Apple Snuck In Code That Automatically Reboots Idle IPhones And Cops Are Not Happy About It

from the phone-cracking-now-has-a-countdown-timer dept

Detroit law enforcement officials got a bit of shock last week when some seized iPhones rebooted themselves, despite being in airplane mode and, in one case, stored inside a Faraday bag. Panic — albeit highly localized — ensued. It was covered by Joseph Cox for 404 Media, who detailed not only the initial panic, but the subsequent responses to this unexpected development.

Law enforcement officers are warning other officials and forensic experts that iPhones which have been stored securely for forensic examination are somehow rebooting themselves, returning the devices to a state that makes them much harder to unlock, according to a law enforcement document obtained by 404 Media.

The exact reason for the reboots is unclear, but the document authors, who appear to be law enforcement officials in Detroit, Michigan, hypothesize that Apple may have introduced a new security feature in iOS 18 that tells nearby iPhones to reboot if they have been disconnected from a cellular network for some time. After being rebooted, iPhones are generally more secure against tools that aim to crack the password of and take data from the phone.

The problem (for the cops, not iPhone owners) is that the reboot takes the phone out of After First Unlock (AFU) state — a state where current phone-cracking tech can still be effective — and places it back into Before First Unlock (BFU) state, which pretty much renders phone-cracking tech entirely useless.

The speculation as to the source of these unexpected reboots was both logical and illogical. The logical assumption was that Apple had, at some point, added some new code to the latest iOS version without informing the public this new feature had been added.

The other guesses were just kind of terrible and, frankly, a bit worrying, considering their source: law enforcement professionals tasked with finding technical solutions to technical problems.

The law enforcement officials’ hypothesis is that “the iPhone devices with iOS 18.0 brought into the lab, if conditions were available, communicated with the other iPhone devices that were powered on in the vault in AFU. That communication sent a signal to devices to reboot after so much time had transpired since device activity or being off network.” They believe this could apply to iOS 18.0 devices that are not just entered as evidence, but also personal devices belonging to forensic examiners.

These are phones, not Furbies. There needs to be some avenue for phone-to-phone communication, which can’t be achieved if the phones are not connected to any networks and/or stored in Faraday cages/bags. The advisory tells investigators to “take action to isolate” iOS 18 devices to keep them from infecting (I guess?) other seized phones currently awaiting cracking.

Fortunately, a day later, most of this advisory was rendered obsolete after actual experts took a look at iOS 18’s code. Some of those experts work for Magnet Forensics, which now owns Grayshift, the developer of the GrayKey phone cracker. This was also covered by Joseph Cox and 404 Media.

In a law enforcement and forensic expert only group chat, Christopher Vance, a forensic specialist at Magnet Forensics, said “We have identified code within iOS 18 and higher that is an inactivity timer. This timer will cause devices in an AFU state to reboot to a BFU state after a set period of time which we have also identified.” 

[…]

“The reboot timer is not tied to any network or charging functions and only tied to inactivity of the device since last lock [sic],” he wrote. 

It’s an undocumented feature in the latest version of iOS, apparently. And one that isn’t actually a bug dressed in “feature” clothing. This was intentional, as was Apple’s decision to keep anyone from knowing about until it was discovered, presumably. Apple has issued no statement confirming or denying the stealthy insertion of this feature.

Law enforcement officials and the tech contractors they work with aren’t saying much either. Everything published by 404 Media was based on screenshots taken from a law enforcement-only group chat or secured from a source in the phone forensics field. Magnet Forensic has only offered a “no comment,” along with the acknowledgement the company is aware this problem now exists.

This means iPhones running the latest iOS version will need to be treated like time bombs by investigators. The clock will start running the moment they remove the phones from the networks they use.

This isn’t great news for cops, but it’s definitely great news for iPhone owners. And not just the small percentage who are accused criminals. Everyone benefits from this. And the feature will deter targeting of iPhones by criminals, who are even less likely to be able to beat the clock with their phone-cracking tech. Anything that makes electronic devices less attractive to criminals is generally going to cause additional problems for law enforcement because both entities — to one degree or another — know the true value of a seized/stolen phone isn’t so much the phone itself as it is the wealth of information those phones contain.

Filed Under: , , , , ,
Companies: apple, grayshift, magnet forensics

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Apple Snuck In Code That Automatically Reboots Idle IPhones And Cops Are Not Happy About It”

Subscribe: RSS Leave a comment
50 Comments
This comment has been deemed insightful by the community.
Anonymous Coward says:

The law enforcement officials’ hypothesis is that “the iPhone devices with iOS 18.0 brought into the lab, if conditions were available, communicated with the other iPhone devices that were powered on in the vault in AFU.

What did they think the faraday bags were for? Why are cops so fucking stupid?

