Story updated at 1:45 p.m. Eastern time.
The Federal Bureau of Investigation announced that it will not share the mechanism used to hack into the San Bernardino, Calif., shooter's iPhone with other government agencies.
Earlier this week, the FBI's director had said that he was still considering whether to inform Apple, and the public, of the device vulnerability that enabled a contractor to hack into the phone.
“We are in the midst of trying to sort that out,” FBI Director James Comey said Tuesday. “The threshold (for disclosure) is, are we aware of the vulnerability, or did we just buy a tool and don't have sufficient knowledge of the vulnerability to implicate the process?”
The FBI successfully unlocked the San Bernardino County-issued cell phone belonging to Syed Rizwan Farouk, one of the two attackers in the December rampage, following a drawn-out legal battle with Apple pertaining to the tech company’s obligation to aid law enforcement.
The FBI eventually gained access to the iPhone after it paid hackers well over $1 million to crack Apple’s security measures, an estimate that has been derived from Mr. Comey's current salary based on comments that the contract cost more than he expects to earn in the remainder of his FBI tenure. Despite the hefty price tag, Comey said that the successful penetration “was, in my view, worth it.”
The FBI has yet to disclose the identity of the hacker or hackers who aided in the unlocking process, although Reuters sources reported that the help came from outside of the United States. Comey’s earlier statements suggested that the FBI does not own the secret method used by the hackers, or perhaps even know exactly what vulnerability was exploited.
Now, Comey's agency has decided to keep all of the details surrounding the hack private. Following a loose protocol established by the White House for such situations, mostly favoring a policy of disclosure, the FBI announced its intentions in a statement by Science and Technology Branch head Amy Hess.
The FBI did not "purchase the rights to technical details about how the method functions," from the hired hackers, meaning that its technology experts do not "have enough technical information about any vulnerability," according to Ms. Hess, per Reuters.
While the procedure for deciding on the disclosure of similar information favors transparency, White House cybersecurity coordinator Michael Daniel acknowledged in a 2014 release that “there are no hard and fast rules” on the issue in place.
“Disclosing a vulnerability can mean that we forego an opportunity to collect crucial intelligence... or even discover more dangerous vulnerabilities that are being used by hackers or other adversaries to exploit our networks,” Mr. Daniel wrote.
“Building up a huge stockpile of undisclosed vulnerabilities while leaving the Internet vulnerable and the American people unprotected would not be in our national security interest,” he added.
An earlier statement by Comey suggests that he didn't want to sent the clash with Apple back to square one in the event that the vulnerabilities were disclosed.
“If we tell Apple, they're going to fix it and we're back where we started,” he told AP earlier this month. “As silly as it may sound, we may end up there. We just haven't decided yet.”
This report contains material from Reuters and the Associated Press.