Apple is again at the center of a privacy controversy involving the FBI and locked phones. This time, comments by former president Donald Trump at a Wednesday rally have brought the issue back to the front of public discussion, as he put responsibility on Apple to aid the investigation.
A statement reveals that the FBI accessed the locked phone of Thomas Matthew Crooks, the shooter at the Trump rally. There were unconfirmed reports that the device was an iPhone, but it was subsequently revealed to be a Samsung device.
The FBI said on Sunday that attempts to access the phone had not been successful, but just one day later stated that it has now succeeded …
It’s reported that the carrier made a Bitcoin ransom payment in return for the hacker deleting the data, and that public disclosure of the security breach was delayed for two months in response to a request from the FBI …
Over the past years, we’ve seen the problem of “juice jacking” grow at public charging stations for phones and other devices. Now the FBI considers the risk of juice jacking so high that it’s telling Americans to completely avoid using public chargers in airports, hotels, and malls.
One of the ironies of Apple’s long-running battle with the FBI over the agency’s desire for a security backdoor into iPhones is that it could have taken advantage of one which already existed: The fact that iCloud backups of iPhones didn’t use end-to-end encryption. Apple has now finally fixed this with Advanced Data Protection (ADP).
A special US version of Pegasus smartphone spyware was created by NSO, and purchased by the FBI, a new report reveals today. The Drug Enforcement Agency, Secret Service, and the US military also held discussions with the Israeli spyware company.
Israel had always insisted that NSO make Pegasus incapable of being used on phones registered to US numbers in order to avoid angering a powerful ally, but an exception was granted…
If you want to be alerted to security breaches of user IDs and passwords, Have I Been Pwned (HIBP) is one of the most useful sites around – and it’s about to get even more so …
An exclusive new report today from the Washington Post claims to have the details about how the FBI was able to crack the iPhone 5C in the San Bernardino case, who the little-known security firm was that it used, and how Apple has ended up suing a company co-founded by one of the hackers that cracked the iPhone.
The latest Apple/FBI war of words in the Pensacola case has once again highlighted the huge challenge Apple has in communicating the reality of the debate, in a world in which most people have no understanding of the core issue.
To a non-technical person, the debate appears to be a moral one. The FBI says that it needs access to data from terrorists and criminals, and Apple wants to prevent this. FBI, good; Apple, bad.
To anyone who understands the technology, the debate is very different …
It looks like the most recent contention between the FBI and Apple over device encryption has come to an end as the agency has unlocked the two iPhones belonging to the Pensacola shooter with “no thanks to Apple.” Going further, AG William Barr has again called for the government to force Apple and others to create backdoors into their devices.
Update: We’ve got an official response from Apple on the matter that highlights all the ways it helped the FBI and that it’s precisely because it takes security and privacy so seriously that it doesn’t believe in creating a backdoor:
The terrorist attack on members of the US armed services at the Naval Air Station in Pensacola, Florida was a devastating and heinous act. Apple responded to the FBI’s first requests for information just hours after the attack on December 6, 2019 and continued to support law enforcement during their investigation. We provided every piece of information available to us, including iCloud backups, account information and transactional data for multiple accounts, and we lent continuous and ongoing technical and investigative support to FBI offices in Jacksonville, Pensacola and New York over the months since.
On this and many thousands of other cases, we continue to work around-the-clock with the FBI and other investigators who keep Americans safe and bring criminals to justice. As a proud American company, we consider supporting law enforcement’s important work our responsibility. The false claims made about our company are an excuse to weaken encryption and other security measures that protect millions of users and our national security.
It is because we take our responsibility to national security so seriously that we do not believe in the creation of a backdoor — one which will make every device vulnerable to bad actors who threaten our national security and the data security of our customers. There is no such thing as a backdoor just for the good guys, and the American people do not have to choose between weakening encryption and effective investigations.
Customers count on Apple to keep their information secure and one of the ways in which we do so is by using strong encryption across our devices and servers. We sell the same iPhone everywhere, we don’t store customers’ passcodes and we don’t have the capacity to unlock passcode-protected devices. In data centers, we deploy strong hardware and software security protections to keep information safe and to ensure there are no backdoors into our systems. All of these practices apply equally to our operations in every country in the world.
