Court asks Apple to unlock Bernardino shooter’s iPhone

17 Feb 2016

A US judge has ordered Apple to help the government unlock the iPhone used by one of the shooters who carried out the 2 December San Bernardino, California terrorist attacks after the government said that the firm failed to provide assistance voluntarily.

The Justice Department sought the order ''in the hopes of gaining crucial evidence'' about the shooting rampage, which killed 14 people and injured 22.

The order, signed on Tuesday by a magistrate judge in Riverside, California, does not ask Apple to break the phone's encryption but rather to disable the feature that wipes the data on the phone after 10 incorrect tries at entering a password. That way, the government can try to crack the password using ''brute force'' - attempting tens of millions of combinations without risking deletion of the data.

The order comes a week after FBI Director James B Comey told Congress that the bureau has not been able to open the phone belonging to one of the killers. ''It has been two months now, and we are still working on it,'' he said.

The issue illustrates the frustration of law enforcement in gaining access to data in high-profile investigations. It also raises the pressure on Apple to find a way to comply, as the phone was used in the deadliest terrorist attack on US soil since 11 September 2001.

The Silicon Valley giant has steadfastly maintained that it is unable to unlock its newer iPhones for law enforcement, even when officers obtain a warrant, because they are engineered in such a way that Apple does not hold the decryption key. Only the phone's user - or someone who knew the password - would be able to unlock the phone.

The FBI's efforts may show how impervious the new technology is to efforts to circumvent it. According to industry officials, Apple cannot unilaterally dismantle or override the 10-tries-and-wipe feature. Only the user or person who controls the phone's settings can do so.

However, US Magistrate Judge Sheri Pym said in her order, Apple can write software that can bypass the feature. Federal prosecutors stated in a memo accompanying the order that the software would affect only the seized phone.

Nonetheless, Apple probably would see that as a request for a ''back door'' or a weakening of device security and would resist it, said industry officials, who spoke on the condition of anonymity to discuss a sensitive matter.

The phone, an iPhone5C, was used by Syed Rizwan Farook, who with his wife, Tashfeen Malik, opened fire at a holiday party at the Inland Regional Center, a county facility. The couple, who pledged loyalty to the Islamic State terrorist group, died a few hours later in a shootout with police.

FBI investigators recovered a number of electronic devices, including thumb drives, computer hard drives and Farook's cellphone. His phone belonged to the county public-health department, where he was an inspector. Prosecutors noted that the county consented to allow the phone to be searched and to have Apple's assistance in the matter.

Data that would be encrypted on the device includes contacts, photos and iMessages. Having access to that material could shed light on why the couple picked the target they did, whether they were planning other attacks and whether they received any direction or support from overseas.

FBI Supervisory Special Agent Christopher Pluhar stated in a declaration that he was able to obtain from Apple all the data backed up to its iCloud servers from the phone. That data showed that Farook was in communication with individuals who were later killed. Significantly, Pluhar said, the most recent backup took place on 19 October 2015, indicating that Farook may have intentionally disabled the backup feature.

Pluhar, who is director of the Orange County Regional Computer Forensics Laboratory, said he believes there may be ''relevant, critical communications and data'' on the phone from around the time of the shooting.

Former National Counterterrorism Center director Matt Olsen, who recently co-authored a paper that asserted that the government had other ways to obtain data without creating a backdoor into devices, said the public interest in this case supports the government getting access to the data.

''This is the kind of case where companies like Apple need to demonstrate that they're good corporate citizens and comply with lawful court orders,'' said Olsen, who was also a general counsel at the National Security Agency.

But Kevin Bankston, director of New America's Open Technology Institute, said what the court is ordering Apple to do is ''custom-build malware to undermine its own product's security features''. He said it is not clear whether Apple can do that technically. But if a court can compel Apple to do it, then it can compel other software providers to do so as well. ''This isn't just about one iPhone, it's about all of our software and all of our digital devices,'' he said. ''If this precedent gets set, it will spell digital disaster for the trustworthiness of everyone's computers and mobile phones.''

The phone ran on Apple's iOS 9 operating system, which was built with default device encryption. When a user creates a password, that phrase generates a key that is used in combination with a hardware key on a chip inside the phone. Together, the keys encrypt the device's data.

If the autowipe function is suspended, the FBI can run a massive number of combinations of letters, symbols and numbers until the right combination is found.

But there's a complication.

If the combinations are run on the phone itself, the process can be painfully slow, taking, according to Apple, five and a half years for a six-digit lower-case password mixing numbers and letters.

If run on a supercomputer, it can be done many thousands of times faster. But to do it that way, the FBI would need the hardware key, which is built into the phone. Apple says it does not keep a copy of that key. To get that key, one could use a number of techniques, including melting the plastic off the chip and hitting it with bursts of lasers or radio frequencies to recover bits of the key.

Matthew D Green, a cryptography expert at Johns Hopkins University, said the FBI could crack a six-digit numeric code in about 22 hours.

''But once there's numbers and letters, that's when things get interesting,'' he said. ''It might take 10 years to crack a strong password on the phone, which means they might be stuck till 2026.''

The government requested the order under the All Writs Act, a law dating to the colonial era that has been used as a source of authority to issue orders that are not otherwise covered by a statute. Though Apple has previously complied with court orders under that statute to retrieve data from iPhones running earlier versions of its operating system, it is now resisting such an order in a separate iPhone case in Brooklyn. That case, unlike the one in California, involves a phone with software that allows the firm to extract data.

The government contends that courts over the years have issued orders based on that law for the unencrypted contents of computers, for credit card records and for security camera videotapes. It noted that the Supreme Court in 1977 held that the law gave courts the authority to direct a phone company to execute a search warrant for numbers dialed by a particular customer.

Some legal scholars, however, said the use of the All Writs Act in the California Apple case presents a slippery slope issue. ''If the writ can compel Apple to write customized software to unlock a phone, where does it end?'' said Ahmed Ghappour, a professor at the University of California's Hastings College of the Law. ''Can the government use it to compel Facebook to customize an algorithm that predicts crime? It's not clear where the line will be drawn, if at all.''