PDA

View Full Version : FBI breaks into San Bernardino gunman's iPhone without Apple's help, ending court case



Teh One Who Knocks
03-29-2016, 11:00 AM
FOX News and The Associated Press


http://i.imgur.com/CprMc62.jpg

The U.S. Justice Department announced Monday it has successfully accessed data stored on the iPhone that belonged to the San Bernardino gunman without Apple's help, ending the court case against the tech company.

The surprise development effectively ends a pitched court battle between Apple and the Obama administration.

The government asked a federal judge to vacate a disputed order forcing Apple to help the FBI break into the iPhone, saying it was no longer necessary.

The court filing in U.S. District Court for the Central District of California provided no details about how the FBI did it or who showed it how.

“As the government noted in its filing today, the FBI has now successfully retrieved the data stored on the San Bernardino terrorist’s iPhone and therefore no longer requires the assistance from Apple required by this Court Order," DOJ spokeswoman Melaine Newman said in a statement. "The FBI is currently reviewing the information on the phone, consistent with standard investigatory procedures."

A law enforcement official said Monday night that DOJ no longer requires the assistance of Apple in unlocking the iPhone that belonged to San Bernardino gunman Syed Farook given that the third party method demonstrated to FBI earlier this month proved successful.

The official added that the decision to request that the order compelling Apple to assist FBI be vacated by the court for that same reason.

The law enforcement official said that FBI is currently reviewing the information on Farook’s iPhone and that the bureau will continue to explore every lead to make sure that all evidence in the San Bernardino terror attack is collected. The official would not comment on what FBI may have found on the phone as of now.

The official would not disclose any details about the method used to unlock the phone or the third party that demonstrated this method to FBI, only noting that the third party was outside the government.

"From the beginning, we objected to the FBI's demand that Apple build a backdoor into the iPhone because we believed it was wrong and would set a dangerous precedent," Apple said in a statement. "As a result of the government’s dismissal, neither of these occurred. This case should never have been brought."

"We will continue to help law enforcement with their investigations, as we have done all along, and we will continue to increase the security of our products as the threats and attacks on our data become more frequent and more sophisticated," the statement continued.

The surprise development also punctured the temporary perception that Apple's security might have been good enough to keep consumers' personal information safe even from the U.S. government — with the tremendous resources it can expend when it wants to uncover something.

The FBI used the technique to access data on an iPhone used by gunman Syed Farook, who died with his wife in a gun battle with police after they killed 14 people in San Bernardino, California, in December.

U.S. magistrate Sheri Pym of California last month ordered Apple to provide the FBI with software to help it hack into Farook's work-issued iPhone. The order touched off a debate pitting digital privacy rights against national security concerns.

Apple was headed for a courtroom showdown with the government last week, until federal prosecutors abruptly asked for a postponement so they could test a potential solution that was brought to them by an unidentified party the previous weekend.

Technical experts had said there might be a few ways an outsider could gain access to the phone, although the FBI had insisted repeatedly until then that only Apple had the ability to override the iPhone's security.

The case drew international attention and highlighted a growing friction between governments and the tech industry. Apple and other tech companies have said they feel increasing need to protect their customers' data from hackers and unfriendly intruders, while police and other government authorities have warned that encryption and other data-protection measures are making it more difficult for investigators to track criminals and dangerous extremists.

The withdrawal of court process also takes away Apple's ability to legally request details on the method the FBI used. Apple attorneys said last week that they hoped the government would share that information with them if it proved successful.

The encrypted phone was protected by a passcode that included security protocols: a time delay and self-destruct feature that erased the phone's data after 10 tries. The two features made it impossible for the government to repeatedly and continuously test passcodes in what's known as a brute-force attack.

As to whether DOJ will apply this method to other cases involving locked iPhones, a law enforcement official said Monday night that FBI is focused on the San Bernardino case and that they could not comment on the possibility of future disclosures at this time.

The official added that it would be premature to say anything about DOJ’s ability to access other phones through this method at this point, only adding that FBI knows that it works on the iPhone 5C that belonged to the San Bernardino gunman which was running iOS 9.

On working with Apple going forward, the official said that the goal has always been to work cooperatively with Apple and that DOJ will want to continue to work with Apple in the future

redred
03-29-2016, 11:10 AM
Better be worth the effort and money they've spent

Teh One Who Knocks
03-29-2016, 11:14 AM
With our government, money is no object...especially since it's our tax money at work :thumbsup:

redred
03-29-2016, 11:56 AM
bet they find cute cat pictures

DemonGeminiX
03-29-2016, 12:34 PM
Cute cat pictures from 2005. :yup:

Pony
03-29-2016, 03:37 PM
bet they find cute cat pictures

Considering they (terrorists) destroyed the personal phones and not this work phone I'll bet they will find nothing that helps them "make this country safer".

RBP
03-29-2016, 03:49 PM
I bet the encrypted pictures are of him and her eating bacon.

