{"id":23476,"date":"2014-10-27T13:58:00","date_gmt":"2014-10-27T18:58:00","guid":{"rendered":"http:\/\/law.marquette.edu\/facultyblog\/?p=23476"},"modified":"2014-10-27T14:01:14","modified_gmt":"2014-10-27T19:01:14","slug":"23476","status":"publish","type":"post","link":"https:\/\/law.marquette.edu\/facultyblog\/2014\/10\/23476\/","title":{"rendered":"You Knew Your New iPhone Was Cool, but Did You Know&#8230;.?"},"content":{"rendered":"<p><a href=\"http:\/\/law.marquette.edu\/facultyblog\/wp-content\/uploads\/2014\/10\/apple-logo-red.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-23477\" src=\"http:\/\/law.marquette.edu\/facultyblog\/wp-content\/uploads\/2014\/10\/apple-logo-red-300x300.jpg\" alt=\"apple-logo-red\" width=\"300\" height=\"300\" srcset=\"https:\/\/law.marquette.edu\/facultyblog\/wp-content\/uploads\/2014\/10\/apple-logo-red-300x300.jpg 300w, https:\/\/law.marquette.edu\/facultyblog\/wp-content\/uploads\/2014\/10\/apple-logo-red-150x150.jpg 150w, https:\/\/law.marquette.edu\/facultyblog\/wp-content\/uploads\/2014\/10\/apple-logo-red-144x144.jpg 144w, https:\/\/law.marquette.edu\/facultyblog\/wp-content\/uploads\/2014\/10\/apple-logo-red.jpg 720w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Apple is marketing its newest smartphone operating system, iOS 8, as a bulwark of personal privacy. Apparently, not even Apple itself can bypass a customer\u2019s passcode and extract data from an iPhone that runs the new operating system. This means that even in response to a court order, the company will be powerless to comply.\u00a0 Competitors are likely to follow suit.<\/p>\n<p>This is a development with profound implications for law enforcement, which views the ability to obtain such data with a warrant as crucial in its efforts to combat crime and terrorism.\u00a0 Defenders of the new technology point out that law enforcement may be able to obtain the same data in different ways; for example, if the data is stored \u201cin the cloud\u201d or if the password can be deduced somehow.<\/p>\n<p><!--more--><\/p>\n<p>Appellate Writing and Advocacy (AWA) students will immediately recognize that this development could force the courts to address, in more detail, one of the questions raised by this year\u2019s problem set: \u201cMay the government compel the cellphone owner to produce the password without violating her Fifth Amendment right against self-incrimination?\u201d\u00a0 The answer to that question is far from obvious.\u00a0 How will the reality of such encryption affect the scope of \u201cexigent circumstances\u201d that might excuse obtaining a warrant under the Supreme Court\u2019s <em>Riley <\/em>decision?<\/p>\n<p>Also unclear: How far may Congress go in creating a \u201clegislative fix\u201d to the \u201cproblem\u201d posed by the new technology?\u00a0 Should it attempt to do so?\u00a0 FBI Director James Comey has called for a national discussion on these issues, and is emerging as a forceful voice in attempting to persuade technology companies to change course voluntarily.\u00a0 His recent speech to the Brookings Institution may be found here:\u00a0\u00a0 http:\/\/www.fbi.gov\/news\/speeches\/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course.\u00a0 Readers may also wish to take a look at <a href=\"http:\/\/www.washingtonpost.com\/news\/volokh-conspiracy\">Prof. Orin Kerr\u2019s series of thoughtful blog posts<\/a> about this issue, available at \u201cthe Volokh Conspiracy\u201d.\u00a0\u00a0\u00a0 Disclosure\/disclaimer:\u00a0 I work for the federal government in my day job. The foregoing is intended to be informational only.\u00a0 I provide it solely in my capacity as an adjunct law professor at MU.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple is marketing its newest smartphone operating system, iOS 8, as a bulwark of personal privacy. Apparently, not even Apple itself can bypass a customer\u2019s passcode and extract data from an iPhone that runs the new operating system. This means that even in response to a court order, the company will be powerless to comply.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":179,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[32,80,126,30,122],"tags":[],"class_list":["post-23476","post","type-post","status-publish","format-standard","hentry","category-computer-law","category-constitutional-interpretation","category-constitutional-law","category-criminal-justice","category-public","entry"],"_links":{"self":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/posts\/23476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/users\/179"}],"replies":[{"embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/comments?post=23476"}],"version-history":[{"count":0,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/posts\/23476\/revisions"}],"wp:attachment":[{"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/media?parent=23476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/categories?post=23476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.marquette.edu\/facultyblog\/wp-json\/wp\/v2\/tags?post=23476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}