After trying to force Apple to unlock a pair of passcode-locked iPhones, a new report suggests that the Federal Bureau of Investigation has managed to bypass at least one of the iPhones used by the Pensacola mass shooter without Apple's help.
Cracking iPhones is a huge business in its own regard, especially as law enforcement agencies across the United States fork over a ton of cash to bypass a device's security.
A new report out today says that Apple has not implemented end to end encryption on iCloud backups at the behest of the FBI. Apple hasn't verified the report, but it has other reasons not to encrypt iCloud backups. In the end, I don't worry too much about the absence of end-to-end encryption in iCloud, because it's to my benefit. Let me explain.
Reuters today alleged Apple did bow to pressure from the Federal Bureau of Investigation (FBI) which reportedly demanded that the Cupertino firm drop plans to roll out end-to-end encryption for iCloud device backups, claiming doing so would harm investigations.
Apple popped up in the news this week after both U.S. Attorney General William Barr and President Trump publicly called for the company to help unlock iPhones used by the Saudi Air Force cadet accused of perpetrating a terror attack on a U.S. Navy base in Pensacola, FL in December. Apple's pushing back, and make no mistake: Your privacy is on the line here. iPhone encryption should matter to all of us.
Apple's officially denied a request it received Monday from the US Attorney General William Barr to "unlock" a pair of iPhones owned by the Pensacola naval air station shooter, rejecting the characterization that it's failed to provide "substantive assistance" in the investigation.
The United States Attorney General has made a straightforward request of Apple: unlock a pair of iPhones owned by the individual who recently attacked the Pensacola naval air station in the state of Florida.
The Federal Bureau of Investigation (FBI) is seeking help from engineers at Apple to help it unlock two iPhones owned by a gunman suspected of carrying out a shooting attack that took place last month at Naval Air Station Pensacola in Florida.
FBI forensic expert Stephen Flatley has lashed out at Apple during yesterday's International Conference on Cyber Security in Manhattan, calling its engineers “jerks” and “evil geniuses” for making the bureau's investigative work harder with strong encryption on iOS devices.
According to a report last week, Texas Rangers have served Apple with a search warrant in the case of the Sutherland Springs shooting.
The United States Federal Bureau of Investigation (FBI) has failed to extract any data or personal information from nearly 7,000 devices because of strong encryption.
Just how much did the tool to break into the San Bernardino gunman's locked iPhone 5c cost US taxpayers? According to senator Dianne Feinstein, the Federal Bureau of Investigation coughed up a cool $900,000 to purchase the tool from a third-party.
The Associated Press said Monday that the classified information was revealed during a Senate Judiciary Committee oversight hearing, where senator Feinstein was questioning FBI director James Comey.
“I was so struck when San Bernardino happened and you made overtures to allow that device to be opened, and then the FBI had to spend $900,000 to hack it open,” said Feinstein, D-Calif. “And as I subsequently learned of some of the reason for it, there were good reasons to get into that device.”
While the tool's vendor wasn't named, it's been speculated that the FBI bought the software from Israeli digital forensics firm Cellebrite.
Comey called the sum “worth it” even though the FBI itself said it found “nothing of real significance” after gaining access to the device.
Subscribe to iDownloadBlog on YouTube
The FBI sought to protect the identity of the vendor it paid to do the work.
The organization considers the exact sum paid for the tool to be classified information, prompting The Associated Press and a few other news organizations to file a public records lawsuit seeking to force the government to publicly reveal both pieces of information.