Jump to content

FBI may have lost critical time unlocking Texas shooter's iPhone


webfact

Recommended Posts

FBI may have lost critical time unlocking Texas shooter's iPhone

By Stephen Nellis and Dustin Volz

 

tag_reuters-1.jpg

Daniel Friesenhahn (C) is comforted by Derrick Barnhardt (R) and Chris Johnson during a vigil in the memory of those killed in the shooting at the First Baptist Church of Sutherland Springs in La Vernia, Texas, U.S., November 7, 2017. REUTERS/Jonathan Bachman

 

SAN FRANCISCO/WASHINGTON (Reuters) - For about 48 hours after a deadly rampage at a Texas church, the FBI and other law enforcement agencies did not ask Apple Inc to help them unlock the gunman's iPhone or associated online accounts, a person familiar with the situation told Reuters on Wednesday.

 

A cellphone belonging to Devin Kelley - accused of killing 26 people on Sunday before taking his own life - was sent to the Federal Bureau of Investigation's Quantico, Virginia, crime lab because authorities could not unlock it, Christopher Combs, head of the FBI's San Antonio field office, said on Tuesday.

 

Combs did not specify what kind of phone Kelley had during the attack in Sutherland Springs, Texas, but a second person familiar with the situation confirmed to Reuters that it was an iPhone.

 

The first source said that in the 48 hours between the shooting and Combs' news conference, Apple had received no requests from federal, state or local law enforcement authorities for technical assistance with Kelley's phone or his associated online accounts at Apple.

 

The delay may prove important. If Kelley had used a fingerprint to lock his iPhone, Apple could have told officials they could use the dead man's finger to unlock his device, so long as the phone had not been powered off and restarted.

 

But iPhones locked with a fingerprint ask for the user's pass code after 48 hours if they have not been unlocked by then.

Officials also could have asked for data from Kelley's iCloud online storage account if he had one. If Apple receives a warrant or court order, it will give law enforcement authorities iCloud data, as well as the keys needed to decrypt it.

 

If an iPhone user backs up an iPhone using iCloud, the online data can contain texts, photographs and other information from the phone.

 

The first Reuters source said the FBI had yet to ask as of Wednesday for assistance unlocking the device. It could not be learnt whether Apple had received a court order to turn over iCloud account data. It also could not be learnt whether the FBI had tried to use Kelley's fingerprint and failed to unlock his phone despite not contacting Apple.

 

The FBI declined to comment when asked about the type of phone used by Kelly. A spokeswoman referred to Combs' news conference on Tuesday.

 

The FBI has criticized Apple for how difficult it is to obtain data from its devices when they are locked. The phones contain a so-called "secure enclave" that makes it difficult to crack their encryption, and too many errant attempts to unlock an iPhone can erase all data.

 

The FBI challenged Apple in court over access to an iPhone after a 2015 mass shooting in San Bernardino, in which a couple authorities said was inspired by Islamic State killed 14 people. The couple died in a shootout with police hours after the massacre. An iPhone 5C, recovered by authorities, did not have a fingerprint sensor.

 

The legal issues in the case were never settled because the FBI found third-party software that allowed it to crack the device.

But federal authorities were accused of missteps in unlocking the San Bernardino phone.

 

Last year, Apple executives who briefed reporters on condition of anonymity criticized government officials who reset the Apple identification associated with the phone, which closed off the possibility of recovering information from it through the automatic cloud backup.

 

(Reporting by Stephen Nellis in San Francisco and Dustin Volz and David Shepardson in Washington; Editing by Jonathan Weber, Jonathan Oatis and Howard Goller)

 
reuters_logo.jpg
-- © Copyright Reuters 2017-11-09
Link to comment
Share on other sites

Thinking sideways ( because I can’t see the issue regards this phyco’s phone)... could there be a case being made to force Apple to provide confidential information big brother style?

 

I reckon some people’s constitutional amendment rights are about to get trampled.... not the one pertaining to bearing arms, mind... but government conspiracy I smell.

Link to comment
Share on other sites

10 hours ago, webfact said:

The FBI has criticized Apple for how difficult it is to obtain data from its devices when they are locked. The phones contain a so-called "secure enclave" that makes it difficult to crack their encryption, and too many errant attempts to unlock an iPhone can erase all data.

Criticized Apple phones for being reliable and secure ❗️?

???

Edited by Foozool
Link to comment
Share on other sites

23 hours ago, webfact said:

the FBI and other law enforcement agencies did not ask Apple Inc to help

Smart really.

In the San Bernardino case Apple refused FBI's request to unlock a phone and had to get a court order. Which Apple still refused. Eventually the FBI got a 3rd party to access phone call data.

http://www.latimes.com/local/lanow/la-me-ln-fbi-apple-san-bernardino-phone-20160216-story.html

 

So maybe this time the FBI assumed Apple would again refuse and decided a court order would take too long with a possible appeal by Apple. Perhaps the FBI also assumed the same 3rd party would have the same success - not realizing how the phone type and software might be different and, thus, more complex to unlock/decrypt.

 

Link to comment
Share on other sites

23 hours ago, webfact said:

For about 48 hours after a deadly rampage at a Texas church, the FBI and other law enforcement agencies did not ask Apple Inc to help them unlock the gunman's iPhone or associated online accounts, a person familiar with the situation told Reuters on Wednesday.

So, if I have this right, this entire story is about the FBI not contacting Apple based on a statement of someone not involved, but familiar with the active shooting incident?

 

Or is it a cryptic heads up that the FBI don't need Apple anymore to hack into their iphones?

 

Confusing article to say the least, at least it is for me from where my mindset is at the minute.

Link to comment
Share on other sites

On 11/9/2017 at 8:08 AM, webfact said:

The FBI has criticized Apple for how difficult it is to obtain data from its devices when they are locked.

Kurt Opsahl (‪@kurtopsahl‬)

9/11/17, 07:39

 

Yes, but other than the metadata, GPS history, iCloud back ups, ISP logs, computer forensics, physical house, car and crime scene searches, military and govt records, and eyewitnesses, how can we investigate without unlocking the phone?

Link to comment
Share on other sites

On 11/9/2017 at 9:08 AM, webfact said:

The delay may prove important. If Kelley had used a fingerprint to lock his iPhone, Apple could have told officials they could use the dead man's finger to unlock his device, so long as the phone had not been powered off and restarted.

 

Seems like the experts at the FBI should have known that without pestering Apple. 

 

And nowhere does anyone seem to say they didn't get into the phone, just that they didn't ask Apple for help in the first 48.  Maybe they didn't need it?

 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.







×
×
  • Create New...