POLICE Magazine

OCT 2018

Magazine for police and law enforcement

Issue link: https://policemag.epubxp.com/i/1037204

Contents of this Issue

Navigation

Page 73 of 80

you to type in 10 consecutively wrong passcodes before bricking the phone. Lightning Por t E xploit at expert in Israel that the FBI hired to break into Farook's phone found a way around that problem. So has the Is- raeli digital forensic company Cellebrite and a new American company called Grayshi . Cellebrite users can send an Apple device to the company, and they will open it and pull o€ the data. Grayshi 's GrayKey is a subscription service that gives digital forensic analysts at the agency the tools they need to do the job themselves. One of those tools is a small box with two Lightning cables that can be plugged into the device's I N V E S T IG AT I V E T E C H NO L O G I E S | SP E C I A L R E P O RT | 13 ILLUSTRATION: GETTY IMAGES Lightning port (the charging and data transfer port). Unfortunately, for investigators need- ing access to iPhone data, Apple is clos- ing o€ this exploit. An upcoming ver- sion of the Apple iOS will disable the Lightning port one hour a er the user locks the phone. Forensic technology companies say they will still be able to access the data on the phones. A pple Classes Apple says it is not making these moves to foil law enforcement. e company argues that if a forensic examiner can Šnd an exploit to break into a device, so can a hacker, and its primary mis- sion is protecting the information of its customers. To be fair to Apple, even in the ter- ror phone case, it did assist the FBI in its investigation. For example, the compa- ny provided the FBI with information from Farook's iCloud account. e FBI wanted the company to create a tool for breaking into iPhones, however, and it refused to do that. Apple remains adamant about not breaking its own encryption, which it says would increase the vulnerability of its customers to hacking attacks. But the company is aware that its battle with the FBI and subsequent refusal to help other agencies gain access to phones is leaving it with potential public relations and legal problems and the possibility of the federal government insisting on a backdoor for accessing all data on iOS devices under warrant. As this article was being written, Ap- ple announced that it would streamline procedures for investigators to lawfully gain access to data on customers iCloud accounts. In addition, the company is planning to provide training to teach investigators how to properly submit warrants for information from iCloud accounts, what to expect, and how to analyze that data. Apple says it responds to warrants for iCloud information 24 hours a day, seven days a week. All of this may not be enough for agencies and governments that want access to all the data on an iOS device if requested legally. And Apple and oth- er mobile device makers could face in- creasing pressure to do more. e week before Apple announced its new initia- tive to aid and instruct investigators, a signals intelligence-sharing alliance of the United States, United Kingdom, Canada, Australia, and New Zealand known as the "Five Eyes" called for technology companies to provide law enforcement and intelligence services with lawful access to encrypted data by building backdoors into their so ware. If the companies don't comply, the in- telligence services of the Šve countries pledged to develop tools for defeating device encryption. Even so, it is likely that this investigative roadblock is go- ing to persist. Q

Articles in this issue

Archives of this issue

view archives of POLICE Magazine - OCT 2018