Whatever your feelings on government wiretapping, it is no surprise, now, that technology firms are cooperating with the government. But Apple has just shed some light on the process thanks to a web page that details their terms for cooperating with U.S. Law Enforcement. While lengthy, the document itself is, ironically, far shorter than the iTunes Terms of Service agreement that most users gloss over on their way to downloading apps and music.
Another irony, at least to me as a developer, is that Apple describes how to track a user by their UDID, a unique identifier to each phone. This is ironic because, as a developer, we are not allowed to use the UDID for tracking as of iOS 7. There are alternative methods that Apple allows that still offer some privacy to the app user, but this document serves as a reminder that the UDID is still around and an important way to track individual users, or at least their devices. Here is the text from that section:
There are some good parts for law-abiding, security conscious users. Apple explicitly states that they can't provide passcodes or crack encryption. And unless there is a non-disclosure order or risk to children, etc., they plan to tell users if legal proceedings are initiated. And even though they can't break a passcode, they can access some information, specifically SMS, photos, videos, contacts, audio recording, and call history. Apple cannot provide: email, calendar entries, or any third-party App data. Additionally, while email wiretaps are possible, iMessage and FaceTime are encrypted end-to-end and cannot be accessed.