Professional Documents
Culture Documents
Re: The search of an Apple iPhone seized during the execution of a search warrant on a
black Lexus IS300, California license plate #5KDG203, Case 16-CM-00010.
To the Honorable Judge Sheri Pym, Magistrate Judge, Central District of California:
To force Apple or any technology company to maim its own security mechanisms at the
request of law enforcement when other remedies, including some already within the
governments own abilities, already exist that would achieve the same objective1 would not
just be an undue burden on that companys business. That order of force would have devastating
consequences for individuals and groups including journalists and activists across the
country and around the world.
In this case, the Department of Justice through its counsel, law enforcement agents
and others expects the court and the public believe that only Apple is capable of providing
assistance to police in unlocking a single iPhone allegedly used by a domestic terrorism suspect2.
They expect the court and the public to believe that Apples assistance on this particular device
would be limited only to the device in question3, and that such an order would not necessarily be
applicable to other devices that it and other agencies may seek to unlock in other criminal
investigations. They expect the court and the public to believe that Apple, if it is required to
create technology to assist in unlocking the phone, could retain complete control of that
technology4 and that the company chooses to it could destroy that technology5 once it assists the
government. They expect the court and public to believe that an order compelling Apple to maim
its own security mechanisms would not be systemically abused by the government, would not set
a precedent to be followed in other cases and is in the interest of national security.
1
2
See 18 U.S. Code 1030 - Fraud and related activity in connection with computers:
https://www.law.cornell.edu/uscode/text/18/1030
The governments investigation resulted in charges brought in March 2013 and a conviction by trial in October 2015. The
conviction is being appealed; but because the conviction involves computer crime charges that are considered an act of
terrorism under the federal legislative definition, I could now be considered a convicted domestic terrorist.
10
The documents referenced here were published among others on the website Cryptome sometime in July 2015:
https://cryptome.org/2015/07/matthew-keys-doj-fbi.zip
11
Associated Press, October 28, 2014: http://www.ap.org/Content/AP-In-The-News/2014/AP-Seattle-Times-Upset-About-FBIImpersonation
12
Washington Post, May 13, 2013: https://www.washingtonpost.com/world/national-security/under-sweeping-subpoenasjustice-department-obtained-ap-phone-records-in-leak-investigation/2013/05/13/11d1bb82-bc11-11e2-89c93be8095fe767_story.html
13
Vanity Fair, April 2015: http://www.vanityfair.com/news/2015/03/james-risen-anonymous-source-government-battle
14
This is the reason why groups like the Center for Media Justice15 and the Online News
Association16 have written letters both open letters and ones specifically addressed to this
court voicing their concern about the Department of Justices motion in this case. They have
very real concerns that the government will abuse any method or discretion afforded to it through
a victory in this case to target journalists who commit acts of journalism with which it disagrees.
Time and time again, we have seen, through the governments own actions, that this concern is
extremely valid.
But the governments invocation of the phrase national security isnt limited to mere
acts of journalism with which it disagrees. In fact, the governments perversion of the phrase has
allowed it to obtain court orders, techniques, systems and technologies that impact millions of
ordinary Americans.
Nowhere is that more true than with the governments use of a once-secret cellphone
surveillance device17 known as a StingRay. The federal government initially defended its
desire to use the device by saying it was necessary to thwart terrorism. Later, the local law
enforcement officials at the state, county and city levels also said they needed the device to
thwart domestic and foreign terrorism in their own communities. Often, national security was
the phrase paraded by law enforcement officials who sought access to the device and
authorization to use it.
But in recent years, public records obtained by journalists and advocacy groups have
revealed police use StingRay devices in a wide variety of investigations that have nothing to do
with homeland security18. And, in most cases, journalists have discovered that police used
StingRay devices without obtaining judicial warrants.19
In these cases, the government took what precedent it had through the courts and
legislation to apply means and technology normally reserved for homeland security
investigations in all kinds of other, often benign, investigations. In those cases, other remedies
existed that would have allowed police to conduct quick and thorough investigations. But the
government defended its decision to circumvent the law (or, in the cases involving journalists,
damage the goodwill and reputation of journalistic institutions) by asserting homeland
security, even when the cases had nothing to do with it.
15
The government has already proven it is willing to invoke homeland security in just
about any case regardless of circumstance, and it does so with apparent impunity. Prosecutors
and investigators across this land are salivating at the chance to invoke homeland security as
reason enough to exploit any weakening of Apples encryption technology for their own fullscale investigations, whether its warranted or not. If the court grants an order forcing Apple to
maim its own security, its not a question of whether the government will seek to abuse this
precedent in benign cases its a matter of when, and this court should seriously consider what
those ramifications will be with respect to free speech, a free press and due process of law.
Sincerely,
Matthew Keys
Freelance journalist
matthew.keys@gmail.com | 415-857-2407
cc:
The Law Firm of Gibson Dunn & Crutcher, LLP
Theodore J. Boutrous, Jr. at tboutrous@gibsondunn.com
Nicola T. Hanna at nhanna@gibsondunn.com
Eric D. Vandevelde at evandevelde@gibsondunn.com
Theodore B. Solson at tolson@gibsondunn.com
The Law Firm of Zwillgen PLLC
Marc J. Zwillinger at marc@zwillgen.com
Jeffrey G. Landis at jeff@zwillgen.com
Apple, Inc.
Kristin Huguet at khuguet@apple.com
Colin Smith at colins@apple.com
Starlayne Meza at starlayne@apple.com
The United States Department of Justice
Tracy Wilkison at tracy.wilkison@usdoj.gov