FBI Cancels Apple Court Hearing

The FBI has dropped its case filed a motion to vacate the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

The government filed a motion to vacate its case, likely putting a halt to a saga that began in mid-February when a federal magistrate ordered Apple to help the FBI access a phone belonging to one of the shooters involved in last December’s attack that killed 14 in San Bernardino, Calif.
The motion also indicates that the FBI may have found a way onto the phone without Apple’s help.

“On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking [shooter Syed] Farook’s iPhone,” the motion says. “Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple Inc. (“Apple”) set forth in the All Writs Act Order in this case.”

Security and privacy experts stood alongside Apple, which from Day 1 contested the court order on the grounds that it would set a dangerous precedent by weakening the encryption protecting its devices and allow the government and law enforcement to use the 200-plus-year-old All Writs Act as a Launchpad to access data stored on other devices in the future.

“This was the FBI’s hand-chosen case to set a legal precedent and allow them to order companies to break the security on phones,” said Nate Cardozo, staff attorney for the Electronic Frontier Foundation. “This case was never about one phone. It was always about the legal precedent. I think the government was wildly surprised by the level of opposition to its case and the level of support Apple got. The government was frankly taken by surprise by that. And they blinked.”

The government said in its motion that it will file a status report with the courts by April 5.

In the meantime, this is a landmark win on many fronts, starting with those who advocate for privacy and against surveillance, and for technology companies, many of which sided with Apple and surely had some anxiety about the possible outcome of tomorrow’s scheduled hearing.

“We live in a golden age of surveillance,” Cardozo said. Everything that we do online is available to law enforcement all of the time. Encryption is going to give people back their privacy in small amounts, some of the time. 

[Law enforcement] doesn’t like that. Encryption makes things difficult for them.”

Indeed, law enforcement and government officials, starting with FBI director James Comey have made their case for exceptional access since the day Apple relinquished control over encryption keys to the user and the device. No longer could the FBI compel Apple to hand over user data via a warrant. The Apple case, experts said, was the FBI’s way to regain some of that reach by using the courts to compel Apple to build new firmware that would allow the FBI to conduct an offline brute-force attack against Farook’s iPhone 5c in order to guess the passcode without wiping the device. Current protections on the iPhone introduce a time lag between incorrect guesses, and on the 10th miss, all data on the device is wiped.

“I think the government is wildly out of touch with the technological community,” Cardozo said. “The government just played this as it being about one phone. Everyone knew that was a bold-faced lie from Day 1. The government honestly believes that if the nerds try hard enough, they will be able to create a magic golden key. It doesn’t matter how often the security experts, computer scientists and mathematicians tell them it’s not possible. They’re cops and if they order someone to comply, they expect compliance.”

ThreatPost

« New Study Ranks Nations On Cyber Vulnerability
Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

SecuriThings

SecuriThings

SecuriThings is a User and Entity Behavioral Analytics (UEBA) solution for IoT security.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.