M.N.: The need, not so much for the court order, as it looks, but for the deep reset, by reason of disorganization (or worse), lack of expertise and the alarming loss of short-term memory! - FBI Admits It Reset San Bernardino Shooter's iPhone Password | San Bernardino County Calls The FBI Liars Over Terrorist's ICloud Account | The "Apple" of FBI's obsessive eye - Google Search
- Get link
- X
- Other Apps
M.N.: The need, not so much for the court order, as it looks, but for the deep reset, by reason of disorganization (or worse), lack of expertise and the alarming loss of short-term memory!
Feds Say Apple's Stand Against the FBI Is Just a PR StuntGizmodo
Popular Mechanics
-Engadget
all 194 news articles »
Apple attorney: FBI order could 'destroy the iPhone as it exists' Los Angeles Times
If FBI busts into seized iPhone, it could get non-iCloud data, like Telegram chatsArs Technica
Common software would have let FBI unlock shooter's iPhoneWRAL.com
Washington Post
-San Jose Mercury News
all 8,323 news articles »
Apple reveals FBI screw-up: Tech giant says ... - Daily Mail
<a href="http://www.dailymail.co.uk/.../Justice-Department-files-motion-compel" rel="nofollow">www.dailymail.co.uk/.../Justice-Department-files-motion-compel</a>...
2 days ago - Pym's order to Apple to help the FBI hack into an encrypted iPhone belonging to one of ..... by Mario Testino to mark her 50th birthday; Eye-catching! ..... FIFTH body modification procedure since December Growing obsession ...
Daily Mail
Loading...
Late last night a Twitter account associated with San Bernardino County said that it worked the direction of the FBI to reset Syed Farook’s iCloud password. Why does that matter? Because it would make the FBI liars.
As you probably know by now, the FBI has demanded that Apple break into the San Bernardino terrorist’s iPhone. Apple has refused, insisting that doing so would cause a terrible precedent. But both the FBI and Apple are currently waging a fierce PR battle over one of the possible ways that information from the phone could’ve been retrieved in the early stages of the investigation: Hacking Farook’s iCloud password and causing his phone to push information to the cloud remotely.
In a filing yesterday the FBI claimed that the owner of the phone, San Bernardino County, had been the one who bungled the auto-backup of the phone to iCloud (emphasis mine):
[…] to attempt an auto-backup of the SUBJECT DEVICE with the related iCloud account (which would not work in this case because neither the owner nor the government knew the password to the iCloud account, and the owner, in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup) […]
But San Bernardino County’s Twitter account (which remains unverified but appears authentic) now claims that it was working under the FBI’s orders. Specifically the tweet said, “The County was working cooperatively with the FBI when it reset the iCloud password at the FBI’s request.”
This statement contradicts both the FBI’s insinuations that San Bernardino County acted alone and the claims made by an anonymous source from the federal government contacted by ABC News. That source said that an IT employee working for San Bernardino County was not instructed by the FBI to attempt a password reset for Syed Farook’s iCloud:
The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.
Gizmodo was on a call with Apple executives late last night under strange conditions that there would be no direct quotes and no names. They used the word “government” when referring to who bungled the opportunity to force the back-up to iCloud. At the time, it seemed Apple was referring to the FBI without saying so directly. But Farook’s employer was the San Bernardino Department of Health, which is also a government agency.
This is all independent of the question over whether Apple should be compelled to unlock the terrorist’s 5c phone directly by hacking the passcode. Some have floated the idea that the phone should have been unlocked using the deceased terrorist’s fingerprint, but that wouldn’t have worked for a number or reasons — most importantly, the fact that the iPhone 5c doesn’t have a fingerprint scanner.
We’ve reached out to San Bernardino County for comment and will update this post when we hear back.
Photo: Tashfeen Malik and Syed Farook, as they passed through O’Hare International Airport in Chicago on July 27, 2014
Have you subscribed to Gizmodo Australia's email newsletter? You can also follow us on Facebook,Twitter, Instagram and YouTube.
Court order demanding Apple’s assistance in unlocking cellphone could have been averted
The FBI has admitted that a reset of the San Bernardino shooter’s iCloud passcode was done with the agency’s consent in the days following the terror attack, which left 14 people dead.
In a statement released late on Saturday, FBI spokeswoman Laura Eimiller said, “FBI investigators worked cooperatively with the county of San Bernardino in order to exploit crucial data contained in the iCloud account associated with a county-issued iPhone that was assigned to the terror suspect, Syed Rizwan Farook.”
