It turns out there was nothing substantial on the San Bernardino iPhone all along

A

Alkajak

Thread author
The Justice Department and Apple spent much of the past few months in a bitter legal battle over whether Apple should help the FBI access data on a phone used by Syed Farook, one of the San Bernardino shooters.

Now that the FBI's cracked the phone — without Apple's help — one thing is becoming clear: there wasn't much useful information on it.

CBS News reports, citing a law enforcement source, says that "so far nothing of real significance has been found" on Farook's iPhone. The investigation is ongoing, according to the source.

This matches up with remarks made by the San Bernardino police chief in February, when he saidthat there is a "reasonably good chance there is nothing of any value on the phone."

In the FBI's defense, director James Comey and his subordinates have never claimed that there were case-breaking secrets on Farook's work-issued iPhone that he used to take photos during his day job conducting school cafeteria inspections.

Instead, Comey wrote that law enforcement owes the victims a "thorough and professional investigation under law" and that the FBI was just trying to collect all available information, and couldn't leave any stone unturned.

Throughout the case, the FBI maintained that its legal action was about one phone, whereas Apple argued that the government was trying to set a precedent.

On March 28, the FBI dropped its court order because it said it has managed to unlock Farook's iPhone without Apple's help.

The FBI has said that it hasn't decided whether it will share the details of the hack that it used to crack Farook's iPhone 5C. Apple attorneys have said that they won't sue to get that information, either, and that they are not even sure whether the FBI's crack works, considering they know nothing about it.

A lot of speculation has centered around how the FBI eventually cracked Farook's iPhone. Earlier this week, the Washington Post reported that the government paid a security researcher for a previously undiscovered exploit, or flaw that the FBI used to gain access to the encrypted data on the device. Security firms have paid at least $1 million for a confirmed "zero-day" iPhone exploit in the past.
 

DJ Panda

Level 30
Verified
Top Poster
Well-known
Aug 30, 2015
1,928
I kind of find it funny. All the arguing on needing Apple to hack when there was nothing and at the same time people so concerned on their privacy. If you got nothing to hide you shouldn't be worried. I'm no criminal. Want to check my phone for anything malicous, FBI? Check away! :p
 

Axelrod Sven

Level 3
Verified
Well-known
Feb 11, 2016
132
Yet I get the feeling you'd scream for your lawyer, and tell him to bring his lawyer as well, if Law Enforcement really asked. :p

On a lighter note, it's somewhat interesting that they found nothing on the iPhone. One would have thought they'd find something of relevance...
 
  • Like
Reactions: Der.Reisende
D

Deleted member 178

Thread author
All the drama was just a cover up to forcing Apple (and later, the other vendors ) to add backdoors.
 
  • Like
Reactions: Alkajak

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Honestly this issue is more on the privacy issue rather than the San Bernandino IPhone itself; huge conflict between FBI and Apple. I'm not surprise to FBI on their actions so no need to complain and whining at all for any person who are undergone on inspection.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top