San Bernardino County Calls The FBI Liars Over Terrorist's iCloud Account

San Bernardino County Calls the FBI Liars Over Terrorist's iCloud Account

Late last night a Twitter account associated with San Bernardino County said that it worked the direction of the FBI to reset Syed Farook's iCloud password. Why does that matter? Because it would make the FBI liars.

As you probably know by now, the FBI has demanded that Apple break into the San Bernardino terrorist's iPhone. Apple has refused, insisting that doing so would cause a terrible precedent. But both the FBI and Apple are currently waging a fierce PR battle over one of the possible ways that information from the phone could've been retrieved in the early stages of the investigation: Hacking Farook's iCloud password and causing his phone to push information to the cloud remotely.

In a filing yesterday the FBI claimed that the owner of the phone, San Bernardino County, had been the one who bungled the auto-backup of the phone to iCloud (emphasis mine):

[...] to attempt an auto-backup of the SUBJECT DEVICE with the related iCloud account (which would not work in this case because neither the owner nor the government knew the password to the iCloud account, and the owner, in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup) [...]

But San Bernardino County's Twitter account (which remains unverified but appears authentic) now claims that it was working under the FBI's orders. Specifically the tweet said, "The County was working cooperatively with the FBI when it reset the iCloud password at the FBI's request."

San Bernardino County Calls the FBI Liars Over Terrorist's iCloud Account

This statement contradicts both the FBI's insinuations that San Bernardino County acted alone and the claims made by an anonymous source from the federal government contacted by ABC News. That source said that an IT employee working for San Bernardino County was not instructed by the FBI to attempt a password reset for Syed Farook's iCloud:

The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.

Gizmodo was on a call with Apple executives late last night under strange conditions that there would be no direct quotes and no names. They used the word "government" when referring to who bungled the opportunity to force the back-up to iCloud. At the time, it seemed Apple was referring to the FBI without saying so directly. But Farook's employer was the San Bernardino Department of Health, which is also a government agency.

This is all independent of the question over whether Apple should be compelled to unlock the terrorist's 5c phone directly by hacking the passcode. Some have floated the idea that the phone should have been unlocked using the deceased terrorist's fingerprint, but that wouldn't have worked for a number or reasons — most importantly, the fact that the iPhone 5c doesn't have a fingerprint scanner.

We've reached out to San Bernardino County for comment and will update this post when we hear back.

Photo: Tashfeen Malik and Syed Farook, as they passed through O'Hare International Airport in Chicago on July 27, 2014



    Apple doesn't have to hack the phone. Apple has to supply a copy of IOS that can be run in memory and allows the fbi to have multiple attempts at unlock it with brute force. So Apple doesn't have to hack anything. They just have to supply an IPSW file that will run in memory.
    From the judges ruling:
    Apple's reasonable technical assistance shall accomplish the following three important functions: (1) it will bypass or disable the auto-erase function whether or not it has been enabled;
    (2) it will enable the FBI to submit passcodes to the SUBJECT DEVICE for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available on the SUBJECT and
    (3) it will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware.

      Yeah and then some dimwit leaks that iOS copy and credit to them other hackers and enthusiasts figure how to apply it to future and existing versions of iOS devices thereby rendering a lot of phone vulnerable. Most articles just use the term "hack" as common vernacular as explaining it in layman's terms makes people's eyes glaze over if it more than 20 words.

        I'm positive thats covered in the full ruling somewhere too (have to find it). From memory the IPSW will be tied to the phone using IMEI number, so even if it does go out in the wild it wpnt be able to be used

          You really think that people won't be able to break such a simple encryption when there are people already stealing from bank and private companies. There are literally no safe guards that would work except not making it to begin with.

    A US government agency acting dishonestly... Well I never!!!!

Join the discussion!

Trending Stories Right Now