Knowledge (XXG)

All Writs Act

Source đź“ť

102:, the Supreme Court held that a court of appeals to which an appeal could be taken against an FTC order banning a merger could properly issue a preliminary injunction under the All Writs Act while the FTC determined the merger's legality, if the need for injunctive relief was "compelling". In that case the acquired company would cease to exist since the acquiring company was about to sell all acquired milk routes, its plants and equipment, and other assets, precluding its restoration as a viable independent company if the merger were subsequently ruled illegal. This would prevent a meaningful order from being entered in the case. The Court held that the All Writs Act extends to the potential jurisdiction of an appellate court where an appeal is not then pending, but may later be perfected. 150: 286:(CALEA). The DOJ has argued, both in October in Brooklyn and in filings on February 19, 2016, against Apple that CALEA does not apply to these cases, which involve "data at rest rather than in transit", an important distinction for determining whether CALEA applies, nor does it alter the authority granted the courts under the All Writs Act. On February 29, 2016, Magistrate Judge James Orenstein issued an order denying the government's request in its effort to decrypt an iPhone for admission as evidence. 110:
opined that the merger probably violated the antitrust laws but did not believe that effective relief would be "virtually impossible." The Supreme Court reached a similar result in a later case involving an agency's dismissal of an employee. The reason was that judicial review would not be defeated as in
134:
434 U.S. 159 (1977) that the act provided authority for a U.S. District Court to order a telephone company to assist law enforcement officials in installing a device on a rotary phone in order to track the phone numbers dialed on that phone, which was reasonably believed to be used in furtherance of
109:
denied relief, because an All Writs preliminary injunction should issue only if the FTC can show that "an effective remedial order, once the merger was implemented, would otherwise be virtually impossible, thus rendering the enforcement of any final decree of divestiture futile." The Second Circuit
359:
Section 14 of the 1789 Act provided that all courts of the United States should "have power to issue writs of scire facias, habeas corpus, and all other writs not specially provided for by statute, which may be necessary for the exercise of their respective jurisdiction, and agreeable to the
95:
has ruled that federal administrative agencies can invoke the All Writs Act to preserve the status quo when a party within the agency's jurisdiction is about to take action that will prevent or impair the agency from carrying out its functions. In
244:. The head of the FBI stated that what was requested was that Apple disable the iPhone's feature which erases encrypted data on the device after ten incorrect password attempts. Apple claimed that complying with the order would make 202:
has confirmed at least 76 cases in 22 states where the government applied for an order under the All Writs Act. In addition, Apple has identified 12 pending cases in its court documents, and the ACLU has found one additional case in
61:(a) The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law. (b) An alternative writ or 641: 226: 218: 211: 626: (February 16, 2016) ("In the matter of the search of an Apple iPhone seized during the execution of a search warrant on a black Lexus IS300, California license plate 35KGD203"), 763: (3d Cir. 2017) ("hough the Fifth Amendment may be implicated by Doe's decryption of the devices, any testimonial aspects of that production were a foregone conclusion."). 487: 214:
