You won't want to miss out on the world-class speakers at TNW Conference this year 🎟 Book your 2 for 1 tickets now! This offer ends on April 22 →

This article was published on March 25, 2016

An old law could force the FBI to tell Apple how it broke into iPhones


An old law could force the FBI to tell Apple how it broke into iPhones

The on-going spat between the FBI and Apple has taken yet another surprising turn this week, thanks to an old law the US government brought in to protect US citizens from cyber attacks.

The obscure “vulnerabilities equities process” was a rule brought in by the Obama administration in 2010 that compels any government agency – be it the NSA, Secret Service or even the FBI – to report flaws or back doors in technology that might put Americans at risk.

The government, according to CNN is constantly keeping an eye on technology to ensure something a lot of people use doesn’t become compromised. If it spots something, a so called ‘zero day’ hack in an Apple iPhone that could expose others, the agency that discovered the bug has to meet with the National Security Council to discuss whether Apple should be made aware of the problem.

The idea behind the ruling was to ensure that rogue states or criminal groups don’t also discover holes in software and exploit them before the creator has had time to fix it.

The <3 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!

So in the FBI’s ongoing attempts to break into the iPhone of San Bernadino shooter Syed Rizwan Farook – in which the law enforcement agency is working with an Israeli company – it might be inadvertently making it a lot more difficult for it to repeat the same process in future.

An undated document was declassified in late 2015 and reveals some – most of it is redacted – of the details behind the policy. It remains unclear which vulnerabilities have to be disclosed and which do not.

However, the President’s Review Group on Intelligence and Communications Technologies recommended in 2013 that, “U.S. policy should generally move to ensure that Zero Days are quickly blocked, so that the underlying vulnerabilities are patched on U.S. Government and other networks.”

So it looks like the debate will continue for some time to come.

Get the TNW newsletter

Get the most important tech news in your inbox each week.

Also tagged with