Here are the five key takeaways from Apple’s Congressional hearing against the FBI

Here are the five key takeaways from Apple’s Congressional hearing against the FBI

After an often painful five-plus hours of congressional testimony today, both the FBI and Apple’s fate will be decided by congress after a five day window for further questioning.

There were a few verbal barbs traded on both sides, as well as from congressmen, but overall the hearing remained a thoughtful discourse that attempted to gain greater understanding of what’s at stake from both Apple and the FBI.

New York, are you ready?

We’re building Momentum: an all killer, no filler event this November.

For all of the verbal garbage that was spewed today, it can be summed up in five easily-digestible talking points.

Apple and the FBI want new legislation

Both Apple and the FBI are seeking new legislation. When asked repeatedly whether they felt this was a case for congress or if this could be handled by federal courts both answered with resolve that this case would require new legislation from congress.

It’s easy to see why. Currently, the FBI and DOJ are using the ‘All Writs Act,’ a piece of legislation from 1789, to govern this and other cases like it. The legislation is basically a catchall that requires companies to comply with government orders when it doesn’t cause ‘undue burden.’

Undue burden is exactly what Apple is arguing in this case. It’s not however, arguing that the burden is created by the man hours and costs of producing such a piece of software, it’s arguing that the burden is created by knowingly weakening security for its customers.

The FBI understands the implications of what it’s asking

It’s clear that both sides have talking points that should be considered. Apple wants to protect its customers by creating devices with strong security measures in place and the FBI wants to be able to easily access intelligence that could aid in other operations.

Until today, however, it was unclear if the FBI understood how weakening security to allow for easier access for law enforcement would impact non-criminals, which is to say… most of us.

FBI Director Comey was clear and precise with his wording when he affirmed that he was well aware of the damage that it could cause both on an international and domestic level. He also thought that there was a happy medium in which strong encryption and government access (backdoors) could co-exist.

We disagree.

Many congressmen seem to have little clue what’s being discussed

If I could sum up congressional ineptitude when it comes to dealing with matters of security they don’t properly understand in one tweet, the above would do a fine job.

Encryption predates electronics, but congress is still treating it like it’s new and perhaps even dangerous. At its core, encryption is nothing more than a code. We’ve celebrated codebreakers like Alan Turing for breaking these codes in the past but now we’re treating encryption as if it’s somehow different than earlier codebreaking efforts.

Congressman Issa even went so far as to ask if the FBI had requested Apple’s source code for iOS 9 as if the government were going to reverse engineer the operating system. Worse, he repeatedly called Apple’s internal flash memory a “disk drive.”

District Attorney Vance, a prosecutor, actually thinks that this software would have to be used in Cupertino, at Apple’s headquarters. If this software — or the knowledge of how it was built — got out, it could (and would) be used by anyone on the planet, no matter where they were.

These quips aren’t meant to poke fun at congressman Issa or District Attorney Vance, but instead to shed light on the limited understanding members of this committee seem to have about the technologies at play and how dangerous that is for enacting new legislation.

The FBI never intended for this to be a single use solution

Director Comey and District Attorney Vance both repeatedly suggested that they weren’t all that interested in single use solutions. Vance was even so bold as to proclaim:

Comey had similar sentiment when asked the following question by congressman Poe:

It’s important to understand that this isn’t just one phone, and it isn’t just one time, regardless of earlier statements by the FBI

The San Bernadino phone is irrelevant

This case is no longer about recovering data on the San Bernadino shooter’s phone. It’s now about setting precedent for just how much a private company has to aid the government in law enforcement-related endeavors and those are the points in which congress will deliberate on until we have an answer.

Read next: Can Yelp escape its own employee loyalty spiral?

Shh. Here's some distraction

Comments