authorized a writ directing a mobile phone manufacturer, whose identity was not disclosed, to assist an investigation of credit card fraud by bypassing a phone's password screen.
849: 283: 272: 268: 49:. The current form of the act was first passed in 1911, and the act has been amended several times since then; it has not changed significantly in substance since 1789. 519: 198:
The government has been trying to use the All Writs Act since at least 2008 to force various companies to provide assistance in cracking their customers' phones. The
45:
necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law". The act in its original form was part of the
125:
as authority for issuance of an All Writs order to compel the FCC to act on a petition that it had allegedly delayed for almost five years without acting on it.
377: 81:
An independent basis for jurisdiction—the act authorizes writs in aid of jurisdiction, but does not in itself create any federal subject-matter jurisdiction.
573: 154: 130: 305:
will turn around and force Apple to hand it over to them ... They will use that key to oppress their own people and steal U.S. trade secrets."
264: 38: 240:
operating system, with certain security features removed, for Federal law enforcement officers to use as part of an investigation into the
149: 814: 92: 30: 627: 144: 773: 460: 702: 385: 257: 199: 854: 844: 793: 294: 545:"In Re Order Requiring [XXX], Inc. to Assist in the Execution of a Search Warrant ... by Unlocking a Cell Phone" 87:
Usages and principles of law—the statute requires courts to issue writs "agreeable to the usages and principles of law".
390: 734: 241: 378:"Resorting to Extraordinary Writs: How the All Writs Act Rises to Fill the Gaps in the Rights of Enemy Combatants" 84:
Necessary or appropriate in aid of jurisdiction—the writ must be necessary or appropriate to the particular case.
724: 608: (October 3, 2014) ("Order requiring Apple, Inc. to assist in the execution of a search warrant"), 698: 236:
On February 16, 2016, the Act was invoked again in an order that Apple Inc. create a special version of its
78:
The absence of alternative remedies—the act is only applicable when other judicial tools are not available.
279: 859: 98: 46: 609: 646: 544: 361: 798: 297:, argued: "If the FBI can force Apple to build a key, you can be sure authoritarian regimes like 282:
has established guidelines for what is required of private entities in such circumstances in the
245: 191:
has revived the All Writs Act in the 21st century, notably to gain access to password-protected
819: 260:
announced its support for Apple's position. Several public figures have joined the debate.
188: 26: 839: 549: 106: 833: 778: 583: 204: 760: 256:
warned of the precedent that following the order would create. On the same day, the
578: 342: 192: 118: 642:"Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks" 520:"Here's a map of where Apple and Google are fighting the All Writs Act nationwide" 34: 321: 497: 253: 229:. Federal law enforcement sought to require Apple to extract data from a locked 676: 222: 158: 74:
Application of the All Writs Act requires the fulfillment of four conditions:
290: 230: 62: 672: 668: 574:"Feds want Apple's help to defeat encrypted phones, new legal case shows" 488:"Here are the places feds are using a controversial law to unlock phones" 249: 248:
trivial for anyone with access to a phone using this software. Apple CEO
267:
stated that a decryption order issued under the Act did not violate the
16:
1789 U.S. statute giving federal courts authority to effectuate the law
65:
may be issued by a justice or judge of a court which has jurisdiction.
302: 162: 227:
United States District Court for the Northern District of California
774:"Can an 18th-century law force Apple into hacking killer's phone?" 298: 148: 42: 729: 492: 275:
if the contents of a hard drive were a "foregone conclusion."
