Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

denem

(11,045 posts)
Sat Feb 20, 2016, 07:46 AM Feb 2016

San Bernardino Shooter's iCloud Password Changed While iPhone was in Government Possession

Source: ABC News

The password for the San Bernardino shooter's iCloud account associated with his iPhone was reset hours after authorities took possession of the device.

The Justice Department acknowledged in its court filing that the password of Syed Farook's iCloud account had been reset. The filing states, "the owner [San Bernardino County Department of Public Health], in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup."

Apple could have recovered information from the iPhone had the iCloud password not been reset, the company said. If the phone was taken to a location where it recognized the Wi-Fi network, such as the San Bernardino shooters' home, it could have been backed up to the cloud, Apple suggested.

The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.

Read more: http://abcnews.go.com/US/san-bernardino-shooters-apple-id-passcode-changed-government/story?id=37066070



I don't have enough understanding of the technology to make too much of this. From what I understand, some or all of an iPhone's data is backed up to iCloud, and this may be decoded? That's news to me. Anyway, when some Govt IT dweb changed the iCloud password, the iPhone was no longer able to logon to the iCloud account and update the backup. Therefore, the most recent data was (only) on the phone. 1. This looks like one royal SNAFU 2. Disable iCloud if you truly want to secure your iPhone.

BTW how do we know the phone even had a passcode in the first place. Some IT guy just happened to make the data unrecoverable?

Apple: Terrorist’s Apple ID Password Changed In Government Custody, Blocking Access

The Apple ID password linked to the iPhone belonging to one of the San Bernardino terrorists was changed less than 24 hours after the government took possession of the device, senior Apple executives said Friday. If that hadn’t happened, Apple said, a backup of the information the government was seeking may have been accessible.
...
(Apple) executives said the company had been in regular discussions with the government since early January, and that it proposed four different ways to recover the information the government is interested in without building a backdoor. One of those methods would have involved connecting the iPhone to a known Wi-Fi network and triggering an iCloud backup that might provide the FBI with information stored to the device between the October 19th and the date of the incident.

Apple sent trusted engineers to try that method, the executives said, but they were unable to do it. It was then that they discovered that the Apple ID password associated with the iPhone had been changed. (The FBI claimed earlier Friday that this was done by someone at the San Bernardino Health Department.)

Had that password not been changed, the executives said, the government would not need to demand the company create a “backdoor” to access the iPhone used by Syed Rizwan Farook, who died in a shootout with law enforcement after a terror attack in California that killed 14 people. The Department of Justice filed a motion to compel the company to do that earlier Friday.

