FBI again asks Apple to unlock iPhones belonging to suspected shooter
The FBI has formally asked Apple to help it unlock two iPhones reportedly belonging to the gunman who killed three people in Pensacola, Florida, in December, but Apple says it has already given all the help it can.

Officials from the FBI have written a letter to Apple's general counsel, asking for help in unlocking two iPhones believed to be owned by Mohammed Saeed Alshamrani. Alshamrani is suspected of carrying out the shootings last month at the Naval Air Station in Pensacola, Florida, and the FBI says it has court permission to search the phones.
"Investigators are actively engaging in efforts to 'guess' the relevant passcodes but have so far been unsuccessful," the letter, seen by NBC News, says.
"We have the greatest respect for law enforcement and have always worked cooperatively to help in their investigations," responded Apple in a statement. "When the FBI requested information from us relating to this case a month ago, we gave them all of the data in our possession and we will continue to support them with the data we have available."
According to NBC News, the FBI faces a further problem with unlocking one of the iPhones -- Mohammed Saeed Alshamrani reportedly fired a bullet into it before he was killed.
AppleInsider has reached out to Apple and the FBI for comment.
This is perhaps a reference to Cellebrite, a firm that the FBI previously hired to unlock the iPhone of the gunman involved in the San Bernardino case.
In December 2015, a terrorist attack in San Bernardino resulted in the deaths of 14 people. An iPhone 5C belonging to one of the attackers was recovered but was locked. In February 2016, a Federal judge ordered Apple to unlock a gunman's iPhone 5C but Apple refused the order. As with this latest request, Apple offered all the data that it had, but refused to create a backdoor into its iOS encryption.
Tim Cook later said he had hoped the case would go to trial with the DOJ in order to publicly raise all of the security and privacy issues.
The FBI ultimately hired a third-party company, believed to be Cellebrite, to break into the phone. The agency was reported to have spent $900,000 but wouldn't confirm if useful data was recovered.
However, separate law enforcement sources later said that the iPhone had yielded no pertinent information.
Since the San Bernardino case, Apple has created a page on its website specifically for law enforcement officials to request what data the company has.
Apple also said that it was working to train law enforcement on the issues surrounding such cases.
"We are building a team of professionals dedicated to training law enforcement officers globally, which will significantly increase our ability to reach smaller police forces and agencies," said Apple at the time. "This will include the development of an online training module for officers. This will assist Apple in training a larger number of law enforcement agencies and officers globally, and ensure that our company's information and guidance can be updated to reflect the rapidly changing data landscape."

Officials from the FBI have written a letter to Apple's general counsel, asking for help in unlocking two iPhones believed to be owned by Mohammed Saeed Alshamrani. Alshamrani is suspected of carrying out the shootings last month at the Naval Air Station in Pensacola, Florida, and the FBI says it has court permission to search the phones.
"Investigators are actively engaging in efforts to 'guess' the relevant passcodes but have so far been unsuccessful," the letter, seen by NBC News, says.
"We have the greatest respect for law enforcement and have always worked cooperatively to help in their investigations," responded Apple in a statement. "When the FBI requested information from us relating to this case a month ago, we gave them all of the data in our possession and we will continue to support them with the data we have available."
According to NBC News, the FBI faces a further problem with unlocking one of the iPhones -- Mohammed Saeed Alshamrani reportedly fired a bullet into it before he was killed.
AppleInsider has reached out to Apple and the FBI for comment.
FBI, iPhones, and Cellebrite
FBI General Counsel Dana Boente, who wrote the letter, also reportedly tells Apple in it that the agency has sought help from "familiar contacts in the third-party vendor community."This is perhaps a reference to Cellebrite, a firm that the FBI previously hired to unlock the iPhone of the gunman involved in the San Bernardino case.
In December 2015, a terrorist attack in San Bernardino resulted in the deaths of 14 people. An iPhone 5C belonging to one of the attackers was recovered but was locked. In February 2016, a Federal judge ordered Apple to unlock a gunman's iPhone 5C but Apple refused the order. As with this latest request, Apple offered all the data that it had, but refused to create a backdoor into its iOS encryption.
