toggle

AAPL Stock: 102.5 ( + 0.25 )

Printed from http://www.macnn.com

Apple maintaining waiting list for police iPhone decryption requests

updated 01:55 pm EDT, Fri May 10, 2013

Agencies stymied by locked-down operating system

Apple is receiving so many requests from police agencies looking to decrypt seized iPhones that the company has started a waiting list, CNET reports. In an example exposed by court documents, the ATF is said to have wanted to break through the encryption of an iPhone 4S owned by a Kentucky man accused of distributing crack cocaine. The agency "contacted Apple to obtain assistance in unlocking the device," according to US District Judge Karen Caldwell, but was "placed on a waiting list by the company."

A search warrant affidavit organized by ATF agent Rob Maynard elaborates that for almost three months last summer he "attempted to locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock" a 4S, without success. Turning to Apple, Maynard says that Apple legal specialist Joann Chang told them there would be a minimum seven-week delay. In the end Maynard waited at least four months.

Chang is said to have explained Apple's data-dumping process, pointing out that "once the Apple analyst bypasses the passcode, the data will be downloaded onto a USB external drive" for delivery to the ATF. It's unknown how Apple is breaking through iPhone encryption; while the company may simply be better at it than government agencies, it could also have faster decryption hardware, or even a secret backdoor that lets it bypass encryption entirely.

The amount of time it takes to brute force an iPhone's PIN varies. That can be as little as 20 to 40 minutes for a four-digit number, but a six-digit passcode stretches the maximum to 22 hours. A nine-digit PIN can require up to two and a half years, and 10 digits can take as much as 25 years.

The DEA has also complained about being unable to access content on Apple devices. Specifically the agency says it has had trouble accessing iMessage exchanges, since those exchanges are likewise encrypted.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. Flying Meat

    Dedicated MacNNer

    Joined: 01-25-07

    I don't really have much sympathy at this point. Sorta glad there is a waiting list, though the implications of that fact alone are significant. Speedy trial? Exoneration prior to your data being added to some gigantic database of potentially nefarious use?

    But the lack of sympathy is primarily related to the lopsided nature of the current legal system when it comes to crimes by corporations vs. crimes by individuals, and crimes by wealthy whites vs. crimes by the other.

  1. SierraDragon

    Mac Elite

    Joined: 03-22-04

    It is simple. Apple, LEOs or anyone else should not be decrypting phones except pursuant to judicial warrants or requests from registered owners.

    It needs to be a crime for LEOs to even ask.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

MacNN Sponsor

Recent Reviews

Life n Soul BM211 Bluetooth speaker

Bluetooth speakers aren't only for listening to some music at the park or on a long bus ride, but can also be built with tablets in m ...

Epson PowerLite Home Cinema 2030 projector

With high-definition televisions now the standard, 4K televisions becoming the next big thing, and plasma TVs going the way of the din ...

Life n Soul 8 Driver Bluetooth headphones

When it comes to music on the go, consumers generally have some options to consider when looking for the best experience. While Blueto ...

toggle

Most Commented