The statement is the latest development in an ongoing repartee between Apple Inc. and federal prosecutors, who won approval of a court order on Tuesday compelling the tech giant to unlock the iPhone used by Syed Farook, one of the two shooters in the San Bernardino attack. Farook and his wife, Tashfeen Malik, killed 14 people and injured 21 in an assault on a holiday party at the San Bernardino Regional Center before they were killed by police in December.
Also Read: Justice Department Calls Apple's Stance on San Bernardino Shooter's iPhone a 'Marketing Strategy'
Apple has opposed the order, accusing the U.S. government of overreach. In response, the Justice Department said in a court filing on Friday that the company’s reluctance, “appears to be based on its concern for its business model and public brand marketing strategy.”
That touched off a series of disclosures by both sides about what transpired prior to this week’s public row, including Apple’s contention that the information the FBI is attempting to retrieve could have been accessed had the agency not reset the phone’s passcode, according to USA Today.
In the Friday filing, prosecutors acknowledged that the iCloud passcode was reset in the hours immediately following the attack by authorities for San Bernardino County, the phone’s owner of record. The statement on Saturday by the FBI clarified that the passcode was reset with the bureau’s consent four days following the attack, contending that it “does not impact Apple’s ability to assist with the court order under the All Writs Act.”
Apple asserts that, had the passcode not been reset, the company would have been able to initiate a backup of the phone’s data to its associated iCloud account in order to retrieve its contents. However, with the passcode on the phone no longer matching the one on iCloud, the only remaining option is the decryption of the phone itself.
Apple said during a call with reporters on Saturday that it had been cooperating with federal authorities since early January on a solution to access Farook’s phone data, having proposed four different means, the most viable of which was ruled out when it was discovered that the iCloud password had been reset.
Read the whole story
· ·
San Bernardino Shooter's iCloud Password Reset With FBI Consent, Agency Says
ABC News - 5 hours ago
Federal investigators worked with San Bernardino County technicians to reset the password for the Apple iCloud account associated with the iPhone issued to one of the shooters involved with the Dec. 2 attack at a county facility that left 14 people dead.
Common tech would have let FBI unlock San Bernardino shooter's phone
89.3 KPCC - 3 hours ago
FukeL People walk outside the Apple store on the Fifth Avenue in New York on Feb. 17, 2016. Apple's challenge of a court order to unlock an iPhone used by one of the San Bernardino killers opens up a new front in the long-running battle between ...
FBI: San Bernardino attacker's iCloud password reset, information may be lost
<a href="http://UPI.com" rel="nofollow">UPI.com</a> - 1 hour ago
The FBI may have misstepped early in the San Bernadino terrorist shooting when it asked the county to change a password on one of the shooters' cell phone. Handout photos of Tashfeen Malik (L) and Syed Farook, who police say opened fire at a holiday ...
FBI Admits It Reset San Bernardino Shooter's iPhone Password
TheWrap - 44 minutes ago
The FBI has admitted that a reset of the San Bernardino shooter's iCloud passcode was done with the agency's consent in the days following the terror attack, which left 14 people dead. In a statement released late on Saturday, FBI spokeswoman Laura ...
Fortune |
Apple vs. FBI: Who Elected Tim Cook?
Fortune “We didn't elect Tim Cook to protect privacy,” writes Robert Levine in a Sunday New York Times op-ed piece about the San Bernardino stand-off between Apple AAPL -0.23% and the FBI. “That's what governments are for.” “But the current choice,” he ... Apple's FBI battle is just the beginning of a reality check for the tech sectorThe Guardian Apple v. FBI: Key Passages from the Justice Department's RebuttalWall Street Journal (blog) |
Feds Say Apple's Stand Against the FBI Is Just a PR StuntGizmodo
Popular Mechanics
-Engadget
all 194 news articles »
Los Angeles Times |
San Bernardino Shooter's iCloud Password Reset With FBI Consent, Agency Says
ABC News The FBI released a statement late Saturday refuting a federal official who had said the agency was unaware the password was reset until after it had occurred on the iCloud account associated to Syed Rizwan Farook's iPhone. The official had said Friday ... |
Apple attorney: FBI order could 'destroy the iPhone as it exists' Los Angeles Times
If FBI busts into seized iPhone, it could get non-iCloud data, like Telegram chatsArs Technica
Common software would have let FBI unlock shooter's iPhoneWRAL.com
Washington Post
-San Jose Mercury News
all 8,323 news articles »
- Get link
- X
- Other Apps
Comments
Post a Comment