The unidentified group that assisted the FBI in unlocking the San Bernardino shooter's iPhone has sole legal ownership of the exploit, making it highly unlikely to be shared with Apple, U.S. administration sources have revealed.

According to a report published by Reuters yesterday, the White House routinely reviews technology security flaws as part of its Vulnerabilities Equities Process to decide which ones should be made public, but it does not reveal flaws discovered or owned by private organizations without their explicit cooperation.

applefbi
Initial rumors had suggested the FBI received assistance from Israeli mobile forensics firm Cellebrite to hack the phone, but more recent information suggests the group involved consisted of "professional hackers" who sell flaws to governments, black market groups, or companies that create surveillance tools.

The FBI itself likely does not know the details of the technique, only simply that it worked, according to government sources and Rob Knake, who managed the Vulnerabilities Equities Process before leaving the White House last year.

The news is being seen as a blow to Apple, which has sought information regarding the exploit used by the FBI to unlock suspected terrorist Syed Farook's iPhone in the hope of fixing it before it can be used by criminals. Previously FBI director James Comey had said the government was contemplating the pros and cons of looping Apple in on the situation.

In a separate report published by CBS News yesterday, a law enforcement source revealed that the data successfully extracted from Farook's iPhone has yet to reveal any information relevant to the FBI investigation. However, the source stressed that the bureau continues to analyze the