iPhone Cracking: Why FBI Needed Outside Help And What It Means - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Cybersecurity
Commentary
3/24/2016
11:05 AM
Larry Loeb
Larry Loeb
Commentary
50%
50%

iPhone Cracking: Why FBI Needed Outside Help And What It Means

This week, the FBI said it now doesn't need Apple to crack into an iPhone. However, what does this tell us about encryption and the overall state of hardware security?

iPhone Encryption: 5 Ways It's Changed Over Time
iPhone Encryption: 5 Ways It's Changed Over Time
(Click image for larger view and slideshow.)

It was the 12-round, heavyweight title fight that was supposed to be watched around the world -- no Pay-Per-View needed. Then, just before the bell rang, one of the fighters decided to return to the locker room for some more training.

On March 21, hours before Apple, the FBI, and Justice Department prosecutors could meet in federal court to hash out the legal arguments over hacking into a iPhone, the FBI filed papers that claimed it had found an outside party that could crack the government-owned iPhone 5C that was used by Syed Rizwan Farook, one of the two people responsible for the San Bernardino shooting in December.

This meant, essentially, that FBI didn't need Apple to do its work for it.

See you in April.

IBT is reporting that an Israeli forensics firm, Cellebrite, is the company that is helping the FBI bypass Apple in order to crack into Farook's iPhone. The iPhone itself is actually owned by Farook's former employer -- the county of San Bernardino.

(Image: Images_By_Kenny/iStockphoto)

(Image: Images_By_Kenny/iStockphoto)

Cellebrite is "a subsidiary of Japan's Sun Corp, has its revenue split between two businesses: a forensics system used by law enforcement, military and intelligence that retrieves data hidden inside mobile devices and technology for mobile retailers," according to Reuters.

Cellebrite has done this before, it seems, at least according to ABC News. The firm's engineers might even know how to do it without forcing a software fix to be issued by Apple.

The question that lingers is how will Cellebrite's engineers actually go about doing the hack? It's a hardware approach, I think. The kind of hardware hack that security people out there wondered why it had not been tried on the 5C before going to Apple.

Are you prepared for a new world of enterprise mobility? Attend the Wireless & Mobility Track at Interop Las Vegas, May 2-6. Register now!

NAND mirroring, I bet, is the hardware technique that Cellebrite will be using. The technique is detailed by Zdziarski's Blog of Things posting and it seems reasonable.

Zdziarski's description of it makes the thrust of the technique clear:

Most of the tech experts I've heard from believe the same as I do -- that NAND mirroring is likely being used to some degree to brute force the pin on the device. This is where the NAND chip is typically desoldered, dumped into a file (likely by a chip reader/programmer, which is like a cd burner for chips), and then copied so that if the device begins to wipe or delay after five or ten tries, they can just re-write the original image back to the chip.

Now, was that so hard? The feds can access the hardware on that phone. They can desolder it and whatever else the agents need to do.

From an overall OpSec view, as Zdziarski put it: "The weak link in all of this has been Farook and his poor choice of security."

That brings us back to some of the recent "conversations" happening about how encryption and software relate to our society. Many of them ignore the particular facts about this iPhone 5C.

First of all, the government always owned it and can disassemble it however which way it wishes. It seems the FBI didn't realize -- or won't admit that it knew -- there were ways that have been around for a long time to do this sort of thing by mucking with the hardware. It was fortuitous that Japan, Inc. and Cellebrite were able to provide such experts.

Either that, or they were cynically trying to use the tragedy to get a rather nebulous claim ensconced in the courts. But, that discussion is for another day, maybe as soon as April 5.

In the meantime, the chairman of the US Senate Intelligence Committee says a bill to give law enforcement access to encrypted data could come as early as next week. Maybe that had more to do with the FBI's sudden change of plans rather than the technical know-how of Cellebrite. We'll see.

