Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Communications Encryption Government IOS Iphone Privacy Security Software The Internet United States Technology

FBI Couldn't Tell Apple What Hack It Used, Even If It Wanted To (qz.com) 99

An anonymous reader writes: The US Federal Bureau of Investigation doesn't own the technique used to unlock the San Bernardino iPhone, so it can't reveal the method to Apple even if it wanted to, Reuters reported, citing unnamed White House sources. The Washington Post reported yesterday, citing unnamed sources, that the FBI had paid a hacker a one-time fee to use a piece of hardware that allowed it to access the iPhone 5c belonging to one of the San Bernardino, California assailants. The vendor that supplied the hack is a non-US company, according to Reuters. But according to the Post report, it is not the Israeli firm Cellebrite, which had previously been named. The FBI would require the vendor's cooperation in order to submit the technique it used to Vulnerabilities Equities Process, a mechanism that allows the government to consider whether it should disclose security flaws to manufacturers. It's a move that mirrors Apple's own efforts to create security systems on its phones that even it wouldn't be able to crack, meaning it can't comply with a government order to hand over user data even if it wanted to.
This discussion has been archived. No new comments can be posted.

FBI Couldn't Tell Apple What Hack It Used, Even If It Wanted To

Comments Filter:
  • by JBMcB ( 73720 ) on Thursday April 14, 2016 @09:46AM (#51907677)

    ... but when I do, I prefer them to be unnamed.

  • by Anonymous Coward on Thursday April 14, 2016 @09:47AM (#51907689)

    At least one of these things has to be false:

    1) The FBI paid a hacker to unlock the phone and doesn't have access to the technique
    2) The FBI is able to help local law enforcement unlock iPhones

    Which of these is false? Assuming the FBI isn't going to foot the bill to pay a hacker each time local law enforcement wants an iPhone unlocked, these things are mutually exclusive. Which lie did the FBI tell?

    And because the FBI lied, why should I have confidence in law enforcement at all? I understand that they may not want to disclose the details of an ongoing investigation, but that doesn't justify lying about things that don't have to be kept secret to preserve the integrity of the investigation.

    • Which of these is false?

      They are probably both true: the FBI knows how to unlock some phones themselves, and for others, they need outside help.

      And because the FBI lied, why should I have confidence in law enforcement at all?

      It should be obvious to anybody that civilization requires jackbooted thugs carrying guns and protected by (un)qualified immunity reading your E-mail. For the children. And so that you don't cheat on your taxes. Seriously, do you want to live in SOMALIA?

    • The FBI giving this hacker's business card to local law enforcement would constitute helping them, so both 1 and 2 are easily truthful. There is no inconsistency.
  • The FBI's ever changing story is flaky to say the least. On the other hand, I don't really care.

  • Certainly someone in government could reverse engineer the code to enable re-use?

    Who would be the wiser? I mean besides defendants who suddenly start seeing the contents of their phones used as evidence against them in trial.

    I mean, if the company that licensed the software to the FBI tried to force the them to reveal their decryption technique, could the FBI then argue that releasing such code into the wild could result in the widespread hacking of iPhones around the planet? You know, turn the tables a bit

    • "reverse engineer the code" "piece of hardware "
    • Certainly someone in government could reverse engineer the code to enable re-use?

      From the "story":

      the FBI had paid a hacker a one-time fee to use a piece of hardware that allowed it to access the iPhone 5c

      ...which actually is an interesting clue.

      • They desoldered the chip, cloned it, and cracked it, using brute force. From how fast it took to actually crack it, it probably wasn't that difficult once the chip was cloned. And this would hardly be a "hack" of the phone. It would require specific skills and direct access to the phone.

        Physical access to the hardware has always been a security concern from the origins of computing.

        • by EvilSS ( 557649 )
          And tell the vendor what? "Please turn your back and ignore any noise and funny smells for the next few hours." You don't seriously thing the vendor consented to just mail the hardware to the FBI do you? They would have had techs on site, hell they may have even had the FBI come to them instead of the other way around.
          • What you said isn't at odds to what I said. I didn't say who did the desoldering or the brute attack, I just said how it was done. And quite frankly it doesn't matter "who" did it, but the how.

    • by Phusion ( 58405 )
      Oh, you're not paying attention are you? The post is pretty clear, they paid someone to unlock the phone with a gadget of some kind. So, no, they could not reverse engineer anything, they just got an unlocked phone, nothing more.
      • by Anonymous Coward

        What I find ironic is that they feel they can force a company focused on securing devices to make those devices less secure, and yet, they didn't try to force a company that specializes in breaking secure devices from revealing how it was done.

        Sure seems like they could give a rats ass about security, and those who break security for a living are the good guys here?

