Interesting new document from Apple, outlining in detail how they cooperate with U.S. law enforcement agencies and what information they’re capable of providing. This part caught my eye:
Upon receipt of a valid search warrant, Apple can extract certain
categories of active data from passcode locked iOS devices.
Specifically, the user generated active files on an iOS device
that are contained in Apple’s native apps and for which the data
is not encrypted using the passcode (“user generated active
files”), can be extracted and provided to law enforcement on
external media. Apple can perform this data extraction process on
iOS devices running iOS 4 or more recent versions of iOS. Please
note the only categories of user generated active files that can
be provided to law enforcement, pursuant to a valid search
warrant, are: SMS, photos, videos, contacts, audio recording, and
call history. Apple cannot provide: email, calendar entries, or
any third-party App data.
Also:
Apple can intercept users’ email communications, upon receipt of a
valid Wiretap Order. Apple cannot intercept users’ iMessage or
FaceTime communications as these communications are end-to-end
encrypted.