Common software could have allowed FBI to unlock shooter's iPhone

WASHINGTON -- The county government that owned the iPhone in a high-profile legal battle between Apple Inc. and the Justice Department paid for but never installed a feature that would have allowed the FBI to easily and immediately unlock the phone as part of the terrorism investigation into the shootings that killed 14 people in San Bernardino, California.

See Full Article

If the technology, known as mobile device management, had been installed, San Bernardino officials would have been able to remotely unlock the iPhone for the FBI without the theatrics of a court battle that is now pitting digital privacy rights against national security concerns.

The service costs $4 per month per phone.

Instead, the only person who knew the unlocking passcode for the phone is the dead gunman, Syed Farook, who worked as an inspector in the county's public health department.

The iPhone assigned to Farook also lacked a Touch ID feature, meaning the FBI cannot use the dead gunman's thumbprint to unlock it now. The FBI found the phone in a car after the shootings.

A U.S. magistrate last week ordered Apple to provide the FBI with highly specialized software that could be loaded onto the work-issued iPhone 5C used by Farook. He died with his wife in a gun battle with police after killing 14 people in December.

The software would help the FBI hack into the phone by bypassing a security time delay and feature that erases all data after 10 consecutive, unsuccessful attempts to guess the unlocking passcode. This would allow the FBI to use technology to rapidly and repeatedly test numbers in what's known as a brute force attack.

The FBI said it wants to determine whether Farook had used his phone to communicate with others about the attack.

Apple has said it will protest the ruling and has until Friday to intervene in court.

San Bernardino had an existing contract with a technology provider, MobileIron Inc., but did not install it on any inspectors' iPhones, county spokesman David Wert said. There is no countywide policy on the matter and departments make their own decisions, he said.

Wert disputed the value of the remote management technology because he said Farook -- or any other county employee -- could have removed it manually. That would have alerted county technology employees and led them to intervene.

In many offices and classrooms, officially issued smartphones include the installed management software. It can unlock the phone, delete all information in case of loss or theft, track the device's physical location, determine which apps are installed, check battery life and push software updates. The technology is intended to make such products more suitable in corporate environments, where tighter controls are important to protect company secrets.

"This is the business case" for mobile device management, said John Dickson, a principal at Denim Group Ltd., a security consultancy. "The organization simply has no control or influence or anything over the device unless they have some MDM authority. The ability to do remote air updates, the ability to do remote wipe, the ability to control certain settings. Those are the standard kinds of things you do in mobile device management."

This is the first time since the county issued its first Blackberry device in 2003 that law enforcement has needed access to a locked county-owned phone, Wert said. Prosecutors said in court filings that the county gave its consent to search the device. County policy said digital devices can be searched at any time and Farook signed such an agreement.

Apple executives said Friday that the company had worked hard to help federal investigators get information off the locked iPhone, suggesting they use an iCloud workaround while the phone was connected to a familiar wireless network so that it would begin automatically backing up and provide access to data. The executives spoke on condition of anonymity because of the ongoing legal process.

The executives said Apple sent engineers to work with the FBI on the workaround but the effort ultimately failed. In the government's filing Friday, prosecutors said in a footnote that neither the county nor the FBI knew the password to the iCloud account and the county, in an effort to get access to information on the phone in the hours after the attack, reset the password remotely -- thereby eliminating the possibility of that workaround being successful.

But if the county had installed the management device it had bought onto Farook's phone, none of these efforts would have been necessary.

Gartner Inc., a technology research firm, estimated that over 60 per cent of large enterprises -- meaning business, government and educational entities -- used some kind of MDM software as of last year, though not necessarily on all company-owned devices. That percentage is likely higher now than when the research was done months ago, said Terrence Cosgrove, a research director with Gartner's mobile and client computing research group. Cosgrove said MDM adoption rates are generally higher among government users.

Many workers balk at the idea that the software can monitor and track their personal phones, said Alex Heid, chief research officer at the cybersecurity firm SecurityScorecard Inc. But if the company provides a phone, it's considered reasonable practice to use such software.

"If a company's assumption is that they might not be able to get back into a device one day then it's not really a company asset at that point, it's a gift," he said.