The US Senate yesterday voted – by a single vote – to allow government agencies like the FBI and CIA to access your browsing history without a warrant.
This means they would not need to show probable cause for believing you have committed a crime before requiring your ISP to hand over its records on your web browsing and search histories …
The FBI has obtained a copy of iCloud data belonging to Senator Richard Burr, chair of the Senate Intelligence Committee, after serving Apple with a warrant compelling it to hand over the data. This likely includes an iCloud backup of Burr’s iPhone.
The FBI used the data in order to obtain a subsequent warrant to seize Burr’s iPhone as part of an investigation into whether the senator broke the law to profit from the coronavirus crisis …
In early January, the FBI asked Apple to unlock two iPhones as part of the Pensacola case. Apple stood its ground and said it wouldn’t create a backdoor for iOS but would help as much as it could without crossing that line. Even though the FBI has the ability to unlock the iPhone 7 and iPhone 5 with the help of third-parties, today it said it still hasn’t been able to get to the data on the devices.
US President Donald Trump has again demanded that Apple compromise the security of iOS to unlock iPhones seized in criminal cases, saying that the company “holds the keys to many criminal minds.” His attack on Apple’s privacy measures were made in an interview with CNBC.
‘Frankly I’ve helped them a lot. I’ve given them waivers, because it’s a great company, but it made a big difference,’ Trump told Squawk Box co-host Joe Kernen, referring to tariff waivers in US-China trade war.
‘They could have given us that information. It would have been very helpful. Apple has to help us. And I’m very strong on it. They have the keys to so many criminals and criminal minds’ …
Although Apple uses end-to-end encryption for both iMessage and FaceTime, it doesn’t do the same for iCloud backups. They are encrypted, but Apple holds the key, meaning that the company has access to a copy of almost everything on your phone – and that includes stored messages.
I’d long expected Apple to fix this, but a report today claims that the company has decided not to…
Three different civil liberties groups are backing Apple in its refusal to create a weakened version of iOS to allow the FBI access to two iPhones used by the Pensacola shooter.
They support Apple’s position that compromising iPhone encryption would be a far greater risk to national security than not gaining access to the phones…
As Apple stands firm against requests to break iPhone encryption, many people have questioned why the FBI needs Apple’s help in the first place. There are plenty of tools available from third-party companies that are more than capable of unlocking the iPhone 5 and iPhone 7 used by the Pensacola gunman.
Further emphasizing that point, a new report from Forbes says that the FBI recently used one of those black/gray market tools to unlock the newest — and theoretically the most secure — iPhone that Apple sells.
Apple is reportedly preparing for a bizarre legal battle with the FBI over its demands for the Cupertino company to help it break into two iPhones used by the Pensacola Naval Air Station shooter.
The company was previously prepared to fight the FBI in court over the same demand with the San Bernardino iPhones before the agency backed down…
There’s a lot of publicity right now about the FBI’s request for Apple to help them unlock two iPhones owned by a murder suspect who opened fire at a Florida navy base.
However, what has gone underreported is the fact that the two iPhones in question are actually old models, an iPhone 5 and an iPhone 7.
As noted by the Wall Street Journal today, these devices are so old that their security has already been compromised. Plenty of security firms on the gray/black market are available to unlock older iPhone models, so why does the FBI need Apple?
There are obvious similarities between the San Bernardino and Pensacola cases. Not just that both relate to shootings and involve two iPhones, but also the fact that the FBI has decided to go public with its request for Apple to help…
The FBI is again asking Apple to unlock two iPhones belonging to a suspected shooter.
The last time this happened, in the San Bernardino case, Apple refused. The current case relates to last month’s shooting at the Pensacola Naval Air Station, where three people were killed…
Former FBI general counsel Jim Baker, who fought Apple on the San Bernardino iPhone case, says that he has now rethought some of his views on strong encryption.
Baker left the FBI last year to join a DC-based think tank, where his role is to write for the justice-focused blog, Lawfare…