Government Not Obliged to Disclose iPhone Crack Method

IPhone 5c yellow

Apple’s legal battle against the government ended abruptly yesterday when the FBI gained access to the iPhone 5c used by one of the San Bernardino shooters. As a result, neither Apple’s assistance nor GovtOS are now required. At this point it is unknown whether the crack was done by Cellebrite, but earlier reports pointed to the Israeli firm as the FBI’s mobile forensic partner.

Following the court filing that essentially ended the legal battle between the iPhone maker and the FBI, Apple issued a statement (via The Verge):

From the beginning, we objected to the FBI’s demand that Apple build a backdoor into the iPhone because we believed it was wrong and would set a dangerous precedent. As a result of the government’s dismissal, neither of these occurred. This case should never have been brought.
We will continue to help law enforcement with their investigations, as we have done all along, and we will continue to increase the security of our products as the threats and attacks on our data become more frequent and more sophisticated.
Apple believes deeply that people in the United States and around the world deserve data protection, security and privacy. Sacrificing one for the other only puts people and countries at greater risk.
This case raised issues which deserve a national conversation about our civil liberties, and our collective security and privacy. Apple remains committed to participating in that discussion.

Since the FBI was able to crack open the iPhone, this means there is a flaw a forensic expert was able to exploit, so the next question would be, whether the government would disclose the method used to access the locked device.

An anonymous law enforcement official told Ars Technica that the US government would not comment on the matter.

“We cannot comment on the possibility of future disclosures to Apple,” the law enforcement official said in response to a question from Ars. Just a week ago, Apple told reporters in a conference call that it would insist in court on knowing everything about the vulnerability.

The official’s remarks counterbalance a statement from the White House Cybersecurity Coordinator Michael Daniel, who said in 2014 that, in limited circumstances, authorities would disclose vulnerabilities. This is known as the Vulnerabilities Equities Process.

When asked whether Apple has the legal right to know the method, Ahmed Ghappour, a UC Hastings College of the Law professor, told Ars: “I’m not aware of any legal obligation to reveal that information to Apple. I can’t think of one,” he added.

Overall, this could be an important test for the government’s disclosure policy. What do you think? Will the government disclose the flaw to Apple?

Image credit: Macworld

Technology enthusiast, rocker, biker and writer of iPhoneinCanada.ca. Follow me on Twitter or contact me via email: istvan@iphoneincanada.ca

  • KIII

    Just their attempt to hold power where they more than likely have none.There’s all this talk of how they “were able” to do it but

    is there any proof that they did?

  • Kael

    I very much doubt that they unlocked the phone that fast. If they did, they found nothing of worth on the phone. It just PR.

  • aaloo

    man, its common knowledge how they got access. Snowden said it. They brought it up at the senate hearing. its works on iPhones without the secure enclave.
    1. copy hard drive.
    2. attempt 10 passcode unlocks.
    3. flash the original copied version back onto the phone to reset the passcode attempt counter.
    4. repeat another 10 passcode attempts. and so on.

  • speedracer99

    Who is to say Apple was not the “3rd party”. Just a disguise to not shame them in public for giving in and unlocking the phone?

  • I’m much more interested in what they found, or more specifically if they found anything of value to the case.