FBI Cancels Apple Court Hearing

The FBI has dropped its case filed a motion to vacate the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

The government filed a motion to vacate its case, likely putting a halt to a saga that began in mid-February when a federal magistrate ordered Apple to help the FBI access a phone belonging to one of the shooters involved in last December’s attack that killed 14 in San Bernardino, Calif.
The motion also indicates that the FBI may have found a way onto the phone without Apple’s help.

“On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking [shooter Syed] Farook’s iPhone,” the motion says. “Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple Inc. (“Apple”) set forth in the All Writs Act Order in this case.”

Security and privacy experts stood alongside Apple, which from Day 1 contested the court order on the grounds that it would set a dangerous precedent by weakening the encryption protecting its devices and allow the government and law enforcement to use the 200-plus-year-old All Writs Act as a Launchpad to access data stored on other devices in the future.

“This was the FBI’s hand-chosen case to set a legal precedent and allow them to order companies to break the security on phones,” said Nate Cardozo, staff attorney for the Electronic Frontier Foundation. “This case was never about one phone. It was always about the legal precedent. I think the government was wildly surprised by the level of opposition to its case and the level of support Apple got. The government was frankly taken by surprise by that. And they blinked.”

The government said in its motion that it will file a status report with the courts by April 5.

In the meantime, this is a landmark win on many fronts, starting with those who advocate for privacy and against surveillance, and for technology companies, many of which sided with Apple and surely had some anxiety about the possible outcome of tomorrow’s scheduled hearing.

“We live in a golden age of surveillance,” Cardozo said. Everything that we do online is available to law enforcement all of the time. Encryption is going to give people back their privacy in small amounts, some of the time. 

[Law enforcement] doesn’t like that. Encryption makes things difficult for them.”

Indeed, law enforcement and government officials, starting with FBI director James Comey have made their case for exceptional access since the day Apple relinquished control over encryption keys to the user and the device. No longer could the FBI compel Apple to hand over user data via a warrant. The Apple case, experts said, was the FBI’s way to regain some of that reach by using the courts to compel Apple to build new firmware that would allow the FBI to conduct an offline brute-force attack against Farook’s iPhone 5c in order to guess the passcode without wiping the device. Current protections on the iPhone introduce a time lag between incorrect guesses, and on the 10th miss, all data on the device is wiped.

“I think the government is wildly out of touch with the technological community,” Cardozo said. “The government just played this as it being about one phone. Everyone knew that was a bold-faced lie from Day 1. The government honestly believes that if the nerds try hard enough, they will be able to create a magic golden key. It doesn’t matter how often the security experts, computer scientists and mathematicians tell them it’s not possible. They’re cops and if they order someone to comply, they expect compliance.”

ThreatPost

« New Study Ranks Nations On Cyber Vulnerability
Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

Vicarious

Vicarious

Vicarious identify the vulnerabilities in the software without involving the vendor and protect it before the hackers take advantage of it, even in compiled applications.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Panoplia Digital Protection

Panoplia Digital Protection

Panoplia Digital Protection is a cutting-edge cybersecurity company that leverages the power of AI and ML to help businesses and consumers protect themselves against cyber threats.