Feb 21, 2016
The FBI reportedly asked San Bernardino County officials to tamper with the iCloud account of one of the suspected shooters in last December's attack, in an effort that ultimately failed--making it impossible to know if there were other ways of recovering encrypted information without taking Apple to court.
Late Saturday night, San Bernardino officials contradicted the FBI's claims as to who was at fault for a bungled effort at recovering Syed Farook's private data from six weeks before the attack, stating that it complied with the agency's orders to reset Farook's iCloud password.
That effort only worked to prevent an auto-backup of the data the FBI sought, rendering the information "permanently inaccessible."
Apple executives said that means there may have been a way to avoid the momentous privacy battle currently underway between the tech company and the government.
The Washington Post reports:
In the chaotic aftermath of the shootings in San Bernardino, Calif., in December, FBI investigators seeking to recover data from the iPhone of one of the shooters asked a technician in the California county to reset the phone's iCloud password.
But that action foreclosed the possibility of an automatic backup to the Apple iCloud servers that might have turned up more clues to the origins of the terrorist attack that killed 14 people.
"The county and the FBI were working together cooperatively to obtain data, and at the point when it became clear the only way to accomplish the task at hand was to reset the iCloud password, the FBI asked the county to do so, and the county complied," David Wert, a spokesman for San Bernardino County, said in an email.
The FBI admitted this mistake in a legal filing late Friday night, but deflected blame away from the agency, stating, "the owner [San Bernardino County], in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup..."
But a Twitter account associated with San Bernardino County said otherwise.
"The County was working cooperatively with the FBI when it reset the iCloud password at the FBI's request."
\u201cThe County was working cooperatively with the FBI when it reset the iCloud password at the FBI's request.\u201d— SBCounty (@SBCounty) 1455939653
Wert added, "[t]he county said we could get to the information on the cloud if we changed the password or had Apple change the password."
"The FBI asked us to do that, and we did," he said.
Join Us: News for people demanding a better world
Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place. We're hundreds of thousands strong, but every single supporter makes the difference. Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. |
Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.
Nadia Prupis
Nadia Prupis is a former Common Dreams staff writer. She wrote on media policy for Truthout.org and has been published in New America Media and AlterNet. She graduated from UC Santa Barbara with a BA in English in 2008.
The FBI reportedly asked San Bernardino County officials to tamper with the iCloud account of one of the suspected shooters in last December's attack, in an effort that ultimately failed--making it impossible to know if there were other ways of recovering encrypted information without taking Apple to court.
Late Saturday night, San Bernardino officials contradicted the FBI's claims as to who was at fault for a bungled effort at recovering Syed Farook's private data from six weeks before the attack, stating that it complied with the agency's orders to reset Farook's iCloud password.
That effort only worked to prevent an auto-backup of the data the FBI sought, rendering the information "permanently inaccessible."
Apple executives said that means there may have been a way to avoid the momentous privacy battle currently underway between the tech company and the government.
The Washington Post reports:
In the chaotic aftermath of the shootings in San Bernardino, Calif., in December, FBI investigators seeking to recover data from the iPhone of one of the shooters asked a technician in the California county to reset the phone's iCloud password.
But that action foreclosed the possibility of an automatic backup to the Apple iCloud servers that might have turned up more clues to the origins of the terrorist attack that killed 14 people.
"The county and the FBI were working together cooperatively to obtain data, and at the point when it became clear the only way to accomplish the task at hand was to reset the iCloud password, the FBI asked the county to do so, and the county complied," David Wert, a spokesman for San Bernardino County, said in an email.
The FBI admitted this mistake in a legal filing late Friday night, but deflected blame away from the agency, stating, "the owner [San Bernardino County], in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup..."
But a Twitter account associated with San Bernardino County said otherwise.
"The County was working cooperatively with the FBI when it reset the iCloud password at the FBI's request."
\u201cThe County was working cooperatively with the FBI when it reset the iCloud password at the FBI's request.\u201d— SBCounty (@SBCounty) 1455939653
Wert added, "[t]he county said we could get to the information on the cloud if we changed the password or had Apple change the password."
"The FBI asked us to do that, and we did," he said.
Nadia Prupis
Nadia Prupis is a former Common Dreams staff writer. She wrote on media policy for Truthout.org and has been published in New America Media and AlterNet. She graduated from UC Santa Barbara with a BA in English in 2008.
The FBI reportedly asked San Bernardino County officials to tamper with the iCloud account of one of the suspected shooters in last December's attack, in an effort that ultimately failed--making it impossible to know if there were other ways of recovering encrypted information without taking Apple to court.
Late Saturday night, San Bernardino officials contradicted the FBI's claims as to who was at fault for a bungled effort at recovering Syed Farook's private data from six weeks before the attack, stating that it complied with the agency's orders to reset Farook's iCloud password.
That effort only worked to prevent an auto-backup of the data the FBI sought, rendering the information "permanently inaccessible."
Apple executives said that means there may have been a way to avoid the momentous privacy battle currently underway between the tech company and the government.
The Washington Post reports:
In the chaotic aftermath of the shootings in San Bernardino, Calif., in December, FBI investigators seeking to recover data from the iPhone of one of the shooters asked a technician in the California county to reset the phone's iCloud password.
But that action foreclosed the possibility of an automatic backup to the Apple iCloud servers that might have turned up more clues to the origins of the terrorist attack that killed 14 people.
"The county and the FBI were working together cooperatively to obtain data, and at the point when it became clear the only way to accomplish the task at hand was to reset the iCloud password, the FBI asked the county to do so, and the county complied," David Wert, a spokesman for San Bernardino County, said in an email.
The FBI admitted this mistake in a legal filing late Friday night, but deflected blame away from the agency, stating, "the owner [San Bernardino County], in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup..."
But a Twitter account associated with San Bernardino County said otherwise.
"The County was working cooperatively with the FBI when it reset the iCloud password at the FBI's request."
\u201cThe County was working cooperatively with the FBI when it reset the iCloud password at the FBI's request.\u201d— SBCounty (@SBCounty) 1455939653
Wert added, "[t]he county said we could get to the information on the cloud if we changed the password or had Apple change the password."
"The FBI asked us to do that, and we did," he said.
We've had enough. The 1% own and operate the corporate media. They are doing everything they can to defend the status quo, squash dissent and protect the wealthy and the powerful. The Common Dreams media model is different. We cover the news that matters to the 99%. Our mission? To inform. To inspire. To ignite change for the common good. How? Nonprofit. Independent. Reader-supported. Free to read. Free to republish. Free to share. With no advertising. No paywalls. No selling of your data. Thousands of small donations fund our newsroom and allow us to continue publishing. Can you chip in? We can't do it without you. Thank you.