FBI and Apple may have another showdown over locked iPhone

Apple appears headed toward another showdown with the US Federal Bureau of Investigation (FBI), as the agency this morning revealed it had asked Apple for assistance in recovering data from two iPhones in a recent case. Apple, so far, has declined to unlock the devices.

The devices belong to the gunman in last month’s naval base shooting in Pensacola, Florida. The shooter, Lt. Mohammed Saeed Alshamrani of the Saudi Royal Air Force, gunned down three servicemen in the attack: Ensign Joshua Watson, 23; Airman Mohammed Haitham, 19; and Airman Apprentice Cameron Walters, 21. Alshamrani was killed at the scene.

Dana Boente, FBI general counsel, said that federal investigators were so far unable to access Alshamrani’s two iPhones because each was locked and encrypted.

In 2014, Apple started to build encryption into each iPhone sold. To open a device, a user is required to enter a six (or more) digit passcode. Apple doesn’t know this passcode as the encryption key is stored on the device itself, not in the cloud.

It’s likely that law enforcement personnel collected the phone after it was shut off, or else biometrics like Touch ID or Face ID may have been used to access the phone. We know that at least one of the phones had been shot and damaged before the shooter was killed.

Once the phone sits idle for a long period, or loses power, a user must re-enter their six (or more) digit passcode to access the device. Unfortunately for the FBI, this passcode isn’t available to Apple, as it’s stored on the device itself and not in the cloud.

In a statement, Apple said it had given the FBI all the data “in our possession.” An Apple spokesperson added: “We will continue to support [the FBI] with the data we have available.”

Apple, for its part, routinely complies with court orders to hand over data stored on its servers. This data, however, is typically of the iCloud variety and nothing that would include the encryption key to the phone itself.

But while it doesn’t contain information that would allow the FBI to unlock the iPhone — unless a user would be dumb enough to store his passcode in Notes, for example — the data turned over by Apple isn’t nothing. A user with iCloud backups enabled, for example, could unknowingly provide access to their photo library, videos, and any files stored in Apple’s new file system, among other things.

If this all sounds familiar, it should. In 2016, the FBI requested Apple’s help in unlocking an iPhone belonging to Syed Rizwan Farook, the San Bernardino shooter who killed 14 in 2015.

The FBI pleaded with Apple to unlock the device, an iPhone 5c. Apple told the FBI it couldn’t, as the devices were encrypted based on a user passcode, not information it stored in the cloud or data that it could otherwise access. The showdown eventually led to court orders, which Apple refused to comply with, and eventually a…

https://thenextweb.com/plugged/2020/01/08/fbi-and-apple-seemingly-headed-toward-another-showdown-over-locked-iphone/

Leave a Reply