An Apple spokesperson explains in a statement that the company is constantly looking for ways to improve the security protections of its devices.

As we highlighted last week, the new USB Restricted Mode requires that an iPhone be unlocked with a passcode when connected to a computer via USB if the device has not already been unlocked in the last hour.

It’s easy to jump to the conclusion that this change is purely an effort to block law enforcement from using brute force tactics to gain access to iOS devices. Apple, however, says it doesn’t design its devices to frustrate those who are trying to do their jobs:

Apple added that when it learned of the techniques being used to gain access to passcode-protected devices, it decided to simply alter existing security measures and that it was working on the feature before it knew how law enforcement was taking advantage of such techniques:

With this change, law enforcement and other parties looking to access a locked iPhone have an hour to get to an unlocking device such as Cellebrite or GrayKey. These unlocking tools work via a USB connection, so once that hour passes, they won’t function as the iPhone’s USB connection is essentially blocked, only allowing charging passthrough.

Apple said that after it learned of the techniques, it reviewed the iPhone operating system code and improved security. It decided to simply alter the setting, a cruder way of preventing most of the potential access by unfriendly parties.

Reuters notes the new setting is present in the iOS 12 and iOS 11.4.1 betas. Apple says the feature will simply come soon in a general release.