{"id":12595,"date":"2016-03-02T22:00:56","date_gmt":"2016-03-03T04:00:56","guid":{"rendered":"http:\/\/hcstx.org\/?p=12595"},"modified":"2016-03-02T22:00:56","modified_gmt":"2016-03-03T04:00:56","slug":"technology-update-feds-dont-need-apple-to-get-into-your-iphone","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/03\/02\/technology-update-feds-dont-need-apple-to-get-into-your-iphone\/","title":{"rendered":"Technology Update: Feds Don&#8217;t Need Apple to Get Into Your iPhone"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12597\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/03\/brick-phone-3-582x388.jpg\" alt=\"brick-phone-3-582x388\" width=\"582\" height=\"388\" \/><\/p>\n<p><span class=\"lede\">IT\u2019S A SHOWDOWN <\/span>that has the country mesmerized. In court battles brewing across the nation, the FBI is trying to force Apple to help it extract data from iPhones seized in more than a dozen cases.<\/p>\n<p>The government is so intent on forcing Apple\u2019s hand that in each case the Justice Department has invoked the 200-year-old law All Writs Act to do it. But application of the Act requires the government to show that it has no other method of extracting data from the phones. And according to experts who spoke with WIRED, that\u2019s not necessarily the case. They say there are ways the government can extract data on phones without Apple\u2019s help, from using outside contractors to asking its friends at the NSA\u2014ways that it has, in fact, already used in the past. The solutions won\u2019t work for every iPhone the government has collected, and the solution offered for extracting data from the phone in San Bernardino involves some speculation about the NSA\u2019s capabilities. But they do raise questions about whether the government has done everything it can do to collect the data it says it needs.<\/p>\n<h3>The Commercial Ways In<\/h3>\n<p>According to one expert in the forensic industry who spoke with WIRED on condition of anonymity, there are commercial solutions that could possibly help the government extract data from more than half the iPhones in question and possibly more\u2014the phones are running various versions of operating system ranging from 4.2.1 to 9.0. Many of these capabilities involve defeating security mechanisms put in place by Apple and the phone owners, such as encryption and passcodes.<\/p>\n<p>\u201cForensic companies have been working on ways to extract evidence from mobile phones for years,\u201d says the expert. \u201cThey develop proprietary software and hardware to do that. It is well-known that these solutions exploit vulnerabilities on the device that allow them to perform these extractions.\u201d<\/p>\n<p>The FBI in fact has a <a href=\"http:\/\/www.fiercegovernmentit.com\/story\/fbi-sole-source-mobile-forensic-contract\/2013-09-11\">sole-source contract<\/a> with one of them, a mobile forensic firm founded in Israel called Cellebrite. The company offers <a href=\"http:\/\/www.cellebrite.com\/Pages\/Forensics-Device-Specific-Capabilities\">data-extraction services and tools<\/a> for iPhones, Android and Windows phones and Blackberries. And according to its web site, this includes extracting data from locked phones that are using any version of operating system up to 8.4.1, the last version of iOS8 that Apple released.<\/p>\n<p>Read the Remainder at<strong><a href=\"http:\/\/www.wired.com\/2016\/03\/feds-might-get-iphones-without-apples-help\/?mbid=nl_3216\"> Wired<\/a><\/strong><\/p>\n<div class=\"rad mid-banner-wrap relative bg-gray-1 flex-box align-m justify-c marg-t-50 marg-b-50\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IT\u2019S A SHOWDOWN that has the country mesmerized. In court battles brewing across the nation, the FBI is trying to force Apple to help it extract data from iPhones seized in more than a dozen cases. The government is so intent on forcing Apple\u2019s hand that in each case the Justice Department has invoked the&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2122,74,1317,4912,1814,1635,3553,3986,3712],"tags":[5086,5087,1719,3083,1839,5088,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/12595"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=12595"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/12595\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=12595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=12595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=12595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}