Schneier on Security: UK is Ordering Apple to Break its Own Encryption

Source URL: https://www.schneier.com/blog/archives/2025/02/uk-is-ordering-apple-to-break-its-own-encryption.html
Source: Schneier on Security
Title: UK is Ordering Apple to Break its Own Encryption

Feedly Summary: The Washington Post is reporting that the UK government has served Apple with a “technical capability notice” as defined by the 2016 Investigatory Powers Act, requiring them to break the Advanced Data Protection encryption in iCloud for the benefit of law enforcement.
This is a big deal, and something we in the security community have worried was coming for a while now.
The law, known by critics as the Snoopers’ Charter, makes it a criminal offense to reveal that the government has even made such a demand. An Apple spokesman declined to comment…

AI Summary and Description: Yes

Summary: The UK government’s issuance of a “technical capability notice” to Apple raises critical concerns regarding privacy, encryption, and compliance with the Investigatory Powers Act. This situation highlights the tension between law enforcement demands and the integrity of encryption technologies that protect user data globally.

Detailed Description: This report outlines significant challenges posed by the UK government’s actions regarding encryption practices, specifically targeting Apple’s iCloud service.

– **Technical Capability Notice**: The UK government has formally requested Apple to compromise its Advanced Data Protection encryption settings as per the Investigatory Powers Act, a move that could set precedence for governmental access to user data.

– **Privacy Implications**: Often referred to as the “Snoopers’ Charter,” this act criminalizes the act of revealing governmental surveillance requests, which creates an environment that stifles transparency and could ultimately undermine user trust in encryption technologies.

– **Legal Recourse for Apple**: Apple has the opportunity to appeal the technical notice but must comply during the appeals process, presenting potential conflicts in balancing user privacy with legal obligations.

– **Global Impact on Encryption**: Apple’s potential response may involve disabling end-to-end encryption for users in the UK, which highlights the complicated regulatory landscape companies must navigate, potentially affecting global user security.

– **Concerns from the Security Community**: The situation reflects longstanding worries within the security community about the erosion of privacy and security standards in the face of government demands. It also presents a critical case study for examining how governments attempt to exert control over technology companies and their security features.

In essence, this scenario underscores the continuing struggle between the necessity for law enforcement capabilities and the fundamental principles of privacy and user data protection, echoing larger thematic concerns surrounding compliance and regulatory governance in tech.