{"id":859,"date":"2016-03-30T04:06:08","date_gmt":"2016-03-30T04:06:08","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=859"},"modified":"2024-12-23T07:46:33","modified_gmt":"2024-12-23T07:46:33","slug":"how-the-fbi-cracked-the-iphone-encryption-and-averted-a-legal-showdown-with-apple","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/how-the-fbi-cracked-the-iphone-encryption-and-averted-a-legal-showdown-with-apple-859\/","title":{"rendered":"How the FBI Cracked the iPhone Encryption and Averted a Legal Showdown With Apple"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/Snap1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-860 \" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/Snap1.jpg\" alt=\"How the FBI Cracked the iPhone Encryption and Averted a Legal Showdown With Apple\" width=\"660\" height=\"262\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/Snap1.jpg 917w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/Snap1-300x119.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/Snap1-3x1.jpg 3w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/a><\/p>\n<p>An urgent meeting inside FBI headquarters little more than a week ago is what convinced federal law enforcement officials that they may be able to abandon a brewing legal fight with tech giant Apple, sources told ABC News today.<\/p>\n<p>In the days after the December 2015 massacre in San Bernardino, California, which killed 14 people and wounded 22 others, the iPhone left behind by one of the shooters, Syed Farook, was secretly flown to the FBI\u2019s laboratory in Quantico, Virginia, sources said.<\/p>\n<p>The FBI had been unable to review the phone\u2019s contents due to a security feature that &#8212; after 10 failed attempts to enter the 4-digit access code &#8212; would render the phone\u2019s files forever inaccessible.<\/p>\n<p>By last month, the FBI was at an impasse with Apple, which fought a court order telling the company to help authorities bypass the security feature. Apple maintained the U.S. government was asking it to create a &#8220;backdoor&#8221; into its devices that would endanger the privacy of hundreds of millions of iPhone users around the world.<\/p>\n<p>&#8220;It is in our view the software equivalent of cancer,&#8221; Apple CEO Tim Cook recently told &#8220;World News Tonight&#8221; anchor David Muir.<\/p>\n<p>But the FBI insisted it had a responsibility to access any data potentially relevant to the deadly terror attack in San Bernardino.<\/p>\n<p>\u201cI don\u2019t know whether there is evidence of the identity of another terrorist on the phone, or nothing at all. But we ought to be fired in the FBI if we didn\u2019t pursue that lead,\u201d FBI Director James Comey told a House panel in February.<\/p>\n<p>As the legal battle played out, the FBI appealed to cyber experts around the world for help.<\/p>\n<p>\u201cWe\u2019ve talked to anybody who will talk with us about it, and I welcome additional suggestions,\u201d Comey said during a House hearing four weeks ago.<\/p>\n<p>In response, countless companies and hackers &#8212; including what one source familiar with matter called many \u201cwhackadoodles\u201d &#8212; came forward claiming to have a way into Farook\u2019s phone, sources said.<\/p>\n<p>But nothing appeared viable. That is, until a company that the FBI has yet to identify came forward about two weeks ago. After initial contacts with the FBI, company officials flew to Washington to lay out their solution, sources told ABC News.<\/p>\n<p>On Sunday, March 20, in a meeting at FBI headquarters, company officials demonstrated their technology on another iPhone. Convinced it would work, the FBI greenlighted applying it to Farook\u2019s phone, sources said.<\/p>\n<p>This past weekend &#8212; just days ago &#8212; the attempt was made, and &#8220;the FBI has now successfully retrieved the data stored on&#8221; the phone, according to the Justice Department.<\/p>\n<p>Forensic examiners are now attempting to exploit potential evidence from the phone. It\u2019s unclear if anything of investigative value has been found yet.<\/p>\n<p>The FBI has refused to identify the company that offered the solution, with one source citing a \u201cmutual agreement.\u201d Nevertheless, Apple did not play a part in finding the solution, company officials said.<\/p>\n<p>As for whether the solution might be shared with Apple, it\u2019s a decision that will be made through consultation with multiple federal agencies, sources said.<\/p>\n<p>One federal law enforcement source said it\u2019s important to emphasize that the ultimate solution identified in this case was not found despite the lawsuit filed against Apple, but because of it.<\/p>\n<p>The solution was \u201cgenerated as a result of the media attention,\u201d the source said.<\/p>\n<p>At the same time, the source said federal authorities believe the end to the current litigation should not end the national discussion about balancing the interests of security and privacy.<\/p>\n<p>\u201cOur need for public safety and our need for privacy are crashing into each other, and we have to sort that out as a people,\u201d Comey said recently. \u201cThis world some people imagine where nobody can look at your stuff is a world that will have public safety costs.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An urgent meeting inside FBI headquarters little more than a week ago is what convinced federal law enforcement officials that they may be able to abandon a brewing legal fight with tech giant Apple, sources told ABC News today. In the days after the December 2015 massacre in San Bernardino, California, which killed 14 people &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/how-the-fbi-cracked-the-iphone-encryption-and-averted-a-legal-showdown-with-apple-859\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">How the FBI Cracked the iPhone Encryption and Averted a Legal Showdown With Apple<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[60,52,88,340],"class_list":["post-859","post","type-post","status-publish","format-standard","hentry","category-news","tag-apple","tag-encryption","tag-fbi","tag-fbi-cracked-the-iphone"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=859"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/859\/revisions"}],"predecessor-version":[{"id":861,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/859\/revisions\/861"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}