  • by wcrowe ( 94389 ) on Thursday April 14, 2016 @10:00AM (#51907787)

    IANAL, but it seems like they would have a chain-of-evidence problem here or something like that. Let's imagine, instead of a phone, that the FBI wanted to unlock a safe. So they hire a safe cracker, and he says, "I'm going to unlock the safe, but you can't watch me do it." The safe cracker goes into the room, shuts the door. After a few minutes the safe cracker walks out and says, "It's all yours," wherein the FBI finds an open safe. But now we don't know what happened. Did the safe cracker take anything from the safe? Did he put anything in the safe? The FBI doesn't know for sure.

    It seems like there could be a similar problem with the phone. If you don't know how it's done, then how do you know if what you see is what was really in the phone? Did the hacker put something in the phone? Did he take anything out? If there is evidence in the phone that says, for example, that Bob Loblaw was part of the conspiracy, can you trust that information?

    Basically, it sounds like the FBI hired someone to make it rain. That person lit a fire, and did a little dance, and it rained. And now the FBI is saying, "Hey, we don't know what the guy did. We're just happy that it's raining."

    • by Altus ( 1034 ) on Thursday April 14, 2016 @10:11AM (#51907881) Homepage

      sure it might not be admissible but that wont stop them from creating warrantless wiretaps using the info found in the phone and then they can use evidence gathered there in court.

      It should matter, but in this day and age,it really doesn't.

      • by Anonymous Coward

        "It should matter, but in this day and age,it really doesn't."

        I'll bet it matters to the poor SOB who is facing a life sentence based on a parallel-construction which is based on fabricated evidence, and his lawyer.

        • "It should matter, but in this day and age,it really doesn't."

          I'll bet it matters to the poor SOB who is facing a life sentence based on a parallel-construction which is based on fabricated evidence, and his lawyer.

          There's no need for parallel construction based on fabricated evidence here. That's only necessary when the investigators have no *legal* authorization to perform a search. In this case they had total legal authority to extract the contents of the phone, they just lacked the practical ability to do it. The extraction process may mean that any information from the phone that is presented as evidence in court can be challenged by the defense (probably not excluded, but impeached), but there's absolutely no pr

    • it seems like they would have a chain-of-evidence problem here

      There is no problem, because the terrorist is dead. They are not prosecuting him, thus there is no defense team nit-picking their tactics.

      • it seems like they would have a chain-of-evidence problem here

        There is no problem, because the terrorist is dead. They are not prosecuting him, thus there is no defense team nit-picking their tactics.

        Can you answer a question for me?

        Suppose rooting around on the phone they find evidence of someone helping them plan and execute their crimes. Suppose the evidence doesn't directly indicate culpability, but strongly implies it.

        Can that be used as evidence against such a 3rd party conspirator?

        Would chain-of-evidence be broken, and could that be used as a defence in court?

        • by tlhIngan ( 30335 )

          Suppose rooting around on the phone they find evidence of someone helping them plan and execute their crimes. Suppose the evidence doesn't directly indicate culpability, but strongly implies it.

          Can that be used as evidence against such a 3rd party conspirator?

          Would chain-of-evidence be broken, and could that be used as a defence in court?

          Depends. If the phone is the only logical evidence tying both people together, then the FBI has a major problem, because a competent defense attorney would first ask what t

    • As for the FBI case, they probably don't care about chain of custody, as the person using the phone is already dead. Nothing from that phone is going to see a court, so they don't have to keep meticulous chain-of-custody for it.

      As for other law enforcement agencies using this "service" that is probably a legitimate question.

    • by guruevi ( 827432 )

      Not only that, but they took the safe, sent it outside the country to probably a we-spy-back-on-the-US country (eg. Israel) and let not just the hacker but possibly a host of other countries it passed through on the way (whatever North-African or European country UPS/FedEx has a depot in) mess with the phone.

  • by Anonymous Coward

    "can't comply with a government order to hand over user data even if it wanted to."

    Which is unfortunately what all manufacturers/software developers should be working towards. We're seeing case after case where government orders effect the purchased and owned products of consumers, most of whom are completely innocent. Cases where people have books deleted off of their E-readers because some court order to the company that makes the reader, DVRs being remotely disabled because of a patent dispute, and car

  • by UnknowingFool ( 672806 ) on Thursday April 14, 2016 @10:01AM (#51907805)
    The problem with not being able to disclose the technique is that legally the evidence cannot be used in court then. Since terrorists are dead, it is not much of a legal ramification to them; however, against anyone else, a prosecution team must provide the technique/technician to a defense team for cross examination. That was one of the objections that Apple had in their brief: If the FBI forced them to assist them, Apple would have to constantly provide their personnel for court cases to testify. In the case of a forensics company that does DNA testing, that is part of the service that they should provide. An unknown "hacker" may not agree to be part of future investigations.
    • by Altus ( 1034 )

      The evidence doesn't need to be admissible, it just needs to point them to the people they should get warrantless wiretaps against so they know who to monitor for evidence they can use. Awful, isn't it?