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He has written a book on the Secure Electronic Transaction Internet ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Page 1 / 3   >   >>
GatineauJ611
50%
50%
GatineauJ611,
User Rank: Apprentice
3/24/2016 | 3:11:18 PM
Did the FBI really need Help
I have a hard time believing that the FBI needed help and actually went public with all this...who are they trying to kid

 


philnezz
jastroff
50%
50%
jastroff,
User Rank: Ninja
3/24/2016 | 4:31:23 PM
Re: Did the FBI really need Help
Yes, hard to believe the government could not find the info they wanted without the big dust-up with Apple

 

Does anyone come out ahead on this? Apple has people all over the world eager to break whatever security is has, just for the fun of it, or for money. The Justice department has egg all over its face one way or the other. And in the end, they are going to get the data and break Apple's security. Black eyes all around.
larryloeb
50%
50%
larryloeb,
User Rank: Author
3/24/2016 | 6:05:06 PM
Re: Did the FBI really need Help
The security theatre going on is wide and deep.

The FBI thought it could sneak the all writs action by, because everyone would be distracted by them waving the 5C high,

Ignoring all the tech for a sec; the FBI seems not ready to consider that if that phone was used for terror activities, the issuer of that phone might be liable too. And who owned it? San Bernadino. The FBI going to arrest them too?

 
larryloeb
50%
50%
larryloeb,
User Rank: Author
3/24/2016 | 6:09:06 PM
Re: Did the FBI really need Help
@jastroff

Apple is starting to get its stuff  together about security. They've been forced to realize they can't play at it anymore.

Thye just hired a Director of Security, for the first time.

They are changing their servers around because someone may have slipped a hacked Juniper router into the farms that they use(d).

I like this kind of thinking on Apple's part. It shows some seriousness, which they are going to need very soon.
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
3/25/2016 | 2:45:45 PM
Re: Did the FBI really need Help

Agreed.  It is hard to believe the FBI didn't know of this method and that it will end up being much about nothing. 

I do wonder how this bill will affect things going forward though.

Technocrati
50%
50%
Technocrati,
User Rank: Ninja
3/25/2016 | 2:51:11 PM
Re: Did the FBI really need Help

@Larryloeb    I am surprised that it took so long for the Apple to hire a Dir of Security.  Did they think their products were impenetrable ?    

Looks like it.    

But on the flip-side it is encouraging that they are taking the issue of security even more seriously moving forward.

Technocrati
50%
50%
Technocrati,
User Rank: Ninja
3/25/2016 | 3:01:53 PM
Re: Did the FBI really need Help

"...the FBI seems not ready to consider that if that phone was used for terror activities, the issuer of that phone might be liable too. And who owned it? San Bernadino. The FBI going to arrest them too? "

 

 

@Larryloeb    Great point.  Another case of selective prosecution ?

larryloeb
50%
50%
larryloeb,
User Rank: Author
3/25/2016 | 4:43:14 PM
Re: Did the FBI really need Help
@technocrati

Two weeks before the FBI demanded Apple crack it, the DEA used Cellebrite to crack another iphone. The docs for it are up on cryptome.

You would think someone should have got on the phone to them, huh?
larryloeb
50%
50%
larryloeb,
User Rank: Author
3/25/2016 | 4:45:59 PM
Re: Did the FBI really need Help
@tech

Yeah, me too.

They have sort of realized that what they were doing before wasn't really secure. They need to harden everything.

The new 10.4 release fixed some really, really bad bugs. They have to stop those kinds of bugs from happening, now.

 
larryloeb
50%
50%
larryloeb,
User Rank: Author
3/25/2016 | 4:47:39 PM
Re: Did the FBI really need Help
More like not seeing the connection that was there all the way through to the end.

They just focused on what they wanted.
Page 1 / 3   >   >>
Commentary
Get Your Enterprise Ready for 5G
Mary E. Shacklett, Mary E. Shacklett,  1/14/2020
Commentary
Modern App Dev: An Enterprise Guide
Cathleen Gagne, Managing Editor, InformationWeek,  1/5/2020
Slideshows
9 Ways to Improve IT and Operational Efficiencies in 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/2/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll