Welcome to the MacNN Forums.

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

You are here: MacNN Forums > News > Mac News > Apple maintaining waiting list for police iPhone decryption requests

Apple maintaining waiting list for police iPhone decryption requests
Thread Tools
MacNN Staff
Join Date: Jul 2012
Status: Offline
Reply With Quote
May 10, 2013, 01:58 PM
 
Apple is receiving so many requests from police agencies looking to decrypt seized iPhones that the company has started a waiting list, CNET reports. In an example exposed by court documents, the ATF is said to have wanted to break through the encryption of an iPhone 4S owned by a Kentucky man accused of distributing crack cocaine. The agency "contacted Apple to obtain assistance in unlocking the device," according to US District Judge Karen Caldwell, but was "placed on a waiting list by the company."

A search warrant affidavit organized by ATF agent Rob Maynard elaborates that for almost three months last summer he "attempted to locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock" a 4S, without success. Turning to Apple, Maynard says that Apple legal specialist Joann Chang told them there would be a minimum seven-week delay. In the end Maynard waited at least four months.

Chang is said to have explained Apple's data-dumping process, pointing out that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" for delivery to the ATF. It's unknown how Apple is breaking through iPhone encryption; while the company may simply be better at it than government agencies, it could also have faster decryption hardware, or even a secret backdoor that lets it bypass encryption entirely.

The amount of time it takes to brute force an iPhone's PIN varies. That can be as little as 20 to 40 minutes for a four-digit number, but a six-digit passcode stretches the maximum to 22 hours. A nine-digit PIN can require up to two and a half years, and 10 digits can take as much as 25 years.

The DEA has also complained about being unable to access content on Apple devices. Specifically the agency says it has had trouble accessing iMessage exchanges, since those exchanges are likewise encrypted.
     
Senior User
Join Date: Jan 2007
Location: SF
Status: Offline
Reply With Quote
May 10, 2013, 05:13 PM
 
I don't really have much sympathy at this point. Sorta glad there is a waiting list, though the implications of that fact alone are significant. Speedy trial? Exoneration prior to your data being added to some gigantic database of potentially nefarious use?

But the lack of sympathy is primarily related to the lopsided nature of the current legal system when it comes to crimes by corporations vs. crimes by individuals, and crimes by wealthy whites vs. crimes by the other.
     
Mac Elite
Join Date: Mar 2004
Location: Truckee, CA
Status: Offline
Reply With Quote
May 10, 2013, 07:07 PM
 
It is simple. Apple, LEOs or anyone else should not be decrypting phones except pursuant to judicial warrants or requests from registered owners.

It needs to be a crime for LEOs to even ask.
     
   
Thread Tools
Forum Links
Forum Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On
Top
Privacy Policy
All times are GMT -4. The time now is 02:57 AM.
All contents of these forums © 1995-2015 MacNN. All rights reserved.
Branding + Design: www.gesamtbild.com
vBulletin v.3.8.8 © 2000-2015, Jelsoft Enterprises Ltd., Content Relevant URLs by vBSEO 3.3.2