Connect with us


The U.S. government is pressuring Apple to unlock an iPhone. Again.



Here we go again. 

Attorney General William Barr is pressuring Apple to help law enforcement unlock two iPhones that once belonged to the now deceased Royal Saudi Air Force lieutenant who attacked the Pensacola Naval Air Station on Dec. 6 of last year. Barr claimed in a Monday press conference that, without Apple’s help, investigators will likely remain unable to access  the devices’ contents. 

We’ve heard similar dubious claims from the government before.  

The issue at hand, according to Barr, is that Apple designed the phones to be “virtually impossible to unlock…without the password.” As such, the Attorney General today asked Apple to “help” unlock the phones. 

Apple, for its part, has said that it cannot break the encryption on its phones — even if it wanted to do so. 

“This situation perfectly illustrates why it is critical that investigators be able to get access to digital evidence once they have obtained a court order based on probable cause,” Barr said.

Notably, there are devices and companies that claim to be able to unlock iPhones for law enforcement. We know the U.S. government knows this, because it was able to gain access to a locked iPhone back in 2016 following the 2015 San Bernardino shooting. And sure, times and technologies change, but as ICE signed a contract with one such company as recently as last May, it’s likely iPhones still aren’t 100 percent uncrackable.   

Today’s pressure on Apple, similar to the government’s attempt to set a legal precedent following the San Bernardino shooting, appears concerned more with making a public case for developing encryption backdoors than this particular incident itself. 

Even Barr hinted as much.

“We call on Apple and other technology companies to help us find a solution so that we can better protect the lives of Americans and prevent future attacks,” he said at the press conference. 

Technology and privacy experts have long warned against creating such a backdoor, noting that once it exists it is destined to fall into the hands of criminals. 

“Any backdoor in encryption can be just as easily used by bad actors as by law enforcement if it gets leaked,” noted the Electronic Frontier Foundation in 2018, “and once a hard-coded backdoor is discovered, it often can’t be closed.”

SEE ALSO: You can buy used Cellebrite iPhone hacking tools for cheap on eBay

We reached out to Apple for comment, but received no response as of press time. However, we imagine the company will repeat what it’s been saying for years: Encryption backdoors are inherently dangerous, and it can’t unlock iPhones anyway. 

That won’t stop Attorney General Barr and the Trump administration, though. 

Continue Reading
Advertisement Find your dream job