Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Solana, Cardano And Litecoin Holders Looking For The Next Big Gains Turn To Top Trending Crypto Remittix

2025-08-31

Why Investing In Remittix At $0.10 Is Like Buying Bitcoin When BTC Price Was Under $100

2025-08-31

Remittix Will Produce More Gains For Early Investors Than Pepe Coin & Shiba Inu Did

2025-08-30
Facebook X (Twitter) Instagram
Trending
  • Solana, Cardano And Litecoin Holders Looking For The Next Big Gains Turn To Top Trending Crypto Remittix
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»News»Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’
News

Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’

Gugu LourieBy Gugu Lourie2016-02-27No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Tech giant Apple is standing firm behind its decision to refuse a US court order to help the FBI gain access to the iPhone used by one of the shooters in last year’s mass killing in California. By Georg Thomas


Fourteen people were killed and 22 seriously injured in a shooting in San Bernardino, on December 2, 2015. The incident was declared an act of terrorism.

The FBI has an iPhone 5C belonging to one of the shooters, but it does not have the necessary security code set by the user to unlock the phone. It wants Apple to create and provide it with firmware that would allow it to bypass the security features that protect the privacy of iPhone users.

Apple CEO Tim Cook has published “A Message to Our Customers” explaining why the company is not complying with the request.

Heated debate

It’s a topic that has been the subject of much debate over the past few days, with supporters for both sides. Many of Apple’s tech rivals have sided with the company, though Microsoft founder Bill Gates says companies should be forced to cooperate with law enforcement agencies in terrorism investigations.

From the FBI’s perspective, the contents of the phone may provide crucial clues, evidence and possibly even contact information of other terrorists and extremists.

From Apple’s point of view, creating firmware that has a backdoor could have significant impact on the security and privacy of its customers, because the US government would then have the ability to gain access to any iPhone in its possession.

In the wrong hands, this special firmware could be used to gain access to sensitive information on any iPhone. These devices are more versatile than ever before and are likely to contain anything from email, messages and contacts, to financial and credit card information.

Understandably Apple is firmly opposing compliance with this order. Because compliance could affect its reputation and result in loss of consumer confidence. There may also be international implications; would this firmware only work on US-issued devices? How might this affect international privacy laws?

We’ve had back doors before

This wouldn’t be the first time the US government has had a back door into secure systems.

In the 1980s, the US National Security Agency (NSA) developed an algorithm called “Skipjack”. Using an encryption device called the Clipper chip, which had a built in back door, Skipjack allowed law enforcement agencies to gain access to encrypted data and was intended for use by telecommunications providers.

The chip was introduced in 1993 and met with significant backlash and low adoption. It was defunct by 1996.

And in 2013, the New York Times published a story about how an encryption algorithm, called Dual Elliptical Curve Deterministic Random Bit Generator (Dual_EC_DRBG) contained a back door for the NSA.

People who used the algorithm, which could be any organisation that had the algorithm included as part of security devices or software they acquired, such as those that utilised the RSA Security BSAFE encryption libraries, were urged to stop using it.

What now for the FBI?

What other options does the FBI have? Could there be a place for ethical hackers to attempt to break into the iPhone? Would commissioning ethical hackers for this purpose itself be ethical?

Although Apple’s iOS firmware has already undergone significant testing by both Apple and the public, it is possible that vulnerabilities still exist.

One such vulnerability, which allows hackers to bypass the lock screen using Siri, was revealed last September. Although it only provided access to contacts and photos, it demonstrates that flaws in firmware can exist. In the FBI case at hand, photos and contacts may be useful evidence.

There is also the possibility that an ethical hacker may be able to reverse engineer the firmware. Doing this is explicitly forbidden by the Apple iOS Software license agreement so the ethics of doing it would be questionable.

Could it be justified given the US government would back the effort for the sake of national safety?

Any attempt to break into the device comes with its risks. Simply trying to brute force the security code by inputting every password combination would likely result in the device being erased, so it is important to preserve the device.

It would at least be necessary to maintain the current state of the device in some way. So, if a way of duplicating the device was created, it would be possible to use a brute force attack against its copies, without affecting the original phone.

Maintaining the forensic integrity of the device and not damaging it is of the utmost importance, something that was not demonstrated when the FBI attempted to access the iCloud account of the perpetrators.

