Showing posts with label Federal Bureau of Investigation. Show all posts
Showing posts with label Federal Bureau of Investigation. Show all posts

Thursday, February 18, 2016

Apple Unlocked iPhones for the Feds 70 Times Before

Listen to Military Veteran Talk Radio
iHeart.SmythRadio.com

www.thedailybeast.com

Think Different02.18.16 12:05 AM ETA 2015 court case shows that the tech giant has been willing to play ball with the government before—and is only stopping now because it might “tarnish the Apple brand.”

Apple CEO Tim Cook declared on Wednesday that his companywouldn’t comply with a government search warrant to unlock an iPhone used by one of the San Bernardinokillers, a significant escalation in a long-running debate between technology companies and the government over access to people’s electronically-stored private information.

But in a similar case in New York last year, Apple acknowledged that it could extract such data if it wanted to. And according to prosecutors in that case, Apple has unlocked phones for authorities at least 70 times since 2008. (Apple doesn’t dispute this figure.)

In other words, Apple’s stance in the San Bernardino case may not be quite the principled defense that Cook claims it is. In fact, it may have as much to do with public relations as it does with warding off what Cook called “an unprecedented step which threatens the security of our customers.”

For its part, the government’s public position isn’t clear cut, either. U.S. officials insist that they cannot get past a security feature on the shooter’s iPhone that locks out anyone who doesn’t know its unique password—which even Apple doesn’t have. But in that New York case, a government attorney acknowledged that one U.S. law enforcement agency has already developed the technology to crack at least some iPhones, without the assistance from Apple that officials are demanding now.

The facts in the New York case, which involve a self-confessed methamphetamine dealer and not a notorious terrorist, tend to undermine some of the core claims being made by both Apple and the government in a dispute with profound implications for privacy and criminal investigations beyond the San Bernardino.

In New York, as in California, Apple is refusing to bypass the passcode feature now found on many iPhones.

But in a legal brief, Apple acknowledged that the phone in the meth case was running version 7 of the iPhone operating system, which means the company can access it. “For these devices, Apple has the technical ability to extract certain categories of unencrypted data from a passcode locked iOS device,” the company said in a court brief.

Whether the extraction would be successful depended on whether the phone was “in good working order,” Apple said, noting that the company hadn’t inspected the phone yet. But as a general matter, yes, Apple could crack the iPhone for the government. And, two technical experts told The Daily Beast, the company could do so with the phone used by deceased San Bernardino shooter, Syed Rizwan Farook, a model 5C. (It’s not clear what version of operating system the phone had installed.)

Still, Apple argued in the New York case, it shouldn’t have to, because “forcing Apple to extract data…absent clear legal authority to do so, could threaten the trust between Apple and its customers and substantially tarnish the Apple brand,” the company said, putting forth an argument that didn’t explain why it was willing to comply with court orders in other cases.

“This reputational harm could have a longer term economic impact beyond the mere cost of performing the single extraction at issue,” Apple said.

Apple’s argument in New York struck one former NSA lawyer as a telling admission: that its business reputation is now an essential factor in deciding whether to hand over customer information.

“I think Apple did itself a huge disservice,” Susan Hennessey, who was an attorney in the Office of the General Counsel at the NSA, told The Daily Beast. The company acknowledged that it had the technical capacity to unlock the phone, but “objected anyway on reputational grounds,” Hennessey said. Its arguments were at odds with each other, especially in light of Apple’s previous compliance with so many court orders.

It wasn’t until after the revelations of former-NSA contractor Edward Snowden did Apple begin to position itself so forcefully as a guardian of privacy protection in the face of a vast government surveillance apparatus. Perhaps Apple was taken aback by the scale of NSA spying that Snowden revealed. Or perhaps it was embarassed by its own role in it. The company, since 2012, had been providing its customers’ information to the FBI and the NSA via the so-called PRISM program, which operated pursuant to court orders.

Apple has also argued, then and now, that the government is overstepping the authority of the All Writs Act, an 18th Century statute that it claims forces Apple to conduct court-ordered iPhone searches. That’s where the “clear legal authority” question comes into play.

But that, too, is a subjective question which will have to be decided by higher courts. For now, Apple is resisting the government on multiple grounds, and putting its reputation as a bastion of consumer protection front and center in the fight.

Get The Beast In Your Inbox!Daily DigestStart and finish your day with the smartest, sharpest takes from The Daily Beast Cheat SheetA speedy, smart summary of news and must-reads from The Daily Beast and across the WebBy clicking "Subscribe," you agree to have read the Terms of Useand Privacy PolicySubscribeThank You!You are now subscribed to the Daily Digest and Cheat Sheet. We will not share your email with anyone for any reason

None of this has stopped the government from trying to crack the iPhone, a fact that emerged unexpectedly in the New York case. In a brief exchange with attorneys during a hearing in October, Judge James Orenstein said he’d found testimony in another case that the Homeland Security Department “is in possession of technology that would allow its forensic technicians to override the pass codes security feature on the subject iPhone and obtain the data contained therein.”

That revelation, which went unreported in the press at the time, seemed to undercut the government’s central argument that it needed Apple to unlock a protected iPhone.

“Even if [Homeland Security] agents did not have the defendant’s pass code, they would nevertheless have been able to obtain the records stored in the subject iPhone using specialized software,” the judge said. “Once the device is unlocked, all records in it can be accessed and copied.”