Tim Cook later said he had hoped the case would go to trial with the DOJ in order to publicly raise all of the security and privacy issues.
The FBI ultimately hired a third-party company, believed to be Cellebrite, to break into the phone. The agency was reported to have spent $900,000 but wouldn't confirm if useful data was recovered.
However, separate law enforcement sources later said that the iPhone had yielded no pertinent information.
Since the San Bernardino case, Apple has created a page on its website specifically for law enforcement officials to request what data the company has.
Apple also said that it was working to train law enforcement on the issues surrounding such cases.
"We are building a team of professionals dedicated to training law enforcement officers globally, which will significantly increase our ability to reach smaller police forces and agencies," said Apple at the time. "This will include the development of an online training module for officers. This will assist Apple in training a larger number of law enforcement agencies and officers globally, and ensure that our company's information and guidance can be updated to reflect the rapidly changing data landscape."
Comments
A bullet has eliminated one back door option. Perhaps iOS 13 has blocked Cellebrite's software on the second phone.
The Supreme Court rightly said that the cell phone carries personal information and should require a warrant for even the most causal intrusion by a law enforcement officer. That 9-0 opinion was written by John Roberts, by the way. Everyone from Ruth Badger Ginsburg to Antonin Scalia agreed, which tells you how broad the concern for privacy is among the members of the court.
This is not about a particular case- it is about destroying your expectation of privacy. They want to be able to take your devices at border crossings, airports, train stations and other ports of entry just because they feel like it and do so every day. They want to inspect your phone at roadside stops without a warrant. They want a back door to peer into your device without your permission and routinely use Stingrays to spoof cell towers and scoop up wireless traffic over large areas.
This is not about a single case or your safety or left-right politics. It is about your basic rights to privacy and the right to not self-incriminate. It is an inch by inch intrusion into your civil liberties and individual rights.
Can I get an Amen?
Our government has been on a decades long campaign to eradicate any expectation of privacy by the citizen and this is just the latest episode in security theater. The US Government through various agencies has introduced weaknesses into industry standard protocols (via NIST) to create exploitable holes in the security of wireless devices. They hacked the software used to manufacture SIM cards to allow for exploits at the radio level apart from the operating system. Harris Stingrays have proliferated and routinely intercept massive amounts of data over huge areas to include innocent citizens not suspected of any crime. They routinely demand the devices of citizens suspected of nothing at points of entry to the United States and claim the ability to do so 100 miles inside the border or any point of entry as if you have no rights.
The number one customer of data miners are the various levels of government law enforcement and intelligence gathering. They can easily buy data they are by law forbidden to collect without a court order. Private companies now scan your license plates and sell that data, but provide it to law enforcement for the access to the public rights of way.
And they repeatedly try to put these cases up to try to force Apple and others to create digital backdoors that will compromise your security and privacy.
So much for “to protect and serve”...
ACME Safe: That’s for noticing. And thanks for being a long-time customer.
FBI: Yes, but, this new model, with the capability to totally destroy all documents inside, it’s giving us some trouble. We have a warrant to search a home and it’s got one of these new models in it. And we can’t get into it. If we tamper with it, cause any vibration to it or get the combination wrong after three tries, it’ll destroy its contents. We need you to open it for us.
ACME Safe CEO: I’m sorry, I can’t help you with that. The safe is doing exactly what we designed it to do.
FBI: You can’t help? Or you won’t help?
ACME Safe CEO: We can’t help. We have no more means of opening that safe than you do. We designed it that way. Why should we design a backdoor capability to open our customer’s safes? Who are we to retain that privilege? What if one of our employees went rogue? What if that backdoor means of opening any of the safes we sold got out into the general domain? It would be a disaster, spelling the end of our business?
FBI: Okay, we understand. We’ll just sue you to force you to incorporate a backdoor means to open these safes. As it stands, they’re too safe. Maybe we’ll even urge Congress to make it law.
ACME Safe CEO: Are you listening to yourself?