-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 02/20/2016 02:08 PM, Rayzer wrote:
Transliteration... The feds tampered with the phone and apparently fucked up their own investigation.
So according to this account, for reasons unknown the FBI violated the most fundamental principles of digital forensics by failing to make a complete backup of the stored content of the device before doing anything else with or to it. Then /also/ quite deliberately destroyed its evidentiary value by delivering it into the custody and control of some random idiot. I find this narrative /very/ difficult to believe:
The idea was to force the iPhone 5C to auto-backup to Farookâs iCloud account. With a legal court order, Apple can and does turn over iCloud data. For some reason, Farook had not backed up the phone for roughly six weeks prior to the attack. The executive said Apple does not know whether the auto-backup was disabled or enabled, but he did say that the previous iCloud backups, which were handed over to investigators, were sporadic.
Apple suggested that the FBI take the iPhone 5C, plug it into a wall, connect it to a known Wi-Fi network and leave it overnight. The FBI took the phone to the San Bernardino County Health Department, where Farook worked prior to the December 2, 2015 attack.
When that attempt did not work, Apple was mystified, but soon found out that the Apple ID account password had been changed shortly after the phone was in the custody of law enforcement, possibly by someone from the county health department. With no way to enter the new password on the locked phone, even attempting an auto-backup was impossible. Had this iCloud auto-backup method actually functioned, Apple would have been easily able to assist the FBI with its investigation.
The executive only revealed this detail to reporters now because it had thought it was under a confidentiality agreement with the government. Apple seems to believe this agreement is now void since the government brought it up in a public court filing.
http://arstechnica.com/tech-policy/2016/02/apple-we-tried-to-help- fbi-terror-probe-but-someone-changed-icloud-password/
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWyRoBAAoJEDZ0Gg87KR0LwqkQAJpUkf2UqCYnAunxYFBOgkzH qBU2vZE9SrvUjNe553SDMxQZkxhYioxTcvQ/ZSSaFfuosaM6JlOfCBWO0/f1tyN1 /njsg0gl5hkYohuyPGogWykulg3S1n3i9VulRLNugH2atxqOVWMx8yFvf1BNcP7H 9QMY573CVyB2WTzEH7pYcV49/CNeAhOAGRzuO/lDCucXd8n50JBuD962MvT9CxdD GMAA2BgC5sH/68fWF3kgyagtPzbeDNMZraZfCOf0izML+WMfX52LdY8ZR/Gb+/Df gCGA6TsuWRkH+2bhht4b53mSl5gkuoGK7C3UAELCacRIBQ8UNxzF1Ij/S4MdW61h A2pGVV8smyMAR/kP7+QcO1FacEUxYa5aHsSWu+E6uWjkbqD878/z6NunGzJiOxQZ Vhj35s0lbKxBCyNrkutxDsY4wkiAEcQQ7t7h8TD5O+S4r53qoCVGV/rAAafdwizj 87P4FhbvgtOeijN1zn+N4eTTUlOixBTHV1TCwHYL7od7bWJ/DdvJX2q6zqQ1lEDV xrAndCdhF3CmaSHA24D4AC6mABGLDWo8cpQbtaIAfhvnrTFf01HOyjPNTZbiOXO1 US14iNngOaPMya4m0OENmKzqLHODxjYBPCyCcz35tWg/kOQz0TW8OkusfYigQZjm lAck6yMjRb1gMtYaQA+y =rqjq -----END PGP SIGNATURE-----