237: 815:"This Isn't about One iPhone. It's About Millions of Them" 284:
Communications Assistance for Law Enforcement Act of 1992
756:
United States of America v. Apple Macpro Computer et al.
448:
Telecommunications Research & Action Center v. FCC
225:
in papers invoking the Act, which were filed in the
195:
in domestic terrorism and narcotics investigations.
153:State-by-state usage of the All Writs Act by the 59: 219:Oakland Division of the U.S. Attorney's Office 553:. United States District Court, S.D. New York 8: 850:United States federal judiciary legislation 699:"EFF to Support Apple in Encryption Battle" 794:"Magistrate Judge James Orenstein's Order" 337: 335: 461:"United States v. New York Telephone Co" 366:, Power to Issue Writs: The Act of 1789. 278:In court filings, Apple has argued that 725:"Apple vs. FBI: See who's taking sides" 313: 155:federal government of the United States 131:United States v. New York Telephone Co. 265:Court of Appeals for the Third Circuit 723:O'Neill, Maggie (February 19, 2016). 640:Ellen Nakashima (February 17, 2016). 7: 242:2015 San Bernardino terrorist attack 572:Farivar, Cyrus (December 1, 2014). 697:Opsahl, Kurt (February 16, 2016). 518:Raymundo, Oscar (March 30, 2016). 293:(D-OR), a privacy advocate on the 14: 623:United States of America v. Apple 605:United States of America v. Apple 486:Pagliery, Jose (March 30, 2016). 376:Portnoi, D. D. (March 19, 2009). 139:Application to electronic devices 467:. Supreme Court of United States 128:The U.S. Supreme Court ruled in 450:, 750 F.2d 70 (D.C. Cir. 1984). 360:principles and usages of law." 212:U.S. District Court in New York 703:Electronic Frontier Foundation 386:New York University Law Review 322:"TOPN: Table of Popular Names" 258:Electronic Frontier Foundation 200:American Civil Liberties Union 1: 426:, 477 F.2d 24 (2d Cir. 1973). 343:"28 U.S. Code § 1651 - Writs" 295:Senate Intelligence Committee 105:In a later similar case, the 27:United States federal statute 673:"A Message to our Customers" 438:, 415 U.S. 61, 77-78 (1974). 246:brute force password attacks 233:as part of a criminal case. 145:FBI–Apple encryption dispute 39:United States federal courts 347:Legal Information Institute 326:Legal Information Institute 182: Apple Inc. and Google 876: 735:Turner Broadcasting System 142: 389:: 293–322. Archived from 217:On November 3, 2014, the 57:The text of the Act is: 263:On March 20, 2017, the 210:On October 31, 2014, a 37:, which authorizes the 184: 67: 671:(February 16, 2016). 152: 99:FTC v. Dean Foods Co. 47:Judiciary Act of 1789 855:1789 in American law 845:1911 in American law 802:. February 29, 2016. 782:. February 18, 2016. 424:FTC v. PepsiCo, Inc. 414:384 U.S. 597 (1966). 396:on February 21, 2016 647:The Washington Post 135:criminal activity. 799:The New York Times 273:self-incrimination 271:privilege against 185: 93:U.S. Supreme Court 70:Conditions for use 436:Sampson v. Murray 867: 825: 824: 810: 804: 803: 790: 784: 783: 770: 764: 758: 752: 746: 745: 743: 741: 720: 714: 713: 711: 709: 694: 688: 687: 685: 683: 665: 659: 658: 656: 654: 637: 631: 625: 619: 613: 607: 601: 595: 594: 592: 590: 569: 563: 562: 560: 558: 541: 535: 534: 532: 530: 515: 509: 508: 506: 504: 483: 477: 476: 474: 472: 457: 451: 445: 439: 433: 427: 421: 415: 412: 406: 405: 403: 401: 395: 382: 373: 367: 357: 351: 350: 339: 330: 329: 318: 181: 175: 170: Apple Inc. 169: 875: 874: 870: 869: 868: 866: 865: 864: 830: 829: 828: 812: 811: 807: 792: 791: 787: 772: 771: 767: 754: 753: 749: 739: 737: 722: 721: 717: 707: 705: 696: 695: 691: 681: 679: 667: 666: 662: 652: 650: 639: 638: 634: 621: 620: 616: 603: 602: 598: 588: 586: 571: 570: 566: 556: 554: 543: 542: 538: 528: 526: 517: 516: 512: 502: 500: 485: 484: 480: 470: 468: 459: 458: 454: 446: 442: 434: 430: 422: 418: 413: 409: 399: 397: 393: 380: 375: 