April 18, 2024
Police Swamp Apple With Requests to Decrypt Seized iPhones

Police Swamp Apple With Requests to Decrypt Seized iPhones

Posted May 10, 2013 at 4:49pm by iClarified
Law Enforcement agencies have always had trouble retrieving data off passcode enabled iPhone's, and therefore turn to Apple's assistance for help on bypassing the code. Apparently, Apple receives so many police requests to decrypt and unlock seized iPhones, that it has created a "waiting list" to handle the demand.

As reported by CNET, an agent at ATF contacted Apple to obtain assistance in unlocking the device, but was placed on a waiting list by the company. The agent had previously searched for months trying to find " a local, state, or federal law enforcement agency with the forensic capabilities to unlock" an iPhone 4S. Once placed on the waiting list, the agent was told there would be at least a seven week delay.

The ATF's Rob Maynard said in an affidavit for the Kentucky case that Apple "has the capabilities to bypass the security software" and "download the contents of the phone to an external memory device." Chang, the Apple legal specialist, told him that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" and delivered to the ATF.


It's not clear whether that means Apple has created a backdoor for police -- which has been the topic of speculation in the past -- whether the company has custom hardware that's faster at decryption, or whether it simply is more skilled at using the same procedures available to the government. Apple declined to discuss its law enforcement policies when contacted this week by CNET.


Apple specifically states in its privacy policy that it may disclose personal information "by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence"

Read More via MacRumors

Police Swamp Apple With Requests to Decrypt Seized iPhones


Add Comment
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
iClarified Icon
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Yes
No
Comments (8)
You must login or register to add a comment...
jj
jj - May 11, 2013 at 11:14am
FTP.
Ryan
Ryan - May 11, 2013 at 12:13am
All data in under 5 mins from simple google search download and installation of phone view .
Zanka
Zanka - May 10, 2013 at 7:48pm
Seems lazy on law enforcement part. There are desktop applications that let you browse iOS file system regardless of passcode already out there.
Jim Bob
Jim Bob - May 12, 2013 at 2:29am
No so. The best ones are somewhat expensive, and require support contracts. What I think they are doing, is flooding them so they give them a tool instead. Like a LE, the tap is on the network, and LEAs just get access when they need. If the algorythm isn't exposed, but a tool is created so LEAs get access as required, they'd be happy. SW companies catoring to LEAs won't be. Neither would crooks be, but this as always been a cat and mouse game, they'll use 4096 bits encryption of their sand box, 5 factor auth and auto destructs. ;)
JoshvanHulst
JoshvanHulst - May 10, 2013 at 6:02pm
I hope they never gain access to my data! That is not their's to view!!!
Simon
Simon - May 10, 2013 at 5:26pm
Has to be a back door. Hope the jailbreak community will patch it.
No one
No one - May 10, 2013 at 5:20pm
FTC
Justin
Justin - May 10, 2013 at 5:12pm
F the popo
Recent. Read the latest Apple News.
RECENT
Tutorials. Help is here.
TUTORIALS
Where to Download macOS Monterey
Where to Download macOS Ventura
AppleTV Firmware Download Locations
Where To Download iPad Firmware Files From
Where To Download iPhone Firmware Files From
Deals. Save on Apple devices and accessories.
DEALS