Did The DOJ Lie At The Beginning Of Its iPhone Fight, Or Did It Lie This Week?

from the gallantly-the-DOJ-chickened-out dept

Support our crowdfunding campaign to help us keep making content like this!

So now that there’s been a little time to process the Justice Department’s last minute decision to bail out on the hearing in the San Bernardino case, claiming it was because some mysterious third party had demonstrated a way to hack into Syed Farook’s iPhone, it’s becoming increasingly clear that (1) the DOJ almost certainly lied at some point in this case and (2) this move was almost entirely about running away from a public relations battle that it was almost certainly losing (while also recognizing that it had a half-decent chance of also losing the court case). Just replace “Sir Robin” with “the DOJ” in the following video.

That said, there are still some things to clear up. First, did the DOJ lie? It seems pretty obvious that it must have. After all, it insisted earlier in the case, multiple times, that it had “exhausted” all other possibilities and “the only” way to get into the phone was with Apple’s help. That’s certainly raised some eyebrows:

The DOJ and its supporters, of course, will argue that “new shit has come to light, man,” but that seems… doubtful. My first thought was that when the FBI said that it had been alerted to a way in over the weekend, it potentially was using the announcement from researchers at Johns Hopkins about a flaw in iMessage encryption. If so, that would be particularly bogus, since everyone admits that the vulnerability found would not apply to this case.

However, there’s now a ton of speculation going around about the likely method (and the likely third party) that the FBI is probably using, involving copying the storage off the chip and then copying it back to brute force the passcode without setting off the security features or deleting the data. But, again, this possible solution isn’t really new. Just a few weeks ago, during a Congressional hearing, Rep. Darrell Issa quizzed FBI Director James Comey about this very technique (which was so deep in the technical weeds, that many reporters and other policy folks were left scratching their heads):

That video is worth watching, because Director Comey insists, pretty clearly, that there is no way to get into the phone:

Comey: We wouldn’t be litigating it if we could [get in ourselves]. We’ve engaged all parts of the US government to see ‘does anyone have a way — short of asking Apple to do it — with a 5c running iOS 9 to do this?’ and we do not.

At that point Issa starts asking really technical questions about can’t the FBI remove the data from the phone to make copies of the storage, putting it with the encryption chip, trying passcodes, and then reflashing the memory before the 10 chance are used up — thus brute forcing the passcode without setting off the security features. As Issa notes:

If you haven’t asked that question, how can you come before this committee and before a federal judge and demand that somebody else invent something if you can’t answer the question that your people have tried this? … I’m asking who did you go to? Have you asked these questions? Because you’re expecting to get an order and have somebody obey something they don’t want to do and you haven’t even figured out if you can do it yourself.

Comey is clearly befuddled by the questions and basically says that he’s sure that his people must have thought about this, but he assumes that they’re watching and if they haven’t thought of this then they’ll test it out. But, really, a few people had suggested similar things early on, so if that is the solution then it only adds weight to the idea that the FBI didn’t do everything it could possibly do before running to the judge.

Others have questioned the “two week” timeframe for the DOJ to issue a status report to the court, noting that a brand new solution would almost certainly take much longer to test thoroughly before using it on the iPhone in question.

And then there’s the other question: if the FBI really has tracked down a new “vulnerability” in Apple’s encryption… will it tell Apple about it so that Apple can patch it? Remember, the White House has told the various parts of the federal government that they should have a “bias” towards revealing the flaws so they can be patched… but leaving a “broad exception for ‘a clear national security or law enforcement need.'” It’s pretty clear from how the DOJ has acted that it believes this kind of hole is a “law enforcement need.”

So, if the FBI really did figure out a vulnerability in Apple’s encryption, it probably won’t actually reveal it — but I’d imagine that Apple’s security engineers are scrambling just the same to see if they can patch whatever flaws there may be here, because that’s their job. And, again, that gets back to the point here: there are always some vulnerabilities in encryption schemes, and part of the job of security folks is to keep patching them. And one of the worries with the demand for backdoors is that the introduce a whole bunch of vulnerabilities that they’re then not allowed to patch.

