San Bernardino Shooter's Apple Password Changed While in Government Possession

"While the FBI is demanding massive changes in how Apple protects your privacy," explains Van Buren, "none of those changes would even be necessary if anyone on the government side understood how iCloud works."

San Bernardino Shooter's Apple Password Changed While in Government Possession

They lie like a rug.

In an attempt to convince Americans that having encryption and password-beating backdoors installed on their electronics so the government can snoop, the FBI first claimed the evil ISIS terrorists who shot up San Bernardino found a way to "beat" all of the resources of the NSA and lock down their iPhone to prevent further plots from being discovered. Lives were at risk, so the Fourth Amendment be damned!

That wasn't really true.

They lie like a rug.

In an attempt to convince Americans that having encryption and password-beating backdoors installed on their electronics so the government can snoop, the FBI first claimed the evil ISIS terrorists who shot up San Bernardino found a way to "beat" all of the resources of the NSA and lock down their iPhone to prevent further plots from being discovered. Lives were at risk, so the Fourth Amendment be damned!

That wasn't really true.

It turns out, as the Justice Department acknowledged in its court filing, that the passcode of shooter Syed Farook's iCloud account had been reset by the San Bernardino County Department of Public Health, "in an attempt to gain access to some information in the hours after the attack... but that had the effect of eliminating the possibility of an auto-backup." A federal official familiar with the investigation confirmed that investigators were indeed in possession of the phone when the reset occurred.

So, OK, it wasn't the darn terrorists who did it, it was the dumb hicks at the San Bernardino County Department of Public Health. Well, nonetheless, it wasn't the FBI's fault, so the FBI should be given the hacking tools needed to access all iPhone everywhere forever, or, maybe, something might happen again someday somewhere. At least with things in the FBI's hands, such dumb mistakes wouldn't happen.

Only that wasn't really true either.

It turns out it was in fact the best of the best, FBI investigators seeking to recover data from the iPhone, who demanded a technician in the County Department of Public Health to reset the phone's iCloud password. "The county and the FBI were working together cooperatively to obtain data, and at the point when it became clear the only way to accomplish the task at hand was to reset the iCloud password, the FBI asked the county to do so, and the county complied," a spokesman for San Bernardino County said in an email. Except that wasn't true or accurate and they screwed things up further by trying something dumb.

So here is what is true.

Apple could have recovered information from the phone had the Apple ID passcode not been changed under orders from the FBI, Apple said. If the phone was taken to a location where it recognized the Wi-Fi network, such as the San Bernardino shooters' home, it could have easily been backed up to the cloud. The FBI then lied about whose incompetence lead to the mistake.

In other words, while the FBI is demanding massive changes in how Apple protects your privacy, none of those changes would even be necessary if anyone on the government side understood how iCloud works. And these guys want us to believe we can trust them with our data, and indeed, our freedom.

Join Us: News for people demanding a better world


Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place.

We're hundreds of thousands strong, but every single supporter makes the difference.

Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. Join with us today!

© 2023 Peter Van Buren