toggle

AAPL Stock: 116.47 ( + 0.16 )

Printed from http://www.macnn.com

Apple maintaining waiting list for police iPhone decryption requests

updated 01:55 pm EDT, Fri May 10, 2013

Agencies stymied by locked-down operating system

Apple is receiving so many requests from police agencies looking to decrypt seized iPhones that the company has started a waiting list, CNET reports. In an example exposed by court documents, the ATF is said to have wanted to break through the encryption of an iPhone 4S owned by a Kentucky man accused of distributing crack cocaine. The agency "contacted Apple to obtain assistance in unlocking the device," according to US District Judge Karen Caldwell, but was "placed on a waiting list by the company."

A search warrant affidavit organized by ATF agent Rob Maynard elaborates that for almost three months last summer he "attempted to locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock" a 4S, without success. Turning to Apple, Maynard says that Apple legal specialist Joann Chang told them there would be a minimum seven-week delay. In the end Maynard waited at least four months.

Chang is said to have explained Apple's data-dumping process, pointing out that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" for delivery to the ATF. It's unknown how Apple is breaking through iPhone encryption; while the company may simply be better at it than government agencies, it could also have faster decryption hardware, or even a secret backdoor that lets it bypass encryption entirely.

The amount of time it takes to brute force an iPhone's PIN varies. That can be as little as 20 to 40 minutes for a four-digit number, but a six-digit passcode stretches the maximum to 22 hours. A nine-digit PIN can require up to two and a half years, and 10 digits can take as much as 25 years.

The DEA has also complained about being unable to access content on Apple devices. Specifically the agency says it has had trouble accessing iMessage exchanges, since those exchanges are likewise encrypted.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. Flying Meat

    Dedicated MacNNer

    Joined: 01-25-07

    I don't really have much sympathy at this point. Sorta glad there is a waiting list, though the implications of that fact alone are significant. Speedy trial? Exoneration prior to your data being added to some gigantic database of potentially nefarious use?

    But the lack of sympathy is primarily related to the lopsided nature of the current legal system when it comes to crimes by corporations vs. crimes by individuals, and crimes by wealthy whites vs. crimes by the other.

  1. SierraDragon

    Mac Elite

    Joined: 03-22-04

    It is simple. Apple, LEOs or anyone else should not be decrypting phones except pursuant to judicial warrants or requests from registered owners.

    It needs to be a crime for LEOs to even ask.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

MacNN Sponsor

Recent Reviews

Plantronics BackBeat Pro Bluetooth headphones

Looking for a pair of headphones that can do everything a user requires is a task that can take some study. Trying to decide on in-ear ...

MaxUpgrades 512GB Retina MacBook Pro SSD

Apple's Retina line of MacBook Pro notebooks have been impressive, right from their debut in 2012. Thinner than the previous model, t ...

Lemur BlueDriver

"Oh no, the check engine light is on…again! What one of the hundreds of reasons could it be this time? Probably going to cost a for ...

toggle

Most Commented