AAPL Stock: 112.76 ( -0.53 )

Printed from

Apple maintaining waiting list for police iPhone decryption requests

updated 01:55 pm EDT, Fri May 10, 2013

Agencies stymied by locked-down operating system

Apple is receiving so many requests from police agencies looking to decrypt seized iPhones that the company has started a waiting list, CNET reports. In an example exposed by court documents, the ATF is said to have wanted to break through the encryption of an iPhone 4S owned by a Kentucky man accused of distributing crack cocaine. The agency "contacted Apple to obtain assistance in unlocking the device," according to US District Judge Karen Caldwell, but was "placed on a waiting list by the company."

A search warrant affidavit organized by ATF agent Rob Maynard elaborates that for almost three months last summer he "attempted to locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock" a 4S, without success. Turning to Apple, Maynard says that Apple legal specialist Joann Chang told them there would be a minimum seven-week delay. In the end Maynard waited at least four months.

Chang is said to have explained Apple's data-dumping process, pointing out that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" for delivery to the ATF. It's unknown how Apple is breaking through iPhone encryption; while the company may simply be better at it than government agencies, it could also have faster decryption hardware, or even a secret backdoor that lets it bypass encryption entirely.

The amount of time it takes to brute force an iPhone's PIN varies. That can be as little as 20 to 40 minutes for a four-digit number, but a six-digit passcode stretches the maximum to 22 hours. A nine-digit PIN can require up to two and a half years, and 10 digits can take as much as 25 years.

The DEA has also complained about being unable to access content on Apple devices. Specifically the agency says it has had trouble accessing iMessage exchanges, since those exchanges are likewise encrypted.

by MacNN Staff





  1. Flying Meat

    Dedicated MacNNer

    Joined: 01-25-07

    I don't really have much sympathy at this point. Sorta glad there is a waiting list, though the implications of that fact alone are significant. Speedy trial? Exoneration prior to your data being added to some gigantic database of potentially nefarious use?

    But the lack of sympathy is primarily related to the lopsided nature of the current legal system when it comes to crimes by corporations vs. crimes by individuals, and crimes by wealthy whites vs. crimes by the other.

  1. SierraDragon

    Mac Elite

    Joined: 03-22-04

    It is simple. Apple, LEOs or anyone else should not be decrypting phones except pursuant to judicial warrants or requests from registered owners.

    It needs to be a crime for LEOs to even ask.

Login Here

Not a member of the MacNN forums? Register now for free.


Network Headlines

Follow us on Facebook


Most Popular


Recent Reviews

Blue Yeti Studio

Despite being very familiar with Blue Microphones' lower-end products -- we've long recommended the company's Snowball line of mics ...

ZTE Spro 2 Smart Projector

Home theaters are becoming more and more accessible these days, but maybe you've been a bit wary about buying a home projector. And h ...

MSI Geforce GTX 970 100ME

When Nvidia announced a new line of video cards in September 2014, many people thought things would continue to be business as usual i ...


Most Commented