FBI won't say how it hacked into San Bernardino shooter's iPhone

An 'outside source' provided a method for the FBI to hack into Sayed Farook's iPhone after Apple's refusal. Although that closes one legal case, it leaves officials and companies without future guidelines. 

|
Eduardo Munoz/Reuters/File
An Apple employee in New York City repairs an iPhone in this February 2016 file photo. On March 28, the FBI said it had unlocked the iPhone of San Bernardino gunman Syed Farook, after Apple resisted its order to break into the phone.

The FBI has successfully hacked into San Bernardino shooter Syed Farook's iPhone without Apple's help, the government said Monday, ending a contentious privacy vs. security case but leaving larger questions unanswered.

Agents were able to use an unknown method provided by an "outside party" to gain access to Mr. Farook's phone, which they hoped would provide more information about planning for the December attacks in California, which killed 14 people. Farook and his wife, Tashfeen Malik, were killed later that day in a police shoot-out. The two were inspired by foreign terrorist attacks, according to the Federal Bureau of Investigation.

"I am satisfied that we have access to more answers than we did before," FBI Assistant Director David Bowdich said in a Monday statement. The Department of Justice is now reviewing information on Farook's smartphone.

The government had previously demanded that Apple help unlock the device, which was programmed to erase data after ten incorrect passcode attempts. Tim Cook, Apple's chief executive officer, worried about repercussions for customers' security in the future, had refused. In February, a California judge ordered the company to provide hacking software, and a court hearing was set for last week, until the Justice Department announced that the "outside party" had offered another hacking method.

On Monday, after that method proved successful, government prosecutors asked a federal judge to vacate the court order, removing Apple's legal options for requesting information about the "outside party's" methods.

"We will continue to help law enforcement with their investigations, as we have done all along," Apple said in a statement, repeating its position that the government's legal case "should never have been brought." 

The announcement may bolster some tech experts' claims that the government's demand for help and insistence that that only Apple could unlock the device, was a bluff all along. National Security Agency whistleblower Edward Snowden told the audience at a conference for Common Cause, a progressive advocacy group, that he suspected the claim was fraudulent. Mr. Snowden cited a report from the American Civil Liberties Union, which suggested the claim was a "power grab" to set security precedents.

Mr. Cook and FBI Director James Comey have both recommended that Congress set guidelines for future privacy vs. security issues. 

Under Obama administration policies, the government does not need to disclose security vulnerabilities to tech companies if doing so presents a national security risk. Many tech security experts, however, say that sharing those loopholes would ultimately help both consumer privacy and national safety.

A poll of The Christian Science Monitor's Passcode influencers showed that 81 percent believed the FBI should share the information with Apple. Doing so would help "fulfill its law enforcement mission," one anonymous expert told the Passcode team. "Fighting crime isn’t just about catching criminals after the fact; it’s about reasonable measures to prevent avoidable criminality from happening as well."

This report includes material from the Associated Press.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to FBI won't say how it hacked into San Bernardino shooter's iPhone
Read this article in
https://www.csmonitor.com/Technology/2016/0329/FBI-won-t-say-how-it-hacked-into-San-Bernardino-shooter-s-iPhone
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe