FBI Cancels Apple Court Hearing

The FBI has dropped its case filed a motion to vacate the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

The government filed a motion to vacate its case, likely putting a halt to a saga that began in mid-February when a federal magistrate ordered Apple to help the FBI access a phone belonging to one of the shooters involved in last December’s attack that killed 14 in San Bernardino, Calif.
The motion also indicates that the FBI may have found a way onto the phone without Apple’s help.

“On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking [shooter Syed] Farook’s iPhone,” the motion says. “Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple Inc. (“Apple”) set forth in the All Writs Act Order in this case.”

Security and privacy experts stood alongside Apple, which from Day 1 contested the court order on the grounds that it would set a dangerous precedent by weakening the encryption protecting its devices and allow the government and law enforcement to use the 200-plus-year-old All Writs Act as a Launchpad to access data stored on other devices in the future.

“This was the FBI’s hand-chosen case to set a legal precedent and allow them to order companies to break the security on phones,” said Nate Cardozo, staff attorney for the Electronic Frontier Foundation. “This case was never about one phone. It was always about the legal precedent. I think the government was wildly surprised by the level of opposition to its case and the level of support Apple got. The government was frankly taken by surprise by that. And they blinked.”

The government said in its motion that it will file a status report with the courts by April 5.

In the meantime, this is a landmark win on many fronts, starting with those who advocate for privacy and against surveillance, and for technology companies, many of which sided with Apple and surely had some anxiety about the possible outcome of tomorrow’s scheduled hearing.

“We live in a golden age of surveillance,” Cardozo said. Everything that we do online is available to law enforcement all of the time. Encryption is going to give people back their privacy in small amounts, some of the time. 

[Law enforcement] doesn’t like that. Encryption makes things difficult for them.”

Indeed, law enforcement and government officials, starting with FBI director James Comey have made their case for exceptional access since the day Apple relinquished control over encryption keys to the user and the device. No longer could the FBI compel Apple to hand over user data via a warrant. The Apple case, experts said, was the FBI’s way to regain some of that reach by using the courts to compel Apple to build new firmware that would allow the FBI to conduct an offline brute-force attack against Farook’s iPhone 5c in order to guess the passcode without wiping the device. Current protections on the iPhone introduce a time lag between incorrect guesses, and on the 10th miss, all data on the device is wiped.

“I think the government is wildly out of touch with the technological community,” Cardozo said. “The government just played this as it being about one phone. Everyone knew that was a bold-faced lie from Day 1. The government honestly believes that if the nerds try hard enough, they will be able to create a magic golden key. It doesn’t matter how often the security experts, computer scientists and mathematicians tell them it’s not possible. They’re cops and if they order someone to comply, they expect compliance.”

ThreatPost

« New Study Ranks Nations On Cyber Vulnerability
Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

MadWolf Technologies

MadWolf Technologies

MadWolf’s mission is to deliver enterprise-quality managed services and focused applications to organizations operating in the non-profit, association and international development sectors.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.