Pony
03-29-2016, 04:14 PM
:lol:

Pony
03-29-2016, 04:16 PM
I bet the encrypted pictures are of him and her eating bacon.

And some racy pics of an exposed ear and maybe even a wrist!


:wank:

RBP
03-29-2016, 04:34 PM
:lwank:

redred
03-29-2016, 04:41 PM
:drool: arab porn

PorkChopSandwiches
03-29-2016, 07:05 PM
This will result in a solid 0

Teh One Who Knocks
03-30-2016, 11:00 AM
The Associated Press


http://i.imgur.com/BGCNtxZ.jpg

WASHINGTON – The FBI's announcement that it mysteriously hacked into an iPhone is a public setback for Apple Inc., as consumers learned that they can't keep the government out of even an encrypted device that U.S. officials had claimed was impossible to crack. Apple, meanwhile, remains in the dark about how to restore the security of its flagship product.

The government said it was able to break into an iPhone used by a gunman in a mass shooting in California, but it didn't say how. That puzzled Apple software engineers — and outside experts — about how the FBI broke the digital locks on the phone without Apple's help. It also complicated Apple's job repairing flaws that jeopardize its software.

The Justice Department's announcement that it was dropping a legal fight to compel Apple to help it access the phone also took away any obvious legal avenues Apple might have used to learn how the FBI did it. Magistrate Judge Sheri Pym on Tuesday vacated her Feb. 16 order, which compelled Apple to assist the FBI in hacking their phone.

The Justice Department declined through a spokeswoman to comment Tuesday.

A few clues have emerged. A senior law enforcement official told The Associated Press that the FBI managed to defeat an Apple security feature that threatened to delete the phone's contents if the FBI failed to enter the correct passcode combination after 10 tries. That allowed the government to repeatedly and continuously test passcodes in what's known as a brute-force attack until the right code is entered and the phone is unlocked.

It wasn't clear how the FBI dealt with a related Apple security feature that introduces increasing time delays between guesses. The official spoke on condition of anonymity because this person was not authorized to discuss the technique publicly.

FBI Director James Comey has said with those features removed, the FBI could break into the phone in 26 minutes.

The FBI hacked into the iPhone used by gunman Syed Farook, who died with his wife in a gun battle with police after they killed 14 people in December in San Bernardino. The iPhone, issued to Farook by his employer, the county health department, was found in a vehicle the day after the shooting.

The FBI is reviewing information from the iPhone, and it is unclear whether anything useful can be found.

Apple said that the legal case to force its cooperation "should never have been brought," and it promised to increase the security of its products. CEO Tim Cook has said the Cupertino-based company is constantly trying to improve security for its users. The company declined to comment more Tuesday.

The FBI's announcement — even without revealing precise details — that it had hacked the iPhone was at odds with the government's firm recommendations for nearly two decades that security researchers always work cooperatively and confidentially with software manufacturers before revealing that a product might be susceptible to hackers.

The aim is to ensure that American consumers stay as safe online as possible and prevent premature disclosures that might damage a U.S. company or the economy.

As far back as 2002, the Homeland Security Department ran a working group that included leading technology industry executives to advise the president on how to keep confidential discoveries by independent researchers that a company's software could be hacked until it was already fixed. Even now, the Commerce Department has been trying to fine-tune those rules. The next meeting of a conference on the subject is April 8 in Chicago and it's unclear how the FBI's behavior in the current case might influence the government's fragile relationship with technology companies or researchers.

The industry's rules are not legally binding, but the government's top intelligence agency said in 2014 that such vulnerabilities should be reported to companies and the Obama administration put forward an interagency process to do so.

"When federal agencies discover a new vulnerability in commercial and open source software — a so-called 'zero day' vulnerability because the developers of the vulnerable software have had zero days to fix it — it is in the national interest to responsibly disclose the vulnerability rather than to hold it for an investigative or intelligence purpose," the Office of the Director of National Intelligence said in a statement in April 2014.

The statement recommended generally divulging such flaws to manufacturers "unless there is a clear national security or law enforcement need."

Last week a team from Johns Hopkins University said it had found a security bug in Apple's iMessage service that would allow hackers under certain circumstances to decrypt some text messages. The team reported its findings to Apple in November and published an academic paper after Apple fixed it.

"That's the way the research community handles the situation. And that's appropriate," said Susan Landau, professor of cybersecurity policy at Worcester Polytechnic Institute. She said it was acceptable for the government to find a way to unlock the phone but said it should reveal its method to Apple.

Mobile phones are frequently used to improve cybersecurity, for example, as a place to send a backup code to access a website or authenticate a user.

The chief technologist at the Center for Democracy and Technology, Joseph Lorenzo Hall, said keeping details secret about a flaw affecting millions of iPhone users "is exactly opposite the disclosure practices of the security research community. The FBI and Apple have a common goal here: to keep people safe and secure. This is the FBI prioritizing an investigation over the interests of hundreds of millions of people worldwide."