374: 370: 358: 354: 341: 340: 333: 320: 319: 315: 311: 269:Fifth Amendment 189:U.S. Government 183: 179: 177: 173: 171: 167: 147: 141: 72: 55: 17: 12: 11: 5: 873: 871: 863: 862: 857: 852: 847: 842: 832: 831: 827: 826: 805: 785: 765: 747: 715: 689: 660: 632: 614: 596: 564: 550:Google Scholar 536: 510: 478: 465:Google Scholar 452: 440: 428: 416: 407: 368: 352: 331: 312: 310: 307: 178: 172: 166: 143:Main article: 140: 137: 107:Second Circuit 89: 88: 85: 82: 79: 71: 68: 54: 51: 41:to "issue all 31:28 U.S.C. 29:, codified at 15: 13: 10: 9: 6: 4: 3: 2: 872: 861: 858: 856: 853: 851: 848: 846: 843: 841: 838: 837: 835: 822: 821: 816: 809: 806: 801: 800: 795: 789: 786: 781: 780: 779:New York Post 775: 769: 766: 762: 757: 751: 748: 736: 732: 731: 726: 719: 716: 704: 700: 693: 690: 678: 674: 670: 664: 661: 649: 648: 643: 636: 633: 629: 624: 618: 615: 611: 606: 600: 597: 585: 581: 580: 575: 568: 565: 552: 551: 546: 540: 537: 525: 521: 514: 511: 499: 495: 494: 489: 482: 479: 466: 462: 456: 453: 449: 444: 441: 437: 432: 429: 425: 420: 417: 411: 408: 392: 388: 387: 379: 372: 369: 365: 364: 356: 353: 348: 344: 338: 336: 332: 327: 323: 317: 314: 308: 306: 304: 300: 296: 292: 287: 285: 281: 276: 274: 270: 266: 261: 259: 255: 251: 247: 243: 239: 234: 232: 228: 224: 220: 215: 213: 208: 206: 205:Massachusetts 201: 196: 194: 193:mobile phones 190: 164: 160: 156: 151: 146: 138: 136: 133: 132: 126: 124: 120: 117:In 1984, the 115: 113: 108: 103: 101: 100: 94: 86: 83: 80: 77: 76: 75: 69: 66: 64: 58: 52: 50: 48: 44: 40: 36: 32: 28: 24: 23:All Writs Act 19: 860:Surveillance 818: 813:Wyden, Ron. 808: 797: 788: 777: 768: 755: 750: 740:February 19, 738:. Retrieved 728: 718: 708:February 17, 706:. Retrieved 692: 682:February 17, 663: 653:February 17, 651:. Retrieved 645: 635: 622: 617: 604: 599: 589:February 16, 587:. Retrieved 579:Ars Technica 577: 567: 557:February 29, 555:. Retrieved 548: 539: 527:. Retrieved 523: 513: 501:. Retrieved 491: 481: 471:February 29, 469:. Retrieved 464: 455: 447: 443: 435: 431: 423: 419: 410: 400:February 17, 398:. Retrieved 391:the original 384: 371: 362: 355: 346: 325: 316: 288: 277: 262: 235: 216: 209: 197: 186: 176: Google 129: 127: 122: 119:D.C. Circuit 116: 111: 104: 97: 90: 73: 60: 56: 22: 20: 18: 761:No. 15-3537 498:Time Warner 254:open letter 35:§ 1651 834:Categories 680:Retrieved 677:Apple Inc. 584:CondĂ© Nast 309:References 223:Apple Inc. 159:Apple Inc. 123:Dean Foods 121:relied on 112:Dean Foods 669:Cook, Tim 529:March 31, 503:April 30, 291:Ron Wyden 231:iPhone 5S 63:rule nisi 524:Macworld 289:Senator 280:Congress 250:Tim Cook 157:against 363:Findlaw 820:Medium 759:, 303:Russia 252:in an 221:named 180:  174:  168:  163:Google 33:  840:Writs 394:(PDF) 381:(PDF) 299:China 43:writs 25:is a 742:2016 710:2016 684:2016 655:2016 628:Text 610:Text 591:2016 559:2016 531:2016 505:2016 473:2016 402:2016 301:and 187:The 161:and 91:The 21:The 730:CNN 493:CNN 238:iOS 53:Act 836:: 817:. 796:. 776:. 733:. 727:. 701:. 675:. 644:. 582:. 576:. 547:. 522:. 496:. 490:. 463:. 383:. 345:. 334:^ 324:. 207:. 165:. 114:. 823:. 744:. 712:. 686:. 657:. 630:. 612:. 593:. 561:. 533:. 507:. 475:. 404:. 349:. 328:.

Index

United States federal statute
28 U.S.C.
§ 1651
United States federal courts
writs
Judiciary Act of 1789
rule nisi
U.S. Supreme Court
FTC v. Dean Foods Co.
Second Circuit
D.C. Circuit
United States v. New York Telephone Co.
FBI–Apple encryption dispute

federal government of the United States
Apple Inc.
Google
U.S. Government
mobile phones
American Civil Liberties Union
Massachusetts
U.S. District Court in New York
Oakland Division of the U.S. Attorney's Office
Apple Inc.
United States District Court for the Northern District of California
iPhone 5S
iOS
2015 San Bernardino terrorist attack
brute force password attacks
Tim Cook

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