Apple CEO Tim Cook was on ABC News last night, spending some time with reporter David Muir in his minimalist Cupertino, California office discussing the FBI case and how the government’s demands risk undermining every iPhone owner’s security.
For those who didn’t have the time to sit through the 60-minute interview, Cook reiterated Apple’s stance that the government’s demand that it create a one-off version of iOS with decreased security to help get data off the San Bernardino shooter’s iPhone 5c sets a dangerous precedent, likening it to “the software equivalent of cancer.”
The world’s most powerful government has locked horns with the world’s most powerful corporation in a battle that Apple implies has the potential to affect civil rights for a generation. As you know, the Justice Department gave Apple until February 26 to respond to its court order.
In it, the government is asking Apple’s engineers to create a special version of iOS that would allow brute-force passcode attacks on the shooter’s phone electronically.
Now, some people have suggested that the government’s experts could make an exact copy of the phone’s flash memory to brute-force its way into encrypted data on a powerful computer without needing to guess the passcode on the phone or demand that Apple create a version of iOS that’d remove passcode entry restrictions.
While this is technically feasible, the so-called de-capping method would be painstakingly slow and extremely risky, here’s why.
Lawyers representing families of the victims of the San Bernardino shooting massacre plan to file a legal brief in support of the United States Department of Justice’s demand that Apple help unlock the shooter’s iPhone 5c by creating a one-off version of iOS to permit brute-force attacks electronically, without the phone slowing down the process or erasing its contents after 10 failed attempts.
According to Reuters, Stephen Larson, a former federal judge who is now in private practice and represents families of the victims, was contacted a week ago by the Justice Department and local prosecutors about representing the victims, prior to the dispute becoming public.
In addition to an all-hands memo issued to troops Monday about the government’s demand that it create what would basically be an ‘FBiOS,’ a software backdoor to help unlock San Bernardino shooter’s iPhone, Apple has also posted a public Q&A on its website this morning, showing a company unwavering in its position that fulfilling the request would constitute a dangerous precedent.
Titled “Answers to your questions about Apple and security,” the webpage details the case and provides some more technical information about the government’s request, while also answering some of the burning questions such as whether Apple has unlocked iPhones for law enforcement in the past.
After issuing an open letter to Apple users regarding the FBI’s request to create an iPhone backdoor to help hack into the San Bernardino shooter’s locked iPhone 5c, CEO Tim Cook on Monday reinforced his company’s position in an internal memo to troops.
According to the all-hands memo, a copy of which was obtained by John Paczkowski of Buzz Feed, Apple wants the Justice Department to withdraw a court order that would force it to create a special version of iOS with decreased security measures.
When a federal judge in California ordered Apple to aid the FBI in an investigation earlier this week, she sparked what many believe is the most important privacy debate in recent memory. The FBI wants access to the passcode-locked iPhone of one of the shooters involved in last year’s San Bernardino massacre, and it wants Apple to help it break in.
At a high level, this seems pretty simple: the FBI has bad guy’s phone; it wants to use it to try and stop other bad guys; it needs Apple’s help to do that. But you don’t have to zoom in very far to see that it’s much more complex. Apple refused to help the FBI, saying that the request “undermines the very freedoms and liberty our government is meant to protect.”
That was on Wednesday. Here is everything that has happened since.
A federal judge on Tuesday ordered Apple to help investigators access encrypted data on the iPhone used by one of the San Bernardino shooters, reports NBC News. The ruling says that the Cupertino firm must provide “reasonable technical assistance” to the FBI in recovering data from the handset.
More specifically, the device is an iPhone 5c that belongs to Syed Farook, who with his wife Tashfeen Malik murdered 14 people in San Bernardino, California last year. The phone is locked with a passcode, and prosecutors say data found in Farook’s iCloud account suggests it could contain evidence.
The FBI is very concerned with the new privacy features Apple is touting in iOS 8, the organization’s director James Comey told The Huffington Post on Thursday. In particular, he’s concerned the company is marketing something “expressly to allow people to place themselves above the law.”
Comey’s remarks follow Apple’s move last week to be more transparent and informative about its user privacy policies. In a new webpage on the topic, the Cupertino firm said it no longer stores encryption keys for devices running iOS 8, meaning it can’t bypass pass codes—even under subpoena.
A number of Android security problems pose a threat to law enforcement officers using the Google mobile operating software.
According to an unclassified government report, 44 percent of Android users continue to use older versions of the software, opening themselves to numerous security threats, including malware infestation and malicious text messages.
According to the report, obtained from a group promoting public access to government data, Android is the “primary target” of security attacks, with 79 percent of threats…
It took investigators working on Thursday’s snatch-and-grab – one that saw crooks drive away with two pallets of iPad minis worth $1.9 million – less than 24 hours to nab a suspect, a JFK Airport worker.
As Ed told you, two unidentified individuals used the airport’s own forklift to load the iPads onto their truck just before midnight Monday. The thieves operated in the same cargo area where director Martin Scorsese filmed a Lufthansa flight heist in the 1978 mob flick “GoodFellas”.
The Bureau was able to apprehend airport worker Renel Rene Richardson on the grounds that he made suspicious inquiries to co-workers about the gadget shipment and where forklifts might be found. What a “Dumbfella”…