Attacks/Breaches
3/22/2016
03:15 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

FBI's Claim It Can Access iPhone Without Apples Help Prompts Questions

In a surprise development, feds say they may have found another way to access the iPhone recovered from a San Bernardino terror suspect.

The FBI’s claim late Monday that it may not need Apple’s help after all to break into a locked iPhone recovered from one of the terror suspects in last November’s San Bernardino shootings has evoked mixed reactions.

Many see it as a welcome sign that the government is backing down—at least temporarily—from its controversial position that Apple be required to write software for overriding password protections on the recovered phone. But the relief is tempered with questions, and even concerns about the access method that the FBI says it may have found -- and whether that would represent a vulnerability to other iPhones as well.

The FBI has for the past several weeks been seeking Apple’s help in unlocking an iPhone 5C used by San Bernardino terror suspect Syed Farook. The phone can be set to automatically delete any data on it after 10 failed password attempts and also to impose a delay between password-retry attempts.

Until Monday, the FBI had wanted Apple to write software for bypassing these protections. In February, the agency obtained an order from the US District Court for the Central District of California that compelled Apple to write the code.

Apple resisted the order claiming that what the FBI was asking it to do was to create a backdoor that would give the agency access to other iPhones. Though the FBI insisted that it was only asking for help accessing the specific iPhone recovered from Farook, Apple maintained that the software the court wanted it to write would give the agency a masterkey to all iPhones. The company also argued that if it acceded to the demand, there would be no stopping the government and state authorities from making similar demands in future.

On Monday, the FBI abruptly filed a motion with the court seeking postponement of a hearing scheduled for today on the dispute. In its brief, the Justice Department said that on Sunday, March 20, an “outside party” had demonstrated a potential method for unlocking the iPhone without Apple’s help.

“Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone,” the motion noted. “If the method is viable, it should eliminate the need for the assistance from Apple Inc.”

Magistrate judge Sheryl Pym Monday granted the motion to postpone and the government’s request that it be allowed to present a status report on April 5.

If the access method proposed by the outside party does not work, it is quite likely that the FBI will resume its efforts to get Apple to write software to help it break into Farook’s phone.

“This is an extremely interesting plot twist,” said Jay Kaplan, CEO of security vendor Synack, in a statement. “If the government has found an outside agency to assist with unlocking the iPhone in question without Apple's involvement, there is a strong likelihood that a zero-day exploit exists enabling access to the phone without a software overwrite,” he said.

If such a flaw exists in the iPhone, the question then is whether the government will keep the flaw to itself for use in future, he said.

It would not be a surprise if the FBI indeed has found a way to unlock Farook’s iPhone without Apple’s help, added Ben Johnson, co-founder and chief security strategist at Carbon Black. But that would leave a bigger question unanswered.

“It seems a shame to not get some clarity in the courts over what the government can and can't request when it comes to privacy and security,” he said. “If this case does not reach a conclusion you can bet we'll be back in this same spot soon."

It’s a position that others like the Electronic Frontier Foundation (EFF) share as well. The fact that the FBI has sought a postponement in this case does not mean that it will stop trying to weaken encryption standards and require industry to build backdoors in technology products, the EFF said. It’s only a matter of time, before it comes back with another test case to set a legal precedent in the matter, the rights advocacy group warned.

Importantly, a successful FBI hack of the recovered iPhone would leave Apple in a rather uncomfortable position as well, Orin Kerr, research professor at the George Washington University law School wrote in a Washington Post blog. “Apple claimed that the sky would fall if it had to create the code in light of the risk outsiders might steal it and threaten the privacy of everyone,” he said.  “If outsiders already have a way in without Apple’s help, then the sky has already fallen. Apple just didn’t know it."

Related Content:

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RhaineL150
50%
50%
RhaineL150,
User Rank: Apprentice
3/29/2016 | 5:24:01 AM
This is a mass surveillance issue
This is a mass surveillance issue. Is it true that the feds can crack one iPhone? They can get into the phone, but not apple's entire system I think.
DanB766
100%
0%
DanB766,
User Rank: Apprentice
3/22/2016 | 11:03:12 PM
It's John McAfee
John McAfee has been saying for weeks now that he can break that phone.  Finally somebody listened...
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.