http://www.buzzfeed.com/johnpaczkowski/apple-terrorists-appleid-passcode-changed-in-government-cust#.rbajYpQPJx
43 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
San Bernardino Shooter's iCloud Password Changed While iPhone was in Government Possession (Original Post) denem Feb 2016 OP
So it is possible that the FBI saw this as an opportunity to Ilsa Feb 2016 #1
Apple has.... Bangbangdem Feb 2016 #8
Different technology in different phones... TipTok Feb 2016 #13
If they've decrypted other phones, you don't think Ilsa Feb 2016 #17
Those were older iPhones. iOS 8 or later makes it so Apple can't. (nt) jeff47 Feb 2016 #20
The shooters' phones are older models, as well. randome Feb 2016 #23
Running iOS 8. (nt) jeff47 Feb 2016 #28
That would be my first 2naSalit Feb 2016 #16
Here's an interesting discussion of the problems involved starroute Feb 2016 #24
So, it'll be even more difficult Ilsa Feb 2016 #31
Someone who jumped the gun it seems? tomm2thumbs Feb 2016 #2
For once, a tin foil hat might be justified. denem Feb 2016 #3
Maybe they can clone it 100x and put the phones online and let anonymous hackers have at it tomm2thumbs Feb 2016 #4
for once? These kinds of events are always super fishy and the San Bernardino attack was plenty Fast Walker 52 Feb 2016 #36
Makes one wonder about that employee. brush Feb 2016 #25
County employee was probably following standard procedures. JustABozoOnThisBus Feb 2016 #41
The Court should be ordering the employee to open the phone, not Apple GreydeeThos Feb 2016 #5
Exactly. truebluegreen Feb 2016 #10
Why are the press not pursuing this angle? LiberalLovinLug Feb 2016 #34
The story is confusing, mainly due to bad reporting William Seger Feb 2016 #37
I'm sure the county employee would be happy to unlock the phone. JustABozoOnThisBus Feb 2016 #42
The phone PIN and the iCloud password are two very different things. ManiacJoe Feb 2016 #43
Your ABC link seems slightly truncated muriel_volestrangler Feb 2016 #6
Thank you. Fixed it. denem Feb 2016 #18
The Farooks were framed. mhatrw Feb 2016 #7
So then.... Bangbangdem Feb 2016 #9
um, the Farooks were not framed, they were evil terrorists who died while murdering others nt geek tragedy Feb 2016 #11
What a load of BS you spout. 2 errors in your 2 statements. You are clueless Bernardo de La Paz Feb 2016 #12
Q: How do we know the iPhone was code protected? denem Feb 2016 #19
It was the county's phone. jeff47 Feb 2016 #21
Apparently the county employee did not change the password, but rather the identity. . nt Bernardo de La Paz Feb 2016 #26
how do you know for sure it was the couple that killed 14 people? Fast Walker 52 Feb 2016 #35
Technically, not 100%. Realistically I have no doubt. Bernardo de La Paz Feb 2016 #40
Stuff like this is what makes it onto Rush Limbaugh... TipTok Feb 2016 #14
Nothing incriminating on the phone. Only the Farook's in a car full of bullets and assault rifles NickB79 Feb 2016 #22
Some idiots/morons in "law enforcement", were fucking with the phone and then went... SoapBox Feb 2016 #15
So, law enforcement screwed the pooch and now wants to blame Apple JCMach1 Feb 2016 #27
"Your poor planning on your part does not constitute an emergency on my part" n/t christx30 Feb 2016 #29
ROFL JCMach1 Feb 2016 #32
Not law enforcement William Seger Feb 2016 #39
How is it even possible that the owner of the phone changed the password remotely kas125 Feb 2016 #30
I think it was a "work phone." nt MADem Feb 2016 #33
It was a work phone, someone in his office reset its iCloud password remotely William Seger Feb 2016 #38

Ilsa

(61,709 posts)
1. So it is possible that the FBI saw this as an opportunity to
Sat Feb 20, 2016, 07:59 AM
Feb 2016

Force Apple to develop the code they need to disable security for all iphones? Is it possible they gave up further immediate research on the perps' connection to get the jackpot?

I'm not buying the idea that whoever changed the password then promptly forgot about it.

 

Bangbangdem

(140 posts)
8. Apple has....
Sat Feb 20, 2016, 09:22 AM
Feb 2016

Already decrypted iPhones 70 times to aid law enforcement. This one concerns national security. Trying to figure out the disconnect.

Ilsa

(61,709 posts)
17. If they've decrypted other phones, you don't think
Sat Feb 20, 2016, 11:08 AM
Feb 2016

Apple would decrypt this one if the risk didn't apply to every other newer iPhone? Why would Apple stop this time, unless there was a different risk?

It may not have planned, but my guess is that they want access to all phones whenever they want, for whatever reason. And no, I don't trust them to always have a good reason. I believe that some people in the fbi abuse their access to personal data.

 

randome

(34,845 posts)
23. The shooters' phones are older models, as well.
Sat Feb 20, 2016, 11:44 AM
Feb 2016

[hr][font color="blue"][center]I'm always right. When I'm wrong I admit it.
So then I'm right about being wrong.
[/center][/font][hr]

2naSalit

(86,863 posts)
16. That would be my first
Sat Feb 20, 2016, 11:02 AM
Feb 2016

thought on that. Everyone knows how badly the feds want to have access to everything. I'm not buying their claims either.

starroute

(12,977 posts)
24. Here's an interesting discussion of the problems involved
Sat Feb 20, 2016, 12:10 PM
Feb 2016

The short version is that Apple can't just create a tool and hand it over to the FBI to be used once and then forgotten. If anything on the phone leads to arrests, the defense will be able to demand that Apple provide testimony about the nature of the tool, demonstrate its accuracy, prove that not a single bit of information on the phone was altered in the course of cracking it -- and allow experts hired by the defense to validate it. And at that point, the secret can't be kept and anybody knowledgeable can reverse-engineer the techniques.

http://www.zdziarski.com/blog/?p=5645

For years, the government could come to Apple with a subpoena and a phone, and have the manufacturer provide a disk image of the device. This largely worked because Apple didn’t have to hack into their phones to do this. Up until iOS 8, the encryption Apple chose to use in their design was easily reversible when you had code execution on the phone (which Apple does). So all through iOS 7, Apple only needed to insert the key into the safe and provide FBI with a copy of the data.