A government attorney affirmed that he was aware of the tool. However, it applied only to one update of version 8 of the iPhone operating system—specifically, 8.1.2. The government couldn’t unlock all iPhones, but just phones with that software running.

Still, it made the judge question whether other government agencies weren’t also trying to break the iPhone’s supposedly unbreakable protections. And if so, why should he order the company to help?

There was, the judge told the government lawyer, “the possibility that on the intel side, the Government has this capability. I would be surprised if you would say it in open court one way or the other.”

Orenstein was referring to the intelligence agencies, such as the NSA, which develop tools and techniques to hack popular operating systems, and have been particularly interested for years in trying to get into Apple products, according to documents leaked by Snowden.

There was no further explanation of how Homeland Security developed the tool, and whether it was widely used. A department spokesperson declined to comment “on specific law enforcement techniques.” But the case had nevertheless demonstrated that, at least in some cases, the government can, and has, managed to get around the very wall that it now claims impedes lawful criminal investigations.

The showdown between Apple and the FBI will almost certainly not be settled soon. The company is expected to file new legal briefs within days. And the question of whether the All Writs Act applies in such cases is destined for an appeals court decision, legal experts have said.

But for the moment, it appears that the only thing certainly standing in the way of Apple complying with the government is its decision not to. And for its part, the government must be presumed to be searching for new ways to get the information it wants.

Technically, Apple probably can find a way to extract the information that the government wants from the San Bernardino shooter’s phone, Christopher Soghoian, the principal technologist for the American Civil Liberties Union, told The Daily Beast.

“The question is does the law give the government the ability to force Apple to create new code?” he said. “Engineers have to sit down and create something that doesn’t exist” in order to meet the government’s demands. Soghoian noted that this would only be possible in the San Bernardino case because the shooter was using an iPhone model 5C, and that newer hardware versions would be much harder for Apple to bypass.

But even that’s in dispute, according to another expert’s analysis. Dan Guido, a self-described hacker and CEO of the cybersecurity company Trail of Bits, said that Apple can, in fact, eliminate the protections that keep law enforcement authorities from trying to break into the iPhone with a so-called “brute force attack,” using a computer to make millions of password guesses in a short period of time. New iPhones have a feature that stops users from making repeated incorrect guesses and can trigger a kind of self-destruct mechanism, erasing all the phone’s contents, after too many failed attempts.

In a detailed blog post, Guido described how Apple could workaround its own protections and effectively disarm the security protections. It wouldn’t be trivial. But it’s feasible, he said, even for the newest versions of the iPhone, which, unlike the ones in the New York and San Bernardino cases, Apple swears it cannot crack.

“The burden placed on Apple will be greater…but it will not be impossible,” Guido told The Daily Beast.

COMMENTS

Friday, February 12, 2016

Machete-Wielding Muslim Man Attacks Israeli-Christian’s Ohio Restaurant, Several Wounded

AP Photo/Kantele Franko

by JORDAN SCHACHTEL12 Feb 20161632

Police have shot and killed a man who allegedly attacked patrons of a Columbus, Ohio, restaurant Thursday night, wounding several people. One of the victims is in critical condition, according to reports.

The suspected attacker is a Somali national named Mohammad Barry, CBS reports. There are also reports that Barry was on a terrorist watchlist.

“Law enforcement is concerned that this incident has the hallmarks of the type of so-called “lone wolf” terrorist attack that they have been working to stop,” the report reads.

The suspect entered the restaurant earlier in the day and asked for the owner. He was then told the owner was not at the restaurant, and he left the building, WBNS-10TV reports.

Thirty minutes later, allegedly armed with a machete, the now-deceased suspect entered the Nazareth Restaurant and Deli at 6:30PM local time, witnesses say.

The owner of the restaurant is an Israeli Christian who formerly lived in Nazareth, Israel, according to reports.

“He came in and started beating up on another man, I thought it was a personal thing. Then he just started down the row hitting everybody; people were bleeding,” a witness told a local ABC affiliate.

A waitress said of the events as they unfolded:

He looked straight at me but he went over to the booths and just started going down the booths. It all seemed to happen in slow motion.


Karan Bass, who was in the restaurant at the time of the assault, said:

He came to each table and just started hitting them. There were tables and chairs overturned there was a man on the floor bleeding, there was blood on the floor… I fell like five times. My legs felt like jelly. I just thought he was going to come behind me and slash me up.


The Federal Bureau of Investigation is now assisting with the investigation, policespokesperson Todd Lindgren revealed. The FBI is well-known as the nation’s preeminent domestic counterterrorism agency.

Police Sgt. Rich Weiner said there did not seem to be any “rhyme or reason” for the attack. He did not reveal the name of the suspect and did not explain why the FBI had gotten involved in the investigation.

Micki Zakas, one of the employees of the restaurant, had nothing but good things to say about the owner of the dining establishment.

“Everybody leaves here with a smile,” she told a local NBC affiliate. “It’s a real happy place, he [the owner] has been in business for 26 years, so he’s got a great reputation around here. The restaurant’s got a great reputation.”

Read More Stories About:

Big GovernmentNational SecurityDefense,CrimeterrorismjihadLaw Enforcement,IsraelMiddle EastFBIohioColumbus,Federal Bureau of InvestigationNazareth