      • Plus, they can just kill the people they want to investigate. Then there is no privacy for someone alive that might cause problems with their warrantless searches.
  • by dav1dc ( 2662425 ) on Thursday April 14, 2016 @10:07AM (#51907851)

    Maybe the contents of the phone contained NO helpful information pertaining to the investigation - and perhaps the FBI doesn't want to admit that they jumped created this huge FUSS and it provided no distinctive investigative advantage over not having access to the data on the phone.

    • by Anonymous Coward

      I believe I noted something similar in another board when this whole thing began. "We'll see one of two outcomes. They crack it and find something crucial in which case they'll saturate every news service and press conference with a "this proves we need backdoors into consumer devices by law". Alternatively they crack it and find nothing, they claim that they are "still assessing" the information for months/years and eventually quietly release a hundred page report that effectively says "we found nothing

  • yeah, that's it. works every time.
  • Perhaps Apple could get a court order forcing the FBI to expend resources to figure out how to get the information it claims it can't access. That would be reasonable, right?

  • That can't be true. If they found data that led them to a conspirator, they would want to arrest that person. They would need to have evidence to present in that person's trial that they participated in this terrorist event. I can't imagine that their plan is that if the defendant's attorney asks them how they got this data, they'll just say "some un-named third party pulled this data out of their own hardware and assured us their hardware had copied it from this mobile phone." I'm calling bullshit on that
    • That can't be true. If they found data that led them to a conspirator, they would want to arrest that person. They would need to have evidence to present in that person's trial that they participated in this terrorist event. I can't imagine that their plan is that if the defendant's attorney asks them how they got this data, they'll just say "some un-named third party pulled this data out of their own hardware and assured us their hardware had copied it from this mobile phone."

      Your honor, the phone data merely indicated possible suspects. We conducted an investigation, based on that and other information in addition to ongoing investigations, determined the defendant was conspiring to commit terrorist acts.

      The phone data would merely be one piece of evidence used and probably only point to possible additional suspects. In essence, it's no differenttahn a tip that comes in anonymously.

  • Doesn't the DMCA have some anti-circumvention measures in there? While the FBI may be immune to that sort of thing, I'm pretty sure that circumventing encryption for profit is not exempt, aside from being a criminal offence. Despite the fact that the phone belonged to an alleged criminal, afaik it is still illegal for a private individual to hack into it.

    • DMCA allows it (Score:5, Informative)

      by raymorris ( 2726007 ) on Thursday April 14, 2016 @11:17AM (#51908447) Journal

      I posted relevant portions of the law last week, if you care to read the details. There are two sections that are mainly relevant.

      First, DMCA explicitly says that circumvention by or FOR the government is legal. So you can hack it if the government asks you to.

      Secondly, and this is important to my job developing security testing tools, DMCA says twice that it is legal to create tools to research on the security of the measures as long as those tools aren't used, or intended to be used, for copyright infringement as specified in DMCA.

      So it's a lot like gun laws in areas that have Constitutional gun laws - using a gun to commit a felony is an additional crime, but just having a gun is legal. Similarly, building a circumvention tool FOR THE PURPOSE of copyright violation is unlawful, but building it for research, security, and investigation purposes is fine.

      • Third, the phone belongs to the San Bernardino County government, not to the shooter. It was a work phone assigned to the shooter. So the copyright for anything on the phone belongs to the government (or more precisely since the government cannot hold a copyright, there is no copyright). And thus even if your first two points were invalid, there is still no DMCA violation.

        This is why I've said all along that this is a bad case for Apple to be pursuing this line of objection. Basically, Apple was refu
  • Was it worth all this commotion? Will they stop future terrorist attacks from the information retrieved?

    Why is this not the question everyone is asking??

    • It is never about stopping future attacks. It as about combing through the wreckage after an attack and looking for evidence on who did it. They are not capable of stopping attacks even when they have the information needed in their huge illegal database of phone calls. The haystack is too large to find the needles they are looking for. But once the attack is over it is easy to look at the data they had and tell us who was behind it. Then they can claim they need more money or power to stop the next one.
  • by going around the protective mechanisms?

    So FBI hired someone they consider a criminal and ignored the crime.

  • Supposedly, the exploit works on the 5c, but wouldn't work on the 6. It should not be that hard for Apple to check the design history to see what holes they plugged between those designs.

    • by Wovel ( 964431 )

      I think it is funny people think Apple does not already know what the FBI had done. They suggested several times that the FBI could get into the phone on their own.

You know you've landed gear-up when it takes full power to taxi.

Working...