This service worked like a “black box”, and while Apple may have needed to explain their methods in court at some point, they were more likely considered a neutral third party lab as most forensics companies would be if you sent them a DNA sample. The level of validation and accountability here is relatively low, and methods can often be opaque; that is, Apple could simply claim that the tech involved was a trade secret, and gotten off without much more than an explanation. An engineer at Apple could hack up a quick and dirty tool to dump disk, and nobody would need to ever see it because they were providing a lab service and were considered more or less trade secrets. . . .

What many haven’t considered is the significant difference – in the legal world – between providing lab services and developing what the courts will consider an instrument.

An instrument is the term used in the courts to describe anything from a breathalyzer device to a forensics tool, and in order to get judicial notice of a new instrument, it must be established that it is validated, peer reviewed, and accepted in the scientific community. It is also held to strict requirements of reproducibility and predictability, requiring third parties (such as defense experts) to have access to it.

Ilsa

(61,709 posts)
31. So, it'll be even more difficult
Sat Feb 20, 2016, 02:18 PM
Feb 2016

than imagined for law enforcement to use anything they get off the phone due to legal problems of verification of the new instrument, tampering risks, etc, which almost no one has discussed before. Of course, maybe they don't care about prosecuting at this time, just figuring out who they need to be chasing down. But still, there are all of those issues you mention.

This is a bigger deal than the media is able to understand and convey to the general public. Thank you so much for your post. This is a much bigger mountain to climb than I imagined. Wow.

tomm2thumbs

(13,297 posts)
2. Someone who jumped the gun it seems?
Sat Feb 20, 2016, 08:01 AM
Feb 2016

"Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said."

 

denem

(11,045 posts)
3. For once, a tin foil hat might be justified.
Sat Feb 20, 2016, 08:03 AM
Feb 2016

The FBI have the data, but want to force in a backdoor? For all we know there may never have been a passcode. A 5c is a pretty old phone, launched when iOS didn't nag so much for a passcode.

tomm2thumbs

(13,297 posts)
4. Maybe they can clone it 100x and put the phones online and let anonymous hackers have at it
Sat Feb 20, 2016, 08:24 AM
Feb 2016

Probably more skilled at it than Apple folks in many ways

 

Fast Walker 52

(7,723 posts)
36. for once? These kinds of events are always super fishy and the San Bernardino attack was plenty
Sat Feb 20, 2016, 08:06 PM
Feb 2016

stinky.

JustABozoOnThisBus

(23,375 posts)
41. County employee was probably following standard procedures.
Sun Feb 21, 2016, 10:06 AM
Feb 2016

When someone leaves the company, disable their online accounts, reset passwords, etc, etc. Changing the iCloud password may just be a normal thing to do.

Maybe Law Enforcement should have told the county office to not touch anything.

GreydeeThos

(958 posts)
5. The Court should be ordering the employee to open the phone, not Apple
Sat Feb 20, 2016, 08:47 AM
Feb 2016


The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.

If this information is valuable enough to risk the security of every iPhone in the world, the County Employee should first be subjected to the ' bright lights and rubber hose ' treatment.

LiberalLovinLug

(14,178 posts)
34. Why are the press not pursuing this angle?
Sat Feb 20, 2016, 04:08 PM
Feb 2016

Where is this employee that changed the password? And with such an important national security investigation, I find it impossible to believe that this "employee" did not record SOMEWHERE the changed password. In fact, it should have been imperative that this information be kept. Something fishy going on here.

William Seger

(10,786 posts)
37. The story is confusing, mainly due to bad reporting
Sat Feb 20, 2016, 08:22 PM
Feb 2016

The password that was changed was the phone's login to the Apple iCloud, not the passcode to open the phone. What Apple is saying is that if that login hadn't been changed, the phone could connect to the iCloud and upload a backup of texts and emails, so Apple could give that data to the FBI without hacking the phone.

