Apple vs. FBI (2016) Court Filing, retrieved on February 16, 2016, is part of HackerNoon’s Legal PDF Series. You can jump to any part in this filing here. This part is 8 of 18.
Third, Apple's assistance is necessary to effectuate the warrant. In
In this case, the ability to perform the search ordered by the warrant on the SUBJECT DEVICE is of particular importance. The user of the phone, Farook, is believed to have caused the mass murder of a large number of his coworkers and the shooting of many others, and to have built bombs and hoarded weapons for this purpose. The government has been able to obtain several iCloud backups for the SUBJECT DEVICE, and executed a warrant to obtain all saved iCloud data associated with the SUBJECT DEVICE. Evidence in the iCloud account indicates that Farook was in communication with victims who were later killed during the shootings perpetrated by Farook on December 2, 2015, and toll records show that Farook communicated with Malik using the SUBJECT DEVICE. Importantly, however, the most recent backup of the iCloud data obtained by the government was dated October 19, 2015, approximately one-and-a-half months before the shooting. This indicates to the FBI that Farook may have disabled the automatic iCoud backup function to hide evidence, and demonstrates that there may be relevant, critical communications and data around the time of the shooting that has thus far not been accessed, may reside solely on the SUBJECT DEVICE, and cannot be accessed by any other means known to either the government or Apple.
As noted above, assistance under the All Writs Act has been compelled to provide decrypted contents of devices seized pursuant to a search warrant. In Fricosu, a defendant's computer whose contents were encrypted was seized, and defendant was ordered pursuant to the All Writs Act to assist the government in producing a copy of the unencrypted contents of the computer. 841 F.Supp. 2d at 1237 ("There is little question here but that the government knows of the existence and location of the computer's files. The fact that it does not know the specific content of any specific documents is not a barrier to production."). Here, the type of assistance does not even require Apple to assist in producing the unencrypted contents, the assistance is rather to facilitate the FBI's attempts to test passcodes.
Continue Reading Here.
About HackerNoon Legal PDF Series: We bring you the most important technical and insightful public domain court case filings.
This court case No. 15-0451M retrieved on September 25, 2023, from archive.epic.org is part of the public domain. The court-created documents are works of the federal government, and under copyright law, are automatically placed in the public domain and may be shared without legal restriction.