Tim Cook was ready to tell the President of the United States no. And he had the letter already written. Newly declassified documents from the San Bernardino iPhone case reveal that Apple's CEO drafted a direct, defiant letter to the Obama administration in February 2016 — a legal grenade that would have challenged the FBI's demand for iPhone decryption all the way to the Supreme Court. The letter was never sent. The FBI found a third-party hack, dropped the case, and the standoff that could have redefined digital privacy vanished into bureaucratic silence. This is the story of what almost happened. And why it matters more in 2026 than ever. The Draft Letter Nobody Saw In response to the FBI's court order demanding Apple create a backdoored version of iOS to unlock the San Bernardino shooter's iPhone, Tim Cook prepared a letter drafted for direct delivery to the Obama administration. The letter, revealed in 2026 through declassified FOIA documents, made Apple's position unequivocal: The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The letter invoked the First and Fifth Amendments, arguing that compelling Apple to write code against its will constituted both compelled speech and a violation of due process. Legal scholars who have reviewed the draft describe it as "exceptionally well-crafted constitutional litigation" that would have forced the Supreme Court to confront a question it has never fully answered: Can the government compel a private company to undermine its own security architecture? Why the Fight Never Happened The FBI didn't back down because it lost the legal argument. It backed down because it found another way in. In March 2016, just weeks before the case would have reached the Supreme Court, the FBI announced it had found a "third party" capable of unlocking the iPhone without Apple's assistance. The identity of that third party remains officially classified, but reporting from 2026 confirms it was an Israeli mobile forensics firm that exploited a zero-day vulnerability in the iPhone 5c's bootloader. The FBI dropped its case against Apple. The draft letter was filed away. And the country was deprived of a Supreme Court ruling that would have established whether the All Writs Act — a statute from 1789 — could be used to compel companies to break their own encryption in the 21st century. What Was at Stake The San Bernardino case was never about one iPhone. It was about establishing a legal precedent that would have applied to every encrypted device in America: The FBI's Position: The All Writs Act gives courts broad authority to issue orders necessary to enforce their judgments Apple had the technical capability to unlock the device The request was limited to one phone in one investigation Apple's Counter: The demand was not limited to one phone — the code could be reused indefinitely Once created, the backdoor could not be uncreated Foreign governments would demand the same tool Apple's business depends on security promises it would be forced to break The Unspoken Reality: The FBI's "one phone" claim was demonstrably false. Within weeks of the San Bernardino demand, federal prosecutors in 12 other jurisdictions filed similar motions demanding Apple unlock iPhones in drug cases, fraud investigations, and immigration enforcement. The tool the FBI demanded was not a scalpel. It was a master key. The Obama Administration's Position President Obama publicly supported the FBI's position while privately expressing reluctance. Declassified meeting notes from February 2016 show Attorney General Loretta Lynch pushing for aggressive litigation while White House cybersecurity advisors warned that forcing Apple's hand would damage American tech companies' competitiveness abroad. The administration's official position, articulated by Obama in a March 2016 interview: You can't have absolute privacy. But the internal documents reveal a White House deeply divided — and relieved when the third-party hack made the legal question disappear. The Third-Party Hack That Changed Everything The Israeli forensics firm that unlocked the San Bernardino iPhone used a previously unknown vulnerability in the iPhone 5c's Secure Enclave bootloader. The vulnerability allowed them to bypass the device's passcode attempt limit without triggering the automatic data wipe. Key details from 2026 reporting: The exploit cost the FBI approximately $1.3 million It was specific to the iPhone 5c and did not work on newer models The vulnerability was never disclosed to Apple, violating the government's Vulnerabilities Equities Process The same exploit was later used in at least 43 other federal cases The government's decision to withhold the vulnerability from Apple — a company that would have fixed it — meant that every iPhone 5c user remained vulnerable to the same attack for years after the San Bernardino case closed. What the Supreme Court Never Ruled The San Bernardino case was the best chance America has ever had to establish bright-line rules about encryption and government access. Because the case was mooted before reaching the Supreme Court, the fundamental legal questions remain unresolved: Can the All Writs Act compel code creation? The statute was written before the existence of computers, let alone encryption. Whether it authorizes courts to compel companies to write code they oppose remains an open question. Does compelled code creation violate the First Amendment? Apple's draft letter argued that code is speech, and compelled code creation is compelled speech. This argument has never been tested at the Supreme Court level. What are the limits of "reasonable assistance" in the digital age? The FBI's interpretation of "reasonable assistance" required Apple to fundamentally undermine its own product security. Where that line sits remains undefined. Why This Matters in 2026 The legal vacuum created by the San Bernardino case's premature resolution has grown more dangerous with time: Aftermath: The FBI has continued to use third-party exploits rather than seeking legislative authority Apple's encryption has become stronger, not weaker, in response to the case Congress has still not passed legislation clarifying government's authority over encrypted devices State and local law enforcement have increasingly turned to commercial forensics tools rather than seeking court orders The Current Landscape: In 2026, Apple iPhones use on-device encryption that even Apple cannot bypass Law enforcement agencies routinely use GrayKey, Cellebrite, and similar tools The legal framework governing these tools remains a patchwork of state and federal precedents The fundamental question — Can the government compel decryption assistance? — has never been answered The Documents Speak The 2026 declassification includes: The full draft letter from Tim Cook to the Obama administration (28 pages) Internal FBI memos debating whether to pursue the case to the Supreme Court White House meeting notes showing deep administration divisions Emails between DOJ officials discussing the political risks of losing The draft letter's closing paragraph: We are a staunch advocate for our customers' privacy and personal safety. This moment demands that we speak with clarity and courage. We will not shrink from this responsibility. Tim Cook never sent those words. But he meant them. What Should Have Happened Legal scholars across the political spectrum agree: The San Bernardino case should have reached the Supreme Court. Both sides deserved a definitive ruling: Law enforcement deserves clarity about its authority Tech companies deserve clarity about their obligations Citizens deserve to know whether their devices can be compelled open The Constitution deserves interpretation in the digital age The third-party hack that mooted the case was convenient for the FBI in 2016. It was a disservice to American law, American technology, and American privacy that still reverberates a decade later. The Bottom Line Tim Cook was prepared to defy the President of the United States to protect iPhone encryption. He had the legal arguments ready. He had the letter drafted. He was prepared to take the fight to the highest court in the land. The fight never came. A $1.3 million hack made the legal question disappear — and left the constitutional crisis unresolved. Nobody asked you if you wanted a backdoor into your phone. They just wanted to know if they could force someone else to build one. Use the Fingerprint Analyzer to see what your browser reveals about you. Check your browser permissions audit to understand what sites can access. --- _This article draws on newly declassified documents released in April 2026. Original reporting by Ars Technica, Just Security, and FOIA litigation by the Electronic Frontier Foundation._