FBI Cancels Apple Court Hearing

The FBI has dropped its case filed a motion to vacate the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

The government filed a motion to vacate its case, likely putting a halt to a saga that began in mid-February when a federal magistrate ordered Apple to help the FBI access a phone belonging to one of the shooters involved in last December’s attack that killed 14 in San Bernardino, Calif.
The motion also indicates that the FBI may have found a way onto the phone without Apple’s help.

“On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking [shooter Syed] Farook’s iPhone,” the motion says. “Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple Inc. (“Apple”) set forth in the All Writs Act Order in this case.”

Security and privacy experts stood alongside Apple, which from Day 1 contested the court order on the grounds that it would set a dangerous precedent by weakening the encryption protecting its devices and allow the government and law enforcement to use the 200-plus-year-old All Writs Act as a Launchpad to access data stored on other devices in the future.

“This was the FBI’s hand-chosen case to set a legal precedent and allow them to order companies to break the security on phones,” said Nate Cardozo, staff attorney for the Electronic Frontier Foundation. “This case was never about one phone. It was always about the legal precedent. I think the government was wildly surprised by the level of opposition to its case and the level of support Apple got. The government was frankly taken by surprise by that. And they blinked.”

The government said in its motion that it will file a status report with the courts by April 5.

In the meantime, this is a landmark win on many fronts, starting with those who advocate for privacy and against surveillance, and for technology companies, many of which sided with Apple and surely had some anxiety about the possible outcome of tomorrow’s scheduled hearing.

“We live in a golden age of surveillance,” Cardozo said. Everything that we do online is available to law enforcement all of the time. Encryption is going to give people back their privacy in small amounts, some of the time. 

[Law enforcement] doesn’t like that. Encryption makes things difficult for them.”

Indeed, law enforcement and government officials, starting with FBI director James Comey have made their case for exceptional access since the day Apple relinquished control over encryption keys to the user and the device. No longer could the FBI compel Apple to hand over user data via a warrant. The Apple case, experts said, was the FBI’s way to regain some of that reach by using the courts to compel Apple to build new firmware that would allow the FBI to conduct an offline brute-force attack against Farook’s iPhone 5c in order to guess the passcode without wiping the device. Current protections on the iPhone introduce a time lag between incorrect guesses, and on the 10th miss, all data on the device is wiped.

“I think the government is wildly out of touch with the technological community,” Cardozo said. “The government just played this as it being about one phone. Everyone knew that was a bold-faced lie from Day 1. The government honestly believes that if the nerds try hard enough, they will be able to create a magic golden key. It doesn’t matter how often the security experts, computer scientists and mathematicians tell them it’s not possible. They’re cops and if they order someone to comply, they expect compliance.”

ThreatPost

« New Study Ranks Nations On Cyber Vulnerability
Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.