If FBI Can Get Into A Device Running iOS 9, Why Does It Say It Still Needs Apple's Help To Get Into One Running iOS 7?

from the questions,-questions dept

The questions raised by the DOJ announcing that it was, in fact, able to get in to Syed Farook’s work iPhone continue to grow. The latest is that, if it could get into that phone, running the fairly secure iOS 9, why is it still fighting the case in NY where it’s trying to get into a drug dealer’s phone running iOS 7? As you may recall, the case in NY has been going on for longer than the San Bernardino one. It started back in October when the DOJ demanded Apple’s help in getting into the iPhone of Jun Feng (a drug dealer who admitted guilt, but who claims he forgot the passcode) and magistrate judge James Orenstein stepped in to ask Apple if this was a reasonable request.

Then, earlier this month, Orenstein wrote a pretty thorough dismantling of the Justice Department’s position over the All Writs Act. The DOJ then appealed that ruling, which is now sitting in front of a non-magistrate judge, Margo Brodie. Part of the DOJ’s argument made in the appeal was that this case is very different from the San Bernardino case, because in this case the phone is using iOS 7, which means that Apple already has the key to get in, and it doesn’t require any further “burden” in terms of writing new code. As we noted at the time, this seemed to make the DOJ’s case a little stronger.

However, now that the FBI has broken into the iOS 9 device (even if it claims the hack only works on some phones), it seems to argue in the exact other direction. Getting into an iOS 7 device is comparatively quite easy according to a bunch of folks. Apple really only ratcheted up the security in iOS with default encryption in iOS 8 — meaning that any decent forensics team should be able to get into the iOS 7 device without much difficulty. Remember, a key part of the (somewhat made up) test that the DOJ insists must be used in All Writs Act cases like this is whether or not the third party’s help is “necessary.”

And in this case, the DOJ insisted that it had no way into this phone without Apple’s help:

If you can’t read that, it’s from the appeal, and it directly claims that the government “has explored the possibility of using third-party technologies” but says that it can’t do so safely. That’s difficult to believe in the wake of the DOJ’s claims that it successfully got into Syed Farook’s much more secure iPhone.

And yet… the NY case moves forward, with the DOJ making a new filing today giving Apple more time to respond to the government’s application. It is, of course, possible, that the DOJ will eventually drop this case as well, but its argument that it absolutely needs Apple’s help here seems to be yet another misleading, or simply false, statement from the Justice Department.

Filed Under: , , , , , , , , , , ,
Companies: apple

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “If FBI Can Get Into A Device Running iOS 9, Why Does It Say It Still Needs Apple's Help To Get Into One Running iOS 7?”

Subscribe: RSS Leave a comment
24 Comments
Ninja (profile) says:

The Govt clearly dropped the other case because it was moving towards a precedent they don’t want. The same will happen here. I’m HOPING Apple doesn’t let this go that easily and tries to get an order that forbids law enforcement from use the All Writs Act in this specific way. Otherwise this just becomes a whack-a-mole game where the Govt keeps probing till they get the desired result.

Out of curiosity, is this a different circuit?

Anonymous Coward says:

Re: Circuits [was ]

… is this a different circuit?

Map: Geographic Boundaries of United States Courts of Appeals and United States District Courts()

• The Eastern District of New York is in the Second Circuit.
• The Central District of California is in the Ninth Circuit

() Despite the title of the map, it doesn’t label the actual districts, and seems to do a rather poor job of even showing district boundaries within New York. You can, though, see the district boundaries within California. The map is a government publication…

Anonymous Coward says:

Re: Re: Circuits [was ]

… seems to do a rather poor job of even showing district boundaries within New York.

Hmmm, when verifying the link after posting… I notice that zooming in on New York shows cyan boundaries on cinnamon background. So, the boundaries are indeed there in the New York part of the map, but I do have to zoom in to see ’em.

As I said in the previous post: goverment work…

DavidMxx (profile) says:

I cannot image that the All Writs Act could ever be used to force a company (or an individual) to write computer code that they did not want to write.

Computer code is speech, and the First Amendment states that the Government cannot force someone to say something that the person does not want to say. There is no conceivable argument the DOJ could make to override the First Amendment. When it comes to the All Writs Act versus the Constitution, the Constitution wins every time.

Uriel-238 (profile) says:

Re: Re: "The FBI/DOJ don't seem to care."

The FBI / DoJ only care if the courts care. Their interest is to secure convictions, not see the truth. The truth doesn’t interest them. Convictions do, and if they could get them by beating confessions out of people, they wouldn’t hesitate.

In fact, during the JEHoover days, beating confessions out of suspects was a standard FBI modus operandi.

