Cupertino no longer compelled to unlock San Bernardino shooter’s mobe
The US Department of Justice (DoJ) says it no longer needs Apple to help unlock the iPhone 5C used by one of the San Bernardino killers.
In a filing [PDF] made Monday to the Central California District Court, prosecutors say they have extracted data from the smartphone belonging to slain San Bernardino killer Syed Farook, thus avoiding a risky legal showdown with Apple.
“The government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple Inc. mandated by the court’s order compelling Apple Inc. to assist agents in search, dated February 16, 2016,” the DoJ said in its request that the court order be withdrawn.
The request is expected to be granted by Magistrate Judge Sheri Pym.
The DoJ told the courts last week that it wanted to put its order compelling Apple to assist the FBI on hold in order to try other methods of accessing the data.
The DoJ is not saying how it got the data or the name of the outside company that helped it crack the iPhone, though speculation has been that mobile networking company Cellebrite is the mystery party.
Security researchers believe that the data could have been accessed with either hardware or software techniques, and that the DoJ might also be able to use the technique in the future to get at mobile phone data without asking Apple to help.
If the method used in this case turns out to be a software method, from what I see of the OS, the method could work on newer devices too.
— Jonathan Ździarski (@JZdziarski) March 28, 2016
Will the FBI share their new iOS exploit with the Manhattan DA’s office and other state/local agencies who have iPhones they want to unlock?
— Christopher Soghoian (@csoghoian) March 28, 2016
By using another method to obtain the data on Farook’s phone, the DoJ and the FBI avoid a potentially messy legal battle with Apple.
The government had originally sought to force Apple to craft and cryptographically sign a special build of iOS that would have allowed g-men to guess Farook’s passcode at high speed and without losing the data after too many wrong attempts.
Apple had been fighting the order on privacy grounds, arguing that by allowing Uncle Sam to force engineers to break their own products, the privacy of hundreds of millions of people was being put at direct risk.
It’s been such a weird case because the FBI has, more or less, always been able to get into devices it has physical access to; now we know it can at least unlock an iPhone 5C protected by a weak numeric PIN.
“Security is a lot easier when you’ve been shot dead, your iPhone has been shut off, and you no longer care about security.
It’s much harder for the living (and in particular, the innocent) who still care about their day to day security,” noted iOS security expert Jonathan Zdziarski.
Apple has yet to respond to a request for comment. ®
Sponsored: Why every enterprise needs an Internet Performance Management (IPM) Strategy