FBI Cancels Apple Court Hearing

The FBI has dropped its case filed a motion to vacate the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

The government filed a motion to vacate its case, likely putting a halt to a saga that began in mid-February when a federal magistrate ordered Apple to help the FBI access a phone belonging to one of the shooters involved in last December’s attack that killed 14 in San Bernardino, Calif.
The motion also indicates that the FBI may have found a way onto the phone without Apple’s help.

“On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking [shooter Syed] Farook’s iPhone,” the motion says. “Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple Inc. (“Apple”) set forth in the All Writs Act Order in this case.”

Security and privacy experts stood alongside Apple, which from Day 1 contested the court order on the grounds that it would set a dangerous precedent by weakening the encryption protecting its devices and allow the government and law enforcement to use the 200-plus-year-old All Writs Act as a Launchpad to access data stored on other devices in the future.

“This was the FBI’s hand-chosen case to set a legal precedent and allow them to order companies to break the security on phones,” said Nate Cardozo, staff attorney for the Electronic Frontier Foundation. “This case was never about one phone. It was always about the legal precedent. I think the government was wildly surprised by the level of opposition to its case and the level of support Apple got. The government was frankly taken by surprise by that. And they blinked.”

The government said in its motion that it will file a status report with the courts by April 5.

In the meantime, this is a landmark win on many fronts, starting with those who advocate for privacy and against surveillance, and for technology companies, many of which sided with Apple and surely had some anxiety about the possible outcome of tomorrow’s scheduled hearing.

“We live in a golden age of surveillance,” Cardozo said. Everything that we do online is available to law enforcement all of the time. Encryption is going to give people back their privacy in small amounts, some of the time. 

[Law enforcement] doesn’t like that. Encryption makes things difficult for them.”

Indeed, law enforcement and government officials, starting with FBI director James Comey have made their case for exceptional access since the day Apple relinquished control over encryption keys to the user and the device. No longer could the FBI compel Apple to hand over user data via a warrant. The Apple case, experts said, was the FBI’s way to regain some of that reach by using the courts to compel Apple to build new firmware that would allow the FBI to conduct an offline brute-force attack against Farook’s iPhone 5c in order to guess the passcode without wiping the device. Current protections on the iPhone introduce a time lag between incorrect guesses, and on the 10th miss, all data on the device is wiped.

“I think the government is wildly out of touch with the technological community,” Cardozo said. “The government just played this as it being about one phone. Everyone knew that was a bold-faced lie from Day 1. The government honestly believes that if the nerds try hard enough, they will be able to create a magic golden key. It doesn’t matter how often the security experts, computer scientists and mathematicians tell them it’s not possible. They’re cops and if they order someone to comply, they expect compliance.”

ThreatPost

« New Study Ranks Nations On Cyber Vulnerability
Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Naoris

Naoris

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Sabat Group

Sabat Group

Sabat Group provide relationship-driven information security & cyber security recruiting services.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Ontinue

Ontinue

Ontinue ION is an MXDR service that provides Nonstop SecOps through five key capabilities that enable your organization to respond to attacks and continuously reduce risk.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.