Either way, the DOJ’s actions here are highly questionable, and it seems pretty clearly an attempt to save face in this round. But the overall fight is far from over.

Support our crowdfunding campaign to help us keep making content like this!

Filed Under: , , , , ,
Companies: apple

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Did The DOJ Lie At The Beginning Of Its iPhone Fight, Or Did It Lie This Week?”

Subscribe: RSS Leave a comment
48 Comments
DannyB (profile) says:

Re: When did FBI Lie?

The question Mike asks suggests the answers are mutually exclusive. Which of the two is a lie? But both could be a lie.

1. The FBI did NOT exhaust all possible avenues. FBI might really have tried noting at all. They never really wanted to get into this particular phone. What FBI really wanted was unhindered access to any phone, any time, any where, and unsupervised. It thought if it just asked, it could get what it wanted. Relatively quietly.

2. The FBI does NOT presently have any actual plan for how it might recover secret information from the phone. This lie is merely a ploy to get this case closed and the public relations battle over.

What I would suggest a judge do to verify number 2 is have a court appointed observer witness whatever steps the FBI does. Do they make a genuine attempt? Is the theory of how the attack would work real? This would help prevent the FBI from destroying this phone, which would be another way they could manage to wiggle out of their lies.

Why do you think they are called the FIB?

Anonymous Coward says:

Re: Re:

In theory, all encryption except a one time pad is breakable by trying all possible keys. In practice the best modern encryption is effectively immune to that attack, but there may be some other exploitable weakness in the system, like a short pin to enable use of a strong key without needing to know the key. That is protecting the keys can be a weak point in any strong encryption system

Anonymous Coward says:

Re: Re: Re:

Yes, this shows the difference between theory and practice.

In practice, many one time pads are breakable because the pad was not randomly generated. Often a OTP has its own predictable characteristics that, if you’ve got data at rest, can be tested for infinite iterations until a theory proves true. This is especially true if you are able to run some of your own input through the OTP to test for predictable elements.

DannyB (profile) says:

Re: Re:

Fun with One Time Pads.

The FBI could produce a pad that makes encrypted data say whatever it wants it to say.

Then plant that manufactured pad onto the party you wish to prosecute.

Of course, I’m probably giving them ideas for their next manufactured “look we stopped a terrorist plot!” PR booster.

But is that previous sentence any more offensive than the suggestion that Apple chooses to build secure systems strictly for marketing reasons while innocent people get killed?

Anonymous Coward says:

Latest rumors

However, there’s now a ton of speculation going around about the likely method (and the likely third party) that the FBI is probably using…

• “Israeli firm helping FBI to open encrypted iPhone: report”, Reuters, Mar 23, 2016

Israel’s Cellebrite, a provider of mobile forensic software, is helping the U.S. Federal Bureau of Investigation’s attempt to unlock an iPhone used by one of the San Bernardino, California shooters, the Yedioth Ahronoth newspaper reported on Wednesday.

• “Report: Israeli company helping FBI crack iPhone security”, by Sagi Cohen, Ynetnews, Mar 23, 2016

   — About Ynetnews:

Ynetnews is the English-language edition of Ynet, Israel’s largest and most popular news and content website.

Founded in 2005, Ynetnews is part of the prominent Yedioth Media Group, which publishes Yedioth Ahronoth – Israel’s most widely-read daily newspaper – as well as several popular magazines and dozens of local publications. . . .

Anonymous Coward says:

Re: Latest rumors

… speculation going around about the likely method…

Government keeping its method to crack San Bernardino iPhone ‘classified’ ”, by Danny Yadron, The Guardian, Mar 22, 2016

A new method to crack open locked iPhones is so promising that US government officials have classified it, the Guardian has learned. . . 

That One Guy (profile) says:

Re: Re: Latest rumors

A new method to crack open locked iPhones is so promising that US government officials have classified it, the Guardian has learned. . .

