLU explains that in the third of cases where the ACLU couldn\u2019t identify the crime being investigated, the\u00a0government hadn\u2019t\u00a0revealed the docket number of the related court filing that reveals the charges, or because the cases were sealed.)<\/p>\n<p>It\u2019s not yet clear how Apple and Google responded to those 63 demands to help law enforcement agencies access device data. Apple didn\u2019t reply to WIRED\u2019s request for comment on the ACLU\u2019s release. Google wrote in a statement only that it has \u201cnever received an All Writs Act order like the one Apple recently fought that demands we build new tools that actively compromise our products\u2019 security,\u201d and that it would \u201cstrongly object to such an order.\u201d A\u00a0Department spokesperson responded to ACLU\u2019s release with its own statement: \u201cThe fact that federal law enforcement uses court process to obtain critical evidence in criminal investigations should not be surprising nor newsworthy,\u201d it reads. \u201cThe government has made clear on multiple occasions in court that judges across the country have issued prior All Writs Act orders to Apple, and counsel for Apple has noted in court that it received All Writs Act orders with frequency.\u201d<\/p>\n<p>The ACLU\u2019s numbers contrast slightly with<a href=\"http:\/\/manhattanda.org\/press-release\/district-attorney-vance-testifies-congress-regarding-encryption%E2%80%99s-impact-public-safety\" target=\"_blank\" rel=\"noopener\">statistics\u00a0released by the Manhattan District Attorney\u2019s office in March<\/a>, which showed\u00a0that of 205 locked iPhones the Manhattan DA\u2019s lab\u00a0had attempted and failed to access without Apple\u2019s assistance, 25 percent were related to drug cases. It lumped larceny, cybercrime, forgery, and ID theft into another category of cases that accounted for 35 percent of the locked iPhones.<\/p>\n<p>Even so, it should come as little surprise that drug cases would outnumber all others in federal investigations that sought to access locked devices\u2019 data. As of last count, fully<a href=\"http:\/\/www.wired.com\/2015\/07\/drug-war-driving-us-domestic-spying\/\" target=\"_blank\" rel=\"noopener\">89 percent of wiretap orders in the US were used in drug cases<\/a>. That percentage has climbed dramatically since 1989, when only 62 percent of wiretaps were focused on drugs.<\/p>\n<p>The ACLU\u2019s Edwards argues that Apple\u2019s encryption battle with the FBI is just another instance of the government asking for surveillance powers in the name of national security, but then applying those powers to the Drug War. He points to the \u201csneak and peek\u201d searches that were made legal under the Patriot Act in 2001. Drug cases now account for 84 percent of the cases in which those searches are used, Edwards says.\u00a0\u201cThese technologies [and techniques] are often sold by the government as essential tools to protect national security that will be used in careful, discriminating ways,\u201d he says. \u201cOver and over again, that\u2019s been untrue.\u201d<\/p>\n<p>In fact, federal law enforcement has been so focused on drug cases for the last 30 years that they\u2019ve <a href=\"http:\/\/www.wired.com\/2015\/04\/want-see-domestic-spyings-future-follow-drug-war\/\" target=\"_blank\" rel=\"noopener\">often been the first domestic cases used to pioneer new surveillance techniques<\/a>, from thermal imaging cameras to GPS tracking to drones. Even the NSA\u2019s bulk metadata collection that scandalized the public when it was revealed by NSA leaker Edward Snowden was <a href=\"http:\/\/www.wired.com\/2015\/04\/want-see-domestic-spyings-future-follow-drug-war\/\" target=\"_blank\" rel=\"noopener\">first used by the Drug Enforcement Administration<\/a>. And in 2014 the FBI went so far as to subpoena security researchers at Carnegie Mellon for a technique that could crack the anonymity software Tor\u2019s protections for hidden websites, which was then <a href=\"http:\/\/www.wired.com\/2016\/02\/fbis-tor-hack-shows-risk-subpoenas-security-researchers\/\" target=\"_blank\" rel=\"noopener\">used to take down the Silk Road 2 drug market and dozens of other dark web sites<\/a>.<\/p>\n<p>That growing use of domestic surveillance for drug investigations, argues the ACLU\u2019s Edwards, is simply a reflection of law enforcement\u2019s resources, which have increasingly been devoted to the War on Drugs. \u201cAll of these technologies are inherently wrapped up in the types of activities [law enforcement] is focused on,\u201d he says. \u201cThat\u2019s fighting drugs, not terrorism\u2026as part of a law enforcement effort that has been an utter, trillion-dollar failure.\u201d<\/p>\n<p><sup>1<\/sup><em>Correction 3\/31\/2016 9:50am EST: An earlier version of the story stated that the ACLU uncovered these cases through FOIA requests, when in fact its FOIA requests are ongoing and part of a separate investigation.<\/em><\/p>\n<p>Read the Original Article at <strong><a href=\"http:\/\/www.wired.com\/2016\/03\/feds-usually-try-unlock-phones-drugs-not-terrorism\/\">WIRED<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>UNTIL THE FBI backed down from its battle with Apple over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen a near-perfect case on which to make its stand against encryption. By refusing to write software to help law enforcement crack Farook\u2019s phone, Apple was made to&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[13,74,1317,4912,4126,3688,1814,1928,3553,3986,65,3712],"tags":[5086,10804,10805,10806,10807,4731,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13951"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=13951"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/13951\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=13951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=13951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=13951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}