Lessons from the Apple-FBI fight

image

Short version of the FBI’s latest statement on the Apple encryption case: Never mind!

Not even a month and a half after the Federal Bureau of Investigation convinced a judge that without Apple’s help, it could never unlock the encrypted iPhone 5c used by San Bernardino murderer Syed Rizwan Farook last year, the agency announced it had gotten into the phone without Apple’s help.

Monday’s news — telegraphed a week before when the FBI asked for a delay in a hearing on its attempt to compel Apple to load special software on Farook’s iPhone 5c that would allow unlimited guesses of his unlock passcode — ends that case. But the conversation about it is nowhere near finished.

How did the feds do this?

The government’s three-sentence filing states concisely but vaguely that it “has now successfully accessed the data stored on Farook’s iPhone.”

As a result, it no longer needs Apple to perform the vulnerability transplant required by Judge Sheri Pym’s Feb. 16 order to further its investigation of the Dec. 2 attack in which Farook and his wife, Tashfeen Malik, murdered 14 people before being killed by police.

Apple, for its part, responded by sharing a statement with the media that declared, “This case should never have been brought.” But the company pledged its continued help with law enforcement investigations (that don’t involve it weakening its own cryptography) and its continued participation in “a national conversation about our civil liberties, and our collective security and privacy.”

Security experts such as Robert Graham and Jonathan Zdziarski can only speculate how the FBI and, most likely, third party researchers managed a feat that the government previously declared impossible without Apple’s “exclusive technical means.”

More important, Apple itself will only be able to make educated guesses if the FBI won’t reveal how it did this.

It’s unclear how much a recent White House policy on disclosing software vulnerabilities would require revealing this one to Apple, something the Electronic Frontier Foundation has already demanded.

Expect to read more about this issue as law enforcement agencies respond to encrypted communications by trying to hack into the devices at either end of the line — a remedy civil rights advocates have told me they don’t love but prefer over court-ordered weakening of crypto for everyone.

Next moves for Apple, and you

The best-case scenario for iPhone security is that investigators performed some tinkering with the iPhone’s memory — as outlined by Zdziarski, physically removing that chip, copying its contents, trying passcodes on the device, then copying it back.