Which certainly answers the following:

And then there’s the other question: if the FBI really has tracked down a new “vulnerability” in Apple’s encryption… will it tell Apple about it so that Apple can patch it? Remember, the White House has told the various parts of the federal government that they should have a “bias” towards revealing the flaws so they can be patched… but leaving a “broad exception for ‘a clear national security or law enforcement need.'” It’s pretty clear from how the DOJ has acted that it believes this kind of hole is a “law enforcement need.”

If they really believe that the security hole is that valuable, valuable enough to classify, there is no chance whatsoever that they will tell Apple about it so that it can be fixed. Once again you get a situation where a government agency is acting contrary to the best interests of everyone else so that they can continue to benefit.

And they wonder why the tech industry doesn’t trust them…

Anonymous Coward says:

Re: Re: Re: Latest rumors

… there is no chance whatsoever that they will tell Apple about it…

Meet Cellebrite, the Israeli Company Reportedly Cracking iPhones for the FBI”, by Joseph Cox (Contributor), Motherboard, Mar 23, 2016

“Apple has a weird relationship with this company, because there are Cellebrite devices in every Apple store,” [ACLU technologist Christopher] Soghoian added. This is because devices are used to take data from customers Androids phones, and easily transfer contacts and other info over to newly purchased iOS ones.

(Embedded link omitted.)

And a story from last month: “Cellebrite: What You Need to Know About Cell Phone Forensics”, by Jason Hernandez, North Star Post, Feb 23, 2016

Cellebrite has a key edge in attacking the security of smartphones–its relationships as the “exclusive provider of mobile synchronization systems for Verizon Wireless, AT&T, Sprint/Nextel, T-Mobile” and others that allow them to obtain “pre-production handsets and source codes from the cell phone manufacturers six months prior to retail launch which is a major advantage for research and development.” See here, courtesy of Lucy Parsons Labs.

   — Direct link to referenced PDF: See p.14 in that PDF, para. 4 of document on CelleBrite letterhead, dated Dec 9, 2011, “Attention: Maurice Cernik”, signed “Jason Rogers, VP of Sales”.

Anonymous Coward says:

Re: Re: Re:3 Latest rumors

… about Cellebrite, it’s worth noting that some are reporting this rumor is false

FBI’s Comey, officials discount two iPhone hack theories”, by Elizabeth Weise and Kevin Johnson, USA TODAY, Mar 24, 2016

[L]aw enforcement officials speaking on background debunked another report that had named Israeli forensics firm Cellibrate as the mystery firm helping it break into the phone.

Hmmm… when proofreading after excerpting noticed the ‘i’. Presumably “Cellibrate” is a mere typo?

Anonymous Coward says:

Re: Re: Re:4 Latest rumors

Presumably “Cellibrate” is a mere typo?

Just rechecked the USA Today story and it looks like they fixed the typo. The story, now marked “7:06 p.m. EDT March 24, 2016”, currently reads:

Law enforcement officials speaking on background debunked another report that had named Israeli forensics firm Cellebrite as the mystery firm helping it break into the phone.

Anonymous Coward says:

Re: Re: Re: Disclosure policy [was Latest rumors]

… there is no chance whatsoever that they will tell Apple about it so that it can be fixed

Discovering and disclosing the FBI’s newfound iPhone hack”, by Greg Otto, FedScoop, Mar 23, 2016

Rep. Ted Lieu, D-Calif., one of only a handful of lawmakers with a background in computer science, told FedScoop the government shouldn’t be compelled to reveal the vulnerabilities any more than “the FBI should be able to compel private citizens and private sector companies to create new software and do things that don’t exist.”

“I would like the FBI to do that [tell Apple], but I don’t think we would be able to compel them to do that,” Lieu told FedScoop.

 . . .

Sen. Ron Wyden, D-Ore., told FedScoop he considers a vulnerability stockpile “particularly important,” but only for use in national security situations.

