Tag: iphone security

U.S. government isn’t done appealing New York mobile security case against Apple

The method used for unlocking the iPhone of the San Bernardino shooter won’t work on other models.

The U.S. Justice Department recently announced that it will not cease its efforts to appeal a court ruling in the mobile security case it filed against Apple in New York, in which it wishes to force the tech giant to unlock an iPhone that was used in a drug case.

The Justice Department filed a letter in a Brooklyn, New York federal court in order to continue the appeal.

Within the letter, it stated that “the government continues to require Apple’s assistance in accessing the data that it is authorized to search by warrant.” That letter was actually filed only one day after Director James Comey of the Federal Bureau of Investigation (FBI) announced that the agency had obtained a mobile security breaking method that would make it possible for the FBI to unlock the iPhone 5c that had been used by one of the San Bernardino shooters, but it would not work on other device models such as the iPhone 5s that was involved in the New York drug case.

While Apple has stated that it could break through the mobile security of its smartphones, it has refused.

iPhone 5s - Mobile SecurityApple has stated that it would be able to develop the code required to unlock the smartphone in the New York case, but it has been fighting the demand put forward by the government which would require it to do so. So far, Apple has been able to keep up its defense. On February 29, a U.S. Magistrate Judge, James Orenstein, ruled that he did not have the authority to force Apple to disable the iPhone 5s security features for the purposes of the drug probe.

The Justice Department’s letter pointed out that the application for appeal “is not moot,” as the iPhone 5s cannot be unlocked using the same technique that was used on the iPhone 5c. In this case, the mobile device belonging to Jun Feng – who has pleaded guilty to taking part in a meth ring conspiracy – and the government was hoping to be able to unlock the smartphone in order to identify other people who were involved in this methamphetamine distribution conspiracy.

Feng’s mobile device has an older operating system than the iOS 7 installed on Rizwan Farook of San Bernardino’s iPhone. This means that their mobile security encryption technology is different and the strategies to unlock them are not the same. Apple will be filing its papers in opposition to the appeal on April 15.

Mobile security and privacy of Apple iPhone called into question

Researchers have discovered that a great deal of data held by these smartphones can be extracted from them.

According to a recent mobile security acknowledgement from Apple, it is possible for its employees to be able to use previously unpublicized techniques in order to be able to extract data from consumer iPhones, such as contact lists, photos, and other types of personal data such as text messages.

The equivalent techniques could also be applied by law enforcement to work around backup encryption.

This same mobile security sidestepping technique could be applied by others who have “trusted” forms of computers to which the iPhones have been connected. This according to an expert in privacy and security who brought about the admission from the tech giant. Last week, at a presentation that took place in a conference, Jonathan Zdziarski, a researcher, demonstrated how the services were capable of accessing considerable quantities of data by way of diagnostic services that Apple has said are meant for use by engineers.

The researcher said that iPhone users are not told when this mobile security and private data access is occurring.

Apple - Mobile SecurityZdziarski also stated that there is no way for users to disable the services or prevent them from running. This means that there is no way for the user of an iPhone to know which computers have already been labeled as a trusted device by way of the backup process and these users cannot choose to stop future connections. He stated that “There’s no way to `unpair’ except to wipe your phone.” He then went about demonstrating that he was capable of extracting private data from a locked phone through the use of a computer with trusted status.

Although some have stated that they feel that this is evidence that the National Security Agency and Apple are collaborating with each other, Apple has denied all claims that they have constructed any type of “back doors” to their mobile security be used by intelligence agencies. A statement from the company said that “We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues.”