JustABozoOnThisBus

(23,375 posts)
42. I'm sure the county employee would be happy to unlock the phone.
Sun Feb 21, 2016, 10:10 AM
Feb 2016

If there was a way to unlock the phone.

Apparently, there is not.

As William Seger pointed out in post 38, the iCloud password and the iPhone 4-digit key are two different things. The iPhone key is what the FBI wants.

ManiacJoe

(10,136 posts)
43. The phone PIN and the iCloud password are two very different things.
Sun Feb 21, 2016, 08:01 PM
Feb 2016

Knowing one does not help with the other.

mhatrw

(10,786 posts)
7. The Farooks were framed.
Sat Feb 20, 2016, 08:50 AM
Feb 2016

There was nothing incriminating on the phone, so the FBI simply pretended to lock themselves out of it.

If not, what they fuck were they thinking?

 

Bangbangdem

(140 posts)
9. So then....
Sat Feb 20, 2016, 09:25 AM
Feb 2016

The simple truth is that these guys were on their own. No wonder this entire story dropped off the radar.

Bernardo de La Paz

(49,052 posts)
12. What a load of BS you spout. 2 errors in your 2 statements. You are clueless
Sat Feb 20, 2016, 10:11 AM
Feb 2016

1) They were not framed. They killed 14 people.

2) It wasn't the FBI that locked themselves out, it was a county employee, and it wasn't pretending. They unlocked the other phone.

There are plenty of credible links online for the above. You, however, haven't posted any credible link for your fabricated fantasy.

 

denem

(11,045 posts)
19. Q: How do we know the iPhone was code protected?
Sat Feb 20, 2016, 11:26 AM
Feb 2016

To change the password a county employee had to know the iCloud address and the backup email address, or security answers. Now yes, the FBI would know that, but a county employee? An official iCloud address. Except the iCloud account can be switched back and forth on the same phone. Does. Not. Compute.

jeff47

(26,549 posts)
21. It was the county's phone.
Sat Feb 20, 2016, 11:42 AM
Feb 2016

The county bought the phone and gave it to him for his job. When a business does this, there are ways for the business to retain some control over the phone.

 

Fast Walker 52

(7,723 posts)
35. how do you know for sure it was the couple that killed 14 people?
Sat Feb 20, 2016, 07:59 PM
Feb 2016

and why on earth would the county employee change the passcode?

Bernardo de La Paz

(49,052 posts)
40. Technically, not 100%. Realistically I have no doubt.
Sun Feb 21, 2016, 08:08 AM
Feb 2016

As to the county employee, I have not much idea. It seems it was the phone identity, not the password.

But I'm sure you will get into a big waste of your time (and of others) if you go all "Area 52" / conspiracy theory on the San Bernardino shootings.

NickB79

(19,276 posts)
22. Nothing incriminating on the phone. Only the Farook's in a car full of bullets and assault rifles
Sat Feb 20, 2016, 11:43 AM
Feb 2016

A family friend admitting to arranging a straw purchase for the very guns (matched by serial number) later recovered from the Farook's dead bodies, and video of the shoot-out between them and the police later that day, where hundreds of rounds were fired back and forth

But yeah, they were framed.

SoapBox

(18,791 posts)
15. Some idiots/morons in "law enforcement", were fucking with the phone and then went...
Sat Feb 20, 2016, 10:54 AM
Feb 2016

Oh shit! We screwed it up!

William Seger

(10,786 posts)
39. Not law enforcement
Sat Feb 20, 2016, 08:36 PM
Feb 2016

It was someone in the San Bernardino County Department of Public Health office where he worked who reset it remotely.

kas125

(2,472 posts)
30. How is it even possible that the owner of the phone changed the password remotely
Sat Feb 20, 2016, 01:55 PM
Feb 2016

Last edited Sat Feb 20, 2016, 04:11 PM - Edit history (1)

hours after the attacks and when it was in the possession of the FBI? Wasn't he lying dead on the street? How does a dead guy change a password? Or am I missing something?

William Seger

(10,786 posts)
38. It was a work phone, someone in his office reset its iCloud password remotely
Sat Feb 20, 2016, 08:29 PM
Feb 2016

This is not the passcode to open the phone.

Latest Discussions»Latest Breaking News»San Bernardino Shooter's ...