“The administration has said that knowledge about computer vulnerabilities will sometimes be temporarily kept secret under a process that is biased toward responsibly disclosing the vulnerability,” Wyden told FedScoop.

“Furthermore, it is important for the executive branch to share information about these decisions not only with members of Congress but also with specialized staff who possess appropriate legal and technical expertise so that Congress can ensure that this policy is being adhered to,” Wyden said.

Anonymous Coward says:

Re: Latest rumors

Ynetnews is the English-language edition of Ynet

Israeli Firm Reportedly Helping FBI Crack San Bernardino Phone (Updated)”, by Dawn Chmielewski, re/code, Mar 23, 2016

An Israeli mobile forensics firm that touts its “breakthrough ability to unlock Apple devices” is helping the FBI crack into the San Bernardino phone, according to a report in an Israeli newspaper that cites anonymous sources. . . .

Google Translate (for link embedded in blockquote): “An Israeli company helped the FBI crack the iPhone”, by Sagi Cohen, Ynet, Mar 23, 2016

The FBI uses the services of the company Slbriit Petah Tikvah an attempt to break the terrorist’s locked iPhone San Bernardino. Industry sources estimate familiar with the matter.

Anonymous Coward says:

Re: Latest rumors

Via David Kravets at Ars Technica (“Israeli mobile forensics firm helping FBI unlock seized iPhone, report says”, Mar 23, 2016), who credits a Jonathan Zdziarski email to Ars

San Bernardino iPhone Data Recovery Statement”, DriveSavers, March 22, 2016

… We feel very positive about one method in particular…

• The first tool allows us to remove and read chips from the iPhone 5c.

• The second tool, which we’ve customized, allows us to alter the password count and continue to reset it to zero . . .

For those skimming, note well that DriveSavers is not Cellebrite.

Anonymous Coward says:

Re: Re: DriveSavers method [was Latest rumors]

We feel very positive about one method in particular

During today’s news conference, Director Comey appears to discuss this general approach during the 28:10 – 29:15 segment. At about 28:44, Director Comey says, “It doesn’t work”. He then evades the question whether the FBI tried it? “I don’t want to say beyond that, but… ”

Anonymous Coward says:

Re: Re: Re: DriveSavers method [was Latest rumors]

The FBI is cautiously testing a way to get into the San Bernardino iPhone”, by Ellen Nakashima and Elizabeth Dwoskin, Washington Post Mar 24, 2016 (marked 7:55 PM)

One idea being passed around the security community was a technique that requires removing the phone’s chip . . .

The bureau was aware of this method early on and concluded that it wouldn’t work, for technical reasons, said an official familiar with the process. Technicians were concerned, for instance, that removing the memory chip, which is glued to the circuit board, would be difficult to do without damaging the data.

(    Note Kim Zetter tweet (12:44 PM – 25 Mar 2016):

WaPo altered its Apple/FBI story and removed mention that method FBI is using to hack phone is a “code-based” attack

)

Anonymous Coward says:

Re: Latest rumors

It Might Cost The FBI Just $1,500 To Get Into Terrorist’s iPhone”, by Thomas Fox-Brewster, Forbes, Mar 23, 2016

[I]t can cost as little as $1,500 to have Cellebrite acquire passcodes for Apple phones, FORBES understands.

Israel’s Cellebrite linked to FBI’s iPhone hack attempt”, by Leo Kelion, BBC, Mar 23, 2016

Cellebrite has taken numerous calls from the media asking if it is indeed the unidentified helper.

A Twitter user noted the firm signed a fresh $15,000 (£10,600) contract with the FBI two days ago – albeit in Chicago rather than California.

A spokesman for Cellebrite said it might have more to say at a later point.

SteveMB (profile) says:

My first thought was that when the FBI said that it had been alerted to a way in over the weekend, it potentially was using the announcement from researchers at Johns Hopkins about a flaw in iMessage encryption. If so, that would be particularly bogus, since everyone admits that the vulnerability found would not apply to this case.

