The San Bernardino County government put out a tweet on Friday, saying that the FBI told their staff to reset the iCloud password of Syed Farook’s Apple account.
Farook and his wife, Tashfeen Malik, were implicated in the San Bernardino shootings of December 2015 in which 14 people lost their lives.
If true, then it means that the FBI was not honest for its reasons for wanting backdoor access to Apple iPhones, by forcing the company to compromise its encryption security.
The FBI had a chance to examine Farook’s account before the password was reset before considering breaking into all iPhones on the planet.
As you probably know by now, the FBI has demanded that Apple break into the San Bernardino terrorist’s iPhone. Apple has refused, insisting that doing so would set a terrible precedent. But both the FBI and Apple are currently waging a fierce PR battle over one of the possible ways that information from the phone could’ve been retrieved in the early stages of the investigation: Hacking Farook’s iCloud password and causing his phone to push information to the cloud remotely.
In a filing yesterday the FBI claimed that the owner of the phone, San Bernardino County, had been the one who bungled the auto-backup of the phone to iCloud. San Bernardino County was Farook’s employer because he worked for the local Department of Health. The County technically owned the phone (emphasis mine):
[…] to attempt an auto-backup of the SUBJECT DEVICE with the related iCloud account (which would not work in this case because neither the owner nor the government knew the password to the iCloud account, and the owner, in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup) […]
But San Bernardino County’s Twitter account (which remains unverified but appears authentic) now claims that it was working under the FBI’s orders. Specifically the tweet said, “The County was working cooperatively with the FBI when it reset the iCloud password at the FBI’s request.”
This statement contradicts both the FBI’s insinuations that San Bernardino County acted alone and the claims made by an anonymous source from the federal government contacted by ABC News. That source said that an IT employee working for San Bernardino County was not instructed by the FBI to attempt a password reset for Syed Farook’s iCloud:
The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.
Gizmodo was on a call with Apple executives late last night under strange conditions that there would be no direct quotes and no names. They used the word “government” when referring to who bungled the opportunity to force the back-up to iCloud. At the time, it seemed Apple was referring to the FBI without saying so directly. But Farook’s employer was the San Bernardino Department of Health, which is also a government agency.
This is all independent of the question over whether Apple should be compelled to unlock the terrorist’s 5c phone directly by hacking the passcode. Some have floated the idea that the phone should have been unlocked using the deceased terrorist’s fingerprint, but that wouldn’t have worked for a number or reasons—most importantly, the fact that the iPhone 5c doesn’t have a fingerprint scanner.
We’ve reached out to San Bernardino County for comment and will update this post when we hear back.
Latest posts by Edmondo Burr (see all)
- Saudi Linked Group Gave DUP $1/2M During Brexit - February 28, 2017
- Bomb Threats In U.S. Trigger Evacuation Of Jewish Centers - February 27, 2017
- Abu Sayyaf Beheads German Hostage Jurgen Kantner - February 27, 2017