Cellebrite says it can pull data from any iOS device ever made
Israeli mobile device forensics company Cellebrite proclaimed on Friday that it can break into any iOS device, including those running iOS 12.3.

Cellebrite's Universal Forensic Extraction Device (UFED), used to acquire data from smartphones
With an updated page heralding it's services, Cellebrite now says that it can "perform a full file system extraction on any iOS device" in addition to being able to perform what appears to be substantively the same on high-end android devices. And, that ability is available to law enforcement agencies that can pay for it, without sending the devices to Cellebrite for extraction.
The company claims that it can determine passcodes and perform unlocks for app Apple devices, giving purchasers the ability to perform a full file system extraction. On Android, the company says that all flagship Samsung devices can be similarly penetrated, with the addition of the ability to extract unallocated data to even glean information about deleted items.
Cellebrite is thought to be the firm that the FBI turned to crack the iPhone 5c of San Bernardino killer Syed Rizwan Farook. The FBI and Department pursued Apple to code a backdoor for iOS to penetrate the device, but were met with active opposition by CEO Tim Cook. Cook, and others, argued that the company would have to fundamentally compromise the security of iOS -- precisely because backdoors could be leaked or shared by government agencies, or else discovered independently.
"There's a public safety imperative here," Cellebrite Chief Marketing Officer Jeremy Nazarian said in an interview in 2018. "It's not like this is over the wire listening technology... it requires physical access. It's not like anyone is listening to your iPhone or my iPhone. There's nothing inherent in the technology that means it's open to misuse."
Despite Nazarian's comments, Apple's concerns had some merit. Cellebrite penetration tools were discovered for sale on the open market in February 2019, belying the assumption that any kind of back door could be kept safe.
Even prior to the San Bernardino debate, Cellebrite sprung up in response to law enforcement demands. Various U.S. officials have complained that Apple's insistence on end-to-end messaging encryption and full-disk encryption for devices is causing its products to "go dark" to law enforcement and spy agencies.
The battle between tech and the government has gone global, with the "Five Eyes" intelligence network -- including Australia, Canada, New Zealand, the U.K. and the U.S. -- claiming that "privacy is not an absolute." Legislation mandating bypasses of encryption, despite complaints, are winding through governmental agencies.

Cellebrite's Universal Forensic Extraction Device (UFED), used to acquire data from smartphones
With an updated page heralding it's services, Cellebrite now says that it can "perform a full file system extraction on any iOS device" in addition to being able to perform what appears to be substantively the same on high-end android devices. And, that ability is available to law enforcement agencies that can pay for it, without sending the devices to Cellebrite for extraction.
The company claims that it can determine passcodes and perform unlocks for app Apple devices, giving purchasers the ability to perform a full file system extraction. On Android, the company says that all flagship Samsung devices can be similarly penetrated, with the addition of the ability to extract unallocated data to even glean information about deleted items.
Cellebrite is thought to be the firm that the FBI turned to crack the iPhone 5c of San Bernardino killer Syed Rizwan Farook. The FBI and Department pursued Apple to code a backdoor for iOS to penetrate the device, but were met with active opposition by CEO Tim Cook. Cook, and others, argued that the company would have to fundamentally compromise the security of iOS -- precisely because backdoors could be leaked or shared by government agencies, or else discovered independently.
"There's a public safety imperative here," Cellebrite Chief Marketing Officer Jeremy Nazarian said in an interview in 2018. "It's not like this is over the wire listening technology... it requires physical access. It's not like anyone is listening to your iPhone or my iPhone. There's nothing inherent in the technology that means it's open to misuse."
Despite Nazarian's comments, Apple's concerns had some merit. Cellebrite penetration tools were discovered for sale on the open market in February 2019, belying the assumption that any kind of back door could be kept safe.
Even prior to the San Bernardino debate, Cellebrite sprung up in response to law enforcement demands. Various U.S. officials have complained that Apple's insistence on end-to-end messaging encryption and full-disk encryption for devices is causing its products to "go dark" to law enforcement and spy agencies.
The battle between tech and the government has gone global, with the "Five Eyes" intelligence network -- including Australia, Canada, New Zealand, the U.K. and the U.S. -- claiming that "privacy is not an absolute." Legislation mandating bypasses of encryption, despite complaints, are winding through governmental agencies.
Comments
This assumption is backed up by the change in iOS 12.3 that physically powers off the USB port after the phone has been locked for a time (30 minutes?)
When dealing with hardware “off” is not always quite as absolute as one might wish, but I believe this puts an enormous crimp in their attack vectors.
The most interesting part of this story is that we get to see first hand the cat and mouse game that is just another day at the office for state sponsored cyber warfare.
Most folks really do have far more important issues to deal with, things that personally affect their lives. This isn't one of them.
Just my 2 cents.
They buy the services of Cellebrite through a shell company and see how it works.
Apparently, you missed this part:
Which means that it affects 100% of users, not just "bad guys". This is why Apple resisted the FBI's demands to create a back door. Once something like this is created, it can't be controlled; just witness what happened with the NSA's hacking tools.
with all that’s come out about that loser, man it’s scary to think what he and his treasonous cronies wanted to do. Talk about abuse of power...
It’s like political fiction come to life.
Lets say say a candidate for Congress, senate, presidency, etc. is gaining steam, but certain people in power don’t like it. If they just have your physical device for a moment (airport security, court metal detection, etc.) THry can have all your data, both personal to attack you with, and any political ideas, info you may have to help you get into office.
And then “somehow it leaks” out, causing damage. Or... it leaks to your opponents during a debate, etc.
super scary. And it should cause anger.
We’ve seen that the fbi is compromised by political bias and agenda. To the point where they are doing illegal things. And they are law high end enforcement!
if certain people want you hurt regardless of guilt or innocence, you will be hurt. That kind of power needs to be put in check.
Hopefully apple figures a way to combat this. It’s a moving target, but so he it. Keep moving.
The could be vague and mean only some of every type of iPhone.
For example, every model iPhone that hasn't had USB powered off.
Just because politicians have convinced you that you don’t need privacy or individual liberty doesn’t mean the rest of us are going to believe that BS.
I’m fine with this technology, but Apple should do anything and everything to make it null and void to protect its customers.