Anonymous Coward says:

Note one of the consequences of this

“[…] Apple may have introduced a new security feature in iOS 18 that tells nearby iPhones to reboot if they have been disconnected from a cellular network for some time.”

This covers the case where the iPhone has been disconnected from a cellular network, and that’s fine. What about the case where the cellular network has been disconnected from the iPhone?

To clarify: I’m talking about long-term cellular network failures, for example what’s happened and is happening in western North Carolina right now. This is common in natural disasters, because the cellular network is far more brittle than cable/fiber networks (which are in turn far more brittle than copper networks).

Now it may be that having a phone return to this locked state doesn’t really matter (a) because there’s no cell network to use anyway and (b) because the owner can unlock it if the cell network comes back up or they find a working wi-fi network etc. But I think it’s something to keep in mind.

This comment has been deemed insightful by the community.
James Burkhardt (profile) says:

Re:

Before first unlock is a state that disables touch and face ID, and prevents access to the data on the phone until it is unlocked. This thwarts criminal attempts to exfiltrate data.

Unlocking a phone by pin or password is trivial for the end user. We do it every day. This should not prevent users from accessing the data on their phone even if it was engaged, regardless of network connectivity.

Anonymous Coward says:

This sounds something like the “booby trap” mode” that I have mentioned that some Samsung phones have.

Samsung goes further that Apple. If that mode is set, too many failed password attempts and the phone wipes itself and resets, and cannot be fully reset without your Google password.

There is no law in either South Korea (where Samssung makes their phones) or anywhere in the USA, Canada, or Mexico that makes it a crime to set this mode.

I have done it on road trips so that when I go to any “asset forfeiture” state, the cops will not able to access my phone if is ever seized. It will just make an expensive paperweight.

What Samsung does and what Apple does does not break any laws any laws in Canada, Mexico, or the United States or in China (where apple phones are made) or in South Korea (where Sansung phones are made)

The only thing that will work is incoming calls as long as the service on the phone is active

This comment has been deemed insightful by the community.
James Burkhardt (profile) says:

Re:

There is nothing about what you’ve said that is meaningfully different than the same feature that apple has had for at least as long. I readily admit its been a decade since I tried android, so ill err on the side of over explaining things here, but I am lead to believe Android is similar to iOS.

When an iPhone restarts, it requires a pin/passcode/password before it can connect to external devices or use biometrics. This state is known as Before First Unlock. This state is more secure than After First Unlock. BFU also more heavily restricts the use of lock screen widgets, like notifications, the camera, and the quick settings menu, called the control center in iOS.

To better secure idle phones (that by their idle nature imply the phone has been taken or are not in current use), Apple now soft reboots the system to return to a Before First Unlock state. This prevents hacks that use the AFU state to exfiltrate data without a passcode, or prevent various means of gaining biometric access without the proper consent of the phones owner.

This is on top of encrypting data and automatically erasing data if improper passcodes are provided as you describe.

Anonymous Coward says:

That’s a recommendation from CIA to reboot phones regularly… to improve security (exiting background services, closing stale file accesses, restoring default states, etc.). This can also improve battery life.
For years now, Samsung phones can programmed to reboot every night or every week. Many other manufacturers offer similar options.

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

Re:

“Normal masculinity” = fucking your country over by giving it up to a douchey paint-chip muncher who has to pay pornstars for sex and has failed in business far more than he’s succeeded, who uses comically orange skin coloring, and risers to compensate for his napoleon complex and insecurity. Really picked a great example there, buddy.

This comment has been flagged by the community. Click here to show it.

That One Guy (profile) says:

'How am I supposed to look into their bedroom windows now?!'

Watching law enforcement freak out over stuff like this is the equivalent of watching a serial peeping tom getting indignant over people in their neighborhood installing blinds on their windows, and for the same reason: If they hadn’t shown absolutely no restraint then maybe the recipients of their ‘attention’ might not have felt the need to ramp up the actions they were taking to protect their privacy.

Anonymous Coward says:

Re:

Watching law enforcement freak out over stuff like this is the equivalent of watching a serial peeping tom getting indignant over people in their neighborhood installing blinds on their windows, and for the same reason

…and they’re the same people, per yesterday’s Techdirt article: Seventh Circuit Again Says Long-Term Pole Camera Surveillance Isn’t Unconstitutional.

Anonymous Coward says:

Re:

I’m pretty sure Apple’s reason for including this had nothing to do with law enforcement. There’s been a recent upswing in iPhone thefts with a ring that’s able to wipe the phones from AFU mode via some ingenious phishing. The news of this surfaced slightly before iOS 18 was released in beta. So most likely, Apple added this feature as a way of protecting people’s phones from this theft+phish approach to stealing phones.