Whoever says:

Because the FBI didn't break into Farooks' phone?

The sole purpose of the suing Apple over Farook’s phone was to establish a precedent. Since it looked likely that the only precedent the FBI would get would not be what the FBI wanted, the FBI withdrew, to cover themselves and not to lose face, they lied about breaking into Farook’s phone.

Anonymous Coward says:

Re: Re:

I could swear the 5c in question had iOS 8 on it

The 5c is the San Bernardino iPhone. It runs iOS 9. See p.4 (p.6 in PDF) of the Memorandum of Points and Authorites attached to the Government’s Ex Parte Application (Feb 16, 2016) and also see para 2 (p.2: ln 15) of the Supplemental Pluhar Declaration (Mar 9, 2016).

Perhaps you meant to say the 5s ? The 5s is the E.D.N.Y. one.

Anonymous Coward says:

Re: Re: Re:

Perhaps you meant to say the 5s ? The 5s is the E.D.N.Y. one.

Although, somewhat curiously, a copy of the Governments Oct 8, 2015 application [Case 1:15-mc-01902-JO Document 1 Filed 10/08/15] (which document is also reproduced as Exhibit A [Case 1:15-mc-01902-JO Document 15-1 Filed 10/22/15] attached to the Government’s October 22 reply), identifies the E.D.N.Y. device as an iPhone 5.

The iOS device is an iPhone 5 labeled DEA Exhibit N-67, with IMSI number 310260572923753 and telephone number (908) 463-3333.

This is not consistent with other documents in this case, which identify the device as an iPhone 5s.

Anonymous Coward says:

Re: Re: Re: Re:

This is not consistent with other documents in this case, which identify the device as an iPhone 5s.

The iPhone where the government wants Judge Brodie to overrule Magistrate Judge Orenstein’s decision is, according the government, an iPhone 5s.

See p.7 under “Preliminary Facts”

Agents conducted a search of Feng’s home, pursuant to a warrant, and seized an Apple iPhone 5s running iOS 7.

And also p.9, “Statement of Facts”

The Apple iPhone 5s running iOS 7 that is the subject of the government’s application was seized pursuant to a search warrant from the residence of Jun Feng . . .

[Case 1:15-mc-01902-JO Document 30 Filed 03/07/16]

Anonymous Coward says:

Re: Re: Re:2 Re:

[Case 1:15-mc-01902-JO Document 30 Filed 03/07/16]

Also see Exhibit A: Mar 7, 2016 Application (p.54 in PDF), attached to the government’s March 7, 2016 Memorandum of Law:

The iOS device is an iPhone 5s labeled DEA Exhibit N-67, with IMEI number 013888005800316, IMSI number 310260572923753, and telephone number (908) 463-3333.

( Note—
   These copies of these documents have PACER headers:
   • “Case 1:14-cr-00387-MKB Document 144 Filed 03/07/16” (Government’s Memorandum of Law)
   • “Case 1:14-cr-00387-MKB Document 144-1 Filed 03/07/16” (Exhibit A)

   See the very first document in the linked PDF:

CIVIL DOCKET FOR CASE #: 1:15-mc-01902-JO

… United States v Feng, 14-CR-387. The Clerk of Court shall add Apple Inc. as an interested party in United States v. Feng. All documents must be filed on both dockets.

)

Compare the identifying characteristics of the iPhone 5s in the March 7, 2016 Application (Exhibit A) with the identifying characteristics of the iPhone “ 5 ” which was the target of the Government’s Oct 8, 2015 Application. I’m seeing the same “DEA Exhibit N-67” and the same “IMSI number 310260572923753”, and the same “telephone number (908) 463-3333”. The difference is just that “ 5 ” is not “ 5s ”.

DannyB (profile) says:

Consider this possibility

Maybe the FBI did NOT manage to crack the iOS 9 device. Maybe they just said they did to make that PR disaster, and a possible ‘bad’ precedent go away.

Maybe the FBI really does need help with cracking any other phone than this one that was supposedly cracked using secret methods, and the results of which we will never hear about again — other than the FBI saying: make this case go away, thanks for playing.

Whatever (profile) says:

The questions are perhaps easier to answer if you aren’t looking for a conspiracy in every action.

The IOS9 phone that was accessed is an older phone. The version of IOS that it was on happened to be vunerable to a certain type of attack (some have reported it to be a chip replication trick, others say they used a straight security hole).

The IOS7 phone may be on a version that is not vulnerable to the security hole used to access the other, or may be using a longer password for encoding or similar. We don’t know.

The biggest question is now that you raised 20k to cover a story that is already over, how are you going to spend the money?

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...