It still provides them with a smokescreen to cover their retreat — most people are only going to remember “somebody found a flaw in iPhone security and then the FBI said they don’t need Apple to unlock the phone”.

Anonymous Coward says:

Director Comey's response to WSJ editorial

Yesterday, March 22, the Wall Street Journal published an opinion piece, “The Encryption Meltdown”.

Today, in letters, the Wall Street Journal published FBI Director James Comey’s response, “The FBI Is Trying to Crack the San Bernardino Case, Not Set a Precedent”:

You are simply wrong to assert that the FBI and the Justice Department lied about our ability to access the San Bernardino killer’s phone.

Regarding your editorial “The Encryption Meltdown; The FBI now says its Apple assault might not even be necessary” (March 22): You are simply wrong to assert that the FBI and the Justice Department lied about our ability to access the San Bernardino killer’s phone. I would have thought that you, as advocates of market forces, would realize the impact of the San Bernardino litigation. It stimulated creative people around the world to see what they might be able to do. And I’m not embarrassed to admit that all technical creativity does not reside in government. Lots of folks came to us with ideas. It looks like one of those ideas may work and that is a very good thing, because the San Bernardino case was not about trying to send a message or set a precedent; it was and is about fully investigating a terrorist attack.

James B. Comey
Director
Federal Bureau of Investigation
Washington

[ Note: I’m reproducing Director Comey’s letter here in full. 17 USC § 101: A “work of the United States Government” is a work prepared by an officer or employee of the United States Government as part of that person’s official duties. Further, even if Director Comey’s inclusion of his official title was intended purely for identification purposes, due to the public controversy and other factors, I would nevertheless assert fair use in copying this short letter here in full. ]

JMT says:

Re: Director Comey's response to WSJ editorial

Offers up a believable explanation (“It stimulated creative people around the world to see what they might be able to do.”) and follows up straight away with an outright lie (“…the San Bernardino case was not about trying to send a message or set a precedent; it was and is about fully investigating a terrorist attack.”) that basically everyone but the FBI admits is false.

That One Guy (profile) says:

Re: Director Comey's response to WSJ editorial

It stimulated creative people around the world to see what they might be able to do. And I’m not embarrassed to admit that all technical creativity does not reside in government. Lots of folks came to us with ideas.

Funny how he only pays attention to that ‘technical creativity’ now that it allows him to duck out of a case that backfired, instead of when numerous ‘creative people’ told him that what he was ‘asking’ for would create a notable risk to security.

Anonymous Coward says:

Re: AG and FBI Dir News Conference [was Director Comey's response to WSJ editorial]

Today, Mar 24, 2016, Attorney General Loretta Lynch, FBI Director James Comey, and others held a news conference, carried on C-SPAN. While the main topic of this news conference concerned another cybersecurity incident, during questions, AG Lynch and Director Comey provided responses to regarding the San Bernardino iPhone 5c, and the litigation with Apple.

Approximate timemarks:
  • 24:05 – 27:05
  • 28:10 – 29:15
  • 32:30 – 33:50

Director Comey, among other statements, repeated the substance of yesterday’s letter to the Wall Street Journal, and during the 32:30 – 33:50 segment spoke directly about his letter.

Anonymous Coward says:

Re: Director Comey's response to WSJ editorial

Yesterday, March 22, the Wall Street Journal published an opinion piece, “The Encryption Meltdown”.

This ten-paragraph Wall Street Journal opinion piece also seems to have been syndicated by Associated Press, in “Editorial Roundup: Excerpts from recent editorials” (Mar 23, 2016).

In that roundup, scroll down to, or search for, the item marked:

March 22
The Wall Street Journal on the FBI and Apple encryption

Aside from inconsequential differences, the AP copy appears to be the same as the WSJ editorial.

Anonymous Coward says:

It will be interesting to see if apple black-balls Cellebrite out of existance. most likely they will buy them take the talent and fire all the executives making political decisions like this one. apple has a history of valuing secrecy i bet it just got a lot harder to get any info out of apple if you are an oem making things for apple products.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...