Apple said the change, which would disable the Lightning port on the bottom edge of iPhones an hour after users lock their phones, is part of a security upgrade to better protect the private information of iPhone users. It will have little practical effect on most people using the devices but will make it far more difficult for investigators to use extraction tools that attach through the port for the purpose of collecting the contents of seized iPhones.
The change isn't intended to thwart law enforcement efforts, Apple said. "We're constantly strengthening the security protections in every Apple product to help customers defend against hackers, identity thieves and intrusions into their personal data," said the company in a statement. "We have the greatest respect for law enforcement, and we don't design our security improvements to frustrate their efforts to do their jobs."
Yet some authorities almost certainly will see it as yet another barrier to carrying out their legally sanctioned investigations.
Apple has been at the center of such debates since it declined FBI requests to unlock an iPhone 5C used by a gunman in the San Bernardino, California, shooting in 2015 that left 14 people dead. A brewing legal showdown was defused after the FBI hired professional hackers to crack into the device. Many such efforts rely on gaining access through the Lightning port for which Apple is now restricting access.
The Lightning port is used for charging iPhones, which will still be possible when the devices are in their locked state, and for transferring data, which will be blocked after an hour. The change is coming through a series of software updates and should be on most iPhones sometime in the fall.
Reaction to the proposed change broke along familiar lines, with privacy and security advocates cheering the move and law enforcement officials decrying it.
"This could be painted as fundamentally about denying law enforcement access, but this is a security vulnerability," Julian Sanchez, a senior fellow at the Cato Institute. "There is a method by which the security of the device can be compromised by devices law enforcement can purchase. There's not really any reason to think only law enforcement will ever have those devices."
The spread of popular consumer devices with access to user communications, photos, documents, call records and location histories proved to be a massive boon for law enforcement and intelligence services for years. But revelations about the volume and precision of such data -- most famously from former National Security Agency contractor Edward Snowden in 2013 -- prompted a consumer backlash. Companies responded with a wave of new encryption initiatives and other security improvements on computers, smartphones and popular communication tools such as email.
Apple was among the leaders of this movement, portraying its devices as more secure than those of rivals and its business model -- which relied on pricey products, not profiting off the personal data of its users -- as more attuned to the privacy expectations of its customers. The company drew particular ire from law enforcement in 2014 after announcing that its iOS 8 mobile operating system would include a new form of encryption making it impossible for the company to turn over the contents of iPhones to police -- even when they had search warrants.
FBI officials in particular have complained about what they call the "Going Dark Problem" as encryption becomes increasingly widespread and strong across a range of consumer devices and services.
"I think that privacy protections are on a collision course with responsible law enforcement actions to conduct legitimate investigations," said Ronald Hosko, a former assistant director of the FBI who is now president of the Law Enforcement Legal Defense Fund, which raises money to defend officers accused of misconduct. "Terrorists or other criminal organizations will do something that's heinous, in a way that is blocked from lawful law enforcement view. They will to some extent get away with it."
For months, the FBI has been criticized for misrepresenting its ability to crack encrypted devices. In March, an inspector general for the Justice Department found that federal law enforcement officials "did not pursue all possible avenues" to break into the iPhone at the heart of the San Bernardino attack.
The Washington Post reported in May that the FBI had misstated the number of all mobile devices that it could not access due to encryption by the thousands.
(Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)