Ted Olson, a lawyer for Apple, told ABC's "This Week" on Sunday that the legal fight had evoked an important debate about privacy and civil liberties. But he warned there would be no limiting what the government could require Apple to do in the future if the Justice Department got its way this time.

"Apple has a responsibility to maintain the trust and faith of millions of people who've depended upon Apple to produce a product that protects their privacy -- their intimate, personal life," said Olson, a former solicitor general under President George W. Bush. "This is a Pandora's box."

Fowler reported from New York.



Advertisements

Latest Tech & Science News

  • Florida zoo staff hand-raises abandoned baby kangaroo

    Tech & Science CTV News
    VIERA, Fla. -- An abandoned baby kangaroo is back with her mob after being hand-raised by the staff at a Florida zoo. Brevard Zoo officials said in a news release that Lilly, who was born in August, was found abandoned on the floor of the zoo's habitat Jan. Source
  • Officials to examine North Atlantic right whale to determine cause of death

    Tech & Science CTV News
    NORWAY, P.E.I. - Marine mammal experts plan to examine a dead North Atlantic right whale today after it was pulled ashore in P.E.I. in a bid to determine what killed it and several other whales in recent weeks. Source
  • Think turning your smartphone off means you're not distracted? Think again, study says

    Tech & Science CBC News
    It's been 10 years since the first iPhone was sold in stores — and the millions of people who now own one likely won't dispute that having the internet, social media and countless apps at their fingertips can sometimes be a distraction. Source
  • From prosthetic limbs to baby bumps, new Xbox avatars a move toward greater diversity

    Tech & Science CBC News
    Xbox has long been a leader in the gaming industry, but the latest innovation for Microsoft's console is not a game concept, or even a new piece of technology. Instead, Xbox has introduced a range of customizable options for avatars, including prosthetic limbs, a wheelchair, even a baby bump. Source
  • Orcas' failed pregnancies linked to scarce food: study

    Tech & Science CTV News
    SEATTLE - Endangered killer whales that frequent the inland waters of Washington state are having pregnancy problems because they cannot find enough fish to eat, according to a new study. Researchers analyzed hormones in excrement collected at sea and found that more than two-thirds of orca pregnancies failed over a seven-year period. Source
  • Prehistoric stone fish trap discovered on Alaska island

    Tech & Science CTV News
    KODIAK, Alaska -- Archaeologists have discovered a prehistoric fish trap constructed of rock walls near the mouth of a salmon stream on Alaska's Kodiak Island. The trap is in a lower intertidal zone that's covered by ocean water at high tide and exposed at low tide, the Kodiak Daily Mirror reported Tuesday. Source
  • Vancouver could become 'mixed reality' hub: Microsoft president

    Tech & Science CTV News
    VANCOUVER -- Microsoft president Brad Smith says Vancouver could become a hub for "mixed reality" or virtual reality technology that merges with the physical world. Smith says the estimated revenue for mixed reality video games, including both hardware and software, is expected to top $12 billion by 2025. Source
  • Microsoft president pushes Vancouver-Seattle tech corridor despite NAFTA doubt

    Tech & Science CTV News
    VANCOUVER -- The president of Microsoft is pushing to make a Vancouver-Seattle technology corridor a success, despite the uncertainty around cross-border trade posed by the administration of U.S. President Donald Trump. Brad Smith was in Vancouver on Wednesday to promote the Cascadia Innovation Corridor, an agreement signed by British Columbia and Washington state that aims to grow high-tech industries and strengthen collaboration across the region. Source
  • Canada relatively unscathed as cyberattack continues to spread

    Tech & Science CBC News
    As a cyberattack continued to spread among nations and corporations on Wednesday, the identity and motives of the attackers remain a mystery. Ports, hospitals and banks around the globe have been hit by a version of ransomware being called ExPetr, similar to Petya but with a different functionality. Source
  • How artificial intelligence is taking on ransomware

    Tech & Science CTV News
    NEW YORK -- Twice in the space of six weeks, the world has suffered major attacks of ransomware -- malicious software that locks up photos and other files stored on your computer, then demands money to release them. Source