It is also necessary for Apple to be able to prove that the back door maintains the integrity of the data. If this process becomes part of any court proceeding, it is highly likely that Apple would be called upon to prove this in open court.

It must already realise this and be very concerned about having to do so, as it would expose a great deal of proprietary information that it would not want to see in the public arena.

No hacking by the FBI?

One must ask why the FBI (or US government) doesn’t already have the ability to gain access to the encrypted data. It seems likely that with the supercomputers in its arsenal, and the funding available to it, the agency can take a copy of the encrypted data and attempt to decrypt it.

Given the standard encryption on iOS devices is AES-256 (approved and used by the NSA for storing top-secret data), and the key is fused in an unreadable format to the device, the amount of time to decrypt and the costs involved are likely to be the issue.

It’s also important to consider whether there should be any automatic right for any government to be able to read (or decrypt and read) any communications or stored data.

Whenever government ministers are interviewed, they seem to start with the presumption that they have the right to do this, yet that right is not established.

So it’s probably easier and more cost effective for the US government to try to get Apple to create a back door, despite the problem of Apple refusing to do so.

Creating this precedent would allow this process to be repeatable and to occur whenever the US government required. Perhaps Apple doesn’t want the same fate as Clipper and Dual_EC_DRBG.

  • The ConversationGeorg Thomas, PhD candidate in information technology
  • This article was originally published on The Conversation. Read the original article.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Gugu Lourie
Gugu Lourie

Related Posts

Zayna Mahomed Is EPF Solve’s For X August Winner 

2025-08-29

Eskom Fraudster Sentenced, Ordered To Repay R2.6M

2025-08-29

WeThinkCode_ Graduates Stand Out In Job Market With Cutting-Edge Industry Electives

2025-08-26

Africa Can Turn Its Minerals Into Green Gold

2025-08-26

SwapVend Launches Its Minimum Viable Product To Bridge SA’s Informal And Formal Economies

2025-08-25

MortgageMarket & Takealot Launch SA’s 1st E-Commerce Home Loan Hub

2025-08-25

Spaza Market Lays The Foundation For Africa’s Enterprise Economy

2025-08-25

Why South Africa Is The Hidden Powerhouse For Global Executive Search

2025-08-25

University Of Pretoria Ranked No. 1 In SA For Artificial Intelligence Research

2025-08-24
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

BankservAfrica Rebrands As PayInc

The financial market infrastructure giant BankservAfrica has officially been rebranded to PayInc. The launch, held…

KZN’s First Supercar-Centric Luxury Residential Development Unveiled

2025-08-27

Government Pensions Administration Agency CEO Placed On Precautionary Suspension

2025-08-26

Airtel Africa & Vodacom Forge Landmark Infrastructure Partnership

2025-08-12
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

SA’s Skhokho 2.0 Puts Enterprise AI In SME Hands

2025-08-28

Please Call Me: After 25 Years, Will SCA’s New Bench Silence ConCourt?

2025-08-26

Vodacom Invests R400M To Expand Network In Free State And Northern Cape

2025-08-26

Elon Musk’s Starlink Backs BEE Equity Equivalents, Not 30% Ownership

2025-08-18

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Solana, Cardano And Litecoin Holders Looking For The Next Big Gains Turn To Top Trending Crypto Remittix

2025-08-31

Why Investing In Remittix At $0.10 Is Like Buying Bitcoin When BTC Price Was Under $100

2025-08-31

Remittix Will Produce More Gains For Early Investors Than Pepe Coin & Shiba Inu Did

2025-08-30
Recent Posts
  • Solana, Cardano And Litecoin Holders Looking For The Next Big Gains Turn To Top Trending Crypto Remittix
  • Why Investing In Remittix At $0.10 Is Like Buying Bitcoin When BTC Price Was Under $100
  • Remittix Will Produce More Gains For Early Investors Than Pepe Coin & Shiba Inu Did
  • Cardano Price Prediction For 2026 & Analysts Predict The Chances Of Dogecoin Reaching $1
  • Top Cryptos To Invest In At The End Of August: SUI, Pi Coin, Hedera & Remittix
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • Privacy Policy
  • About
© 2025 TechFinancials. Designed by TFS Media.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.