That One Guy (profile) says:

Re: Re:

Oh I agree with you, Apple’s motives here are almost certainly entirely centered around protecting their customers/users from criminals who steal their devices by making it that much harder to break into them, I just find it amusing how often law enforcement acts as though anything that protects privacy and security is a personal affront to them and treats it as something solely designed to benefit criminals, when in point of fact it’s law enforcement’s war on encryption and privacy that stands to benefit criminals the most.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

Here is a damn good reason why phones to be cop proof

https://www.washingtonpost.com/nation/2024/11/15/law-enforcement-nude-photos-traffic-stops/

They women in either case should have REFUSED to give the cop her password. There is no law in Missouri a cop can use to compel you to unlock your phone.

Even if the phones were seized, assuming they were Android phones, either woman could have gone to her Google account and send a command to wipe the phone next time it connects to the network.

One the phone came out of the Faraday bag and was back on the network, the command to wipe the phone would execute and the phone would wipe itself, meaning they get nothing. And there is not one of the 50 states

This is, unless, the cop shop is using a jammer. I think some do because when one police substation used to be in one strip mall here my cellular Internet would stop on that part of the street and then start up again once I got down the road.

The Sheriffs office here was NOT breaking ANY laws if they were using any jammers in that cop shop. If I went to Dominos Pizza, which was right next door, my cell phone service died, but started up again when I got down the road.

If it is part of the execution of their duties, the FCC has no jurisdiction over that. Then cannot ban your local police from using cell phone jammers to stop seized phones from being wiped.

Just like communications used by the United States Armed are not subject to FCC jurisdiction. If military communications should be jammed, that Uniform Code Of Military Justice has the jurisdiction on that, and not the FCC.

Jamming military communications is a violation of the UCMJ and not any FCC rules becuase the FCC does not have jurisdiction over the US military.

Anonymous Coward says:

Re: Re:

Not if they are doing that in the performance of their duties.

Also, there is one car dealership around here that jams cellular data.

When I had to drive a friend of mine over there to buy a new car I found that cell phone service is screwed up there, and the dealer that was servicing my friend told me that it is was company policy to jam cell phones in the building to keep employees from using anything other than the company supplied Internet.

The boss wants his workers focused on their work, so he does have the right to jam cellphones in the building. That is company policy and does not break any laws in California.

Also, some states, in proposed school cell phone bans, will allow schools to install and use cell phone jammers to enforce that rule.

If state laws allow that, then it is legal for the schools to do it.

Anonymous Coward says:

Re: Re: Re:

Not if they are doing that in the performance of their duties.

Funny, I read the link posted by AC and there is no exemption from the anti-jamming law for state or local LEAs regardless of the circumstances. As AC suggested, you should read more before giving your half-assed opinion of what the law does and does not allow.

cashncarry (profile) says:

Repeating the mistake?

“This means iPhones running the latest iOS version will need to be treated like time bombs by investigators. The clock will start running the moment they remove the phones from the networks they use.”

Hasn’t the article just been at pains to explain that the timed reboot has nothing to do with data commmunications?

Would it not be more correct to say “The clock will start running the moment they seize a phone”?

cashncarry (profile) says:

Re: Re: Read it again

“The reboot timer is not tied to any network or charging functions and only tied to inactivity of the device since last lock [sic],”

not tied to any network activity

As I interpret this and other articles on the topic, the only real hope that someone who doesn’t know the passcode has (whether it’s an investigator or a criminal) is to obtain a phone in an unlocked state and keep it that way until exfiltration is complete.

So, grabbing a phone while someone is using it, or being in a position to compel biometrics if the phone is in AFU state so it can be unlocked would seem to be about it. If it’s locked but in AFU then you have to hope your “cracking toolkit” will work before the phone reboots into BFU state. No more hanging onto a phone you can’t currently crack until an exploit is developed.

KlfJoat (profile) says:

Occam's Razor shaved these LEO 'experts'

Their voiced thoughts were that phones were talking to each other?

Phone 1 tells Phone 2 to reboot when Phone 1 has been locked for too long?

None of these ‘experts’ realized that Phone 2 isn’t necessary in their own scenario? Much less that there is a simpler and easier answer?

After reading the second 404 Media story, I felt like Sherlock Holmes or Jonathan Creek. An overly complicated solution fails in the face of liklihood and Occam’s Razor.

That Anonymous Coward (profile) says:

Oh noes… the FBI might end up with more phones they can’t unlock!!!
Someday they might even figure out how many phones that is.

Of course this time end a bunch of the we grabbed their phone because we could & we’ll get around to looking around in it when we feel like it. Imagine a world where they need an actual warrant to root around in someones phone fishing for things they think they might find.

Actual investigations instead of just stealing peoples phones & holding them for however long they want.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Subscribe to Our Newsletter

Get all our posts in your inbox with the Techdirt Daily Newsletter!

We don’t spam. Read our privacy policy for more info.

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...