The FBI was unable to decrypt the terrorist's iPhone and again asks for help from Apple

Brother

Professional
Messages
2,590
Reaction score
532
Points
113
The Federal Bureau of Investigation has asked Apple to help decipher the iPhone of the man who started the shooting at a military base in Florida on December 6, 2019, writes Ars Technica. The shooter's name was Mohammed Said al-Shamrani, he was a trainee from Saudi Arabia and, along with other compatriots, was training for US allies at an American military base. During the shooting, then four people were killed (including al-Shamrani himself) and eight were injured.

The journalists found out that the request to Apple was sent by the FBI General Counsel Dane Bente. He wrote that the FBI was unable to unblock al-Shamrani's two iPhones and retrieve their contents. The task was complicated by the fact that a bullet hit one of the iPhones.

Apple later announced that it respects law enforcement and provided all the necessary information about al-Shamrani, but did not give a clear answer whether it would help decrypt the iPhone this time.

Apple was already in a similar controversial situation after the massacre in San Bernardino in December 2015. Then the FBI could not decipher the terrorists' iPhone and turned to the manufacturer for help, asking for a special tool that would make it possible to unlock the iPhone ... However, Apple refused, saying it would put users around the world at risk. Later, the FBI dealt with the iPhone without the help of Apple, which undermined the credibility of the need to do the backdoor.

Apple's Chief Privacy Officer Jane Horvat said at the International Electronics Show (CES 2020) on January 7th that she is against backdoors and that the company will protect user privacy.
 

Apple constantly fights against police and FBI iPhone spyware​

A software called Hide UI, created by Grayshift, a company that makes iPhone jailbreak devices for law enforcement, can track a suspect's passcode as he enters it into a phone. According to NBC News, two people in law enforcement asked not to be named for fear of violating non-disclosure agreements. Due to the lack of public oversight and the secrecy of the software, lawyers, forensic experts and civil liberties advocates are concerned that Hide UI may be used. without providing the owners with due process, such as a warrant.

It is also the latest step in the cat-and-mouse game between law enforcement and Apple. The company is known to have refused to unlock an iPhone for the FBI in a San Bernardino terrorist case, arguing that it would make its phones less secure. In mid-May, the FBI said it had managed to access the iPhone of a gunman who shot and killed fellow students at Pensacola Air Force Base in Florida. A person familiar with the situation and not authorized to speak publicly said the phone was hacked through guessing a password, which is the most common way law enforcement agencies can get into an iPhone.

In the absence of help from Apple, law enforcement officials have relied on companies like Grayshift and Cellebrite to find vulnerabilities in Apple software and hardware and create tools that can bypass iPhone security features.

“Grayshift is developing technology that allows law enforcement agencies to access critical digital evidence in criminal investigations,” said David Miles, CEO of Grayshift. “We take every precaution to ensure that access to our technology is restricted and our customer agreements require it to be used lawfully. Our clients are top-level law enforcement professionals who only use our tool with the appropriate legal authority. "
Apple declined to comment.

Software​

The GrayKey device is a small box with two iPhone lightning cables sticking out of it. The device was first released in March 2018. Law enforcement officers can connect any latest iPhone to cables to install an "agent" (piece of software) on the device. The agent then tries to crack the access code.
It can take several minutes to crack a four-digit pin code, and it can take less than a day to crack a six-digit PIN, according to the calculations of cryptographer Matthew Green, assistant professor of computer science at the Johns Hopkins Institute for Information Security. An eight-digit and ten-digit code will take weeks or years. It is in these conditions that Hide UI provides faster access to the device.

For this to work, law enforcement officials must install hidden software and then return the seized device to a suspect, said people familiar with the system and unwilling to be identified for fear of violating their nondisclosure agreement with Grayshift.
For example, a law enforcement officer may tell a suspect that he has the opportunity to call his lawyer. Once the suspect does so, even if he locks his phone again, Hide UI will save the passcode in a text file that will be available when the phone is connected to the GrayKey device.
Law enforcement agencies can then use the passcode to unlock the phone and retrieve all of the data stored on it.
“This is a great technology for our cases, but as a citizen I don't really like the way it is used. I feel that sometimes the behavior of officers will border on ethics, ”said a law enforcement official.
A second interviewee said the software was "buggy" and that it was often easier to get a suspect to hand over his password during interrogation than to use a trick to get the hidden software to work.

Legality and secrecy​

Both law enforcement sources spoke to NBC News said they would only connect the phone to GrayKey if they had a search warrant.
However, forensic experts working with lawyers have raised concerns that the Hide UI could be used without a warrant by law enforcement officials, possibly under the pretext of "urgent circumstances," given some of the time constraints that Apple has imposed to retrieve data from its phones.
It is unclear how often this feature is used, but hundreds of state and local law enforcement agencies throughout the United States (some have been declassified by Motherboard and Forbes), as well as the FBI, Drug Enforcement Administration, Border Guard Service, Secret Service , and other agencies have access to GrayKey devices, according to official figures. They cost between $ 15,000 and $ 36,000 per device, depending on the model.
GrayKey's marketing materials refer to "advanced features" but don't publicly talk about Hide UI. This and other intelligence-gathering functions are only explained to potential clients if they sign a non-disclosure agreement, law enforcement officials said.
NBC News has not found any search warrants that describe Hide UI's capabilities, although GrayKey is occasionally referenced in court documents, including a search warrant for the iPhone 11 Pro Max, Apple's latest and most secure phone.

Some human rights activists, including the American Civil Liberties Union, are concerned that prosecutors may drop cases instead of revealing how the technology works or leaving it to public scrutiny. This has previously happened with StingRay devices, which mimic a cell tower to intercept phone calls and text messages made by nearby devices.
Even if there is a search warrant for the device, it is unclear whether the prosecutor or the judge will describe the trick required to obtain the secret code from the suspect.

“Law enforcement's use of an 'agent' can be legal if the search and seizure warrant of the device states that investigators are allowed to use it,” said Rhiana Pfefferkorn, deputy director of oversight and cybersecurity at Stanford Law School's Center for Internet and Society ...
NBC News asked the Justice Department if it had any recommendations for using Hide UI. Department officials declined to comment, as did representatives from the National Sheriffs Association and the International Association of Chiefs of Police.

Critics say the lack of transparency regarding GrayKey and Hide UI is another example of an increasingly unequal game in the digital forensics world, where the government has access to flamboyant tools that defendants cannot afford.
“I fight with one hand tied behind my back,” said Andrew Garrett, a digital forensics expert. "I don't get the same evidence because companies like Grayshift require nondisclosure agreements that make law enforcement opaque."

One GrayKey nondisclosure agreement, dated 2018 and reviewed by NBC News, requires law enforcement to notify Grayshift if technology details can be disclosed in court, such as through a subpoena, so that Grayshift has the ability to “obtain a protective order or otherwise prevent the disclosure of information ”.
One of the interlocutors of the publication said that this is "quite shocking" because it turns out that the private interests of a third party can interfere with due process.
“You cannot force the law enforcement agencies to say, 'we have this magic box, plug in your phone, we will get evidence; trust us, we will allow you to make excuses for this, ”he said. "Only not when the end product leads to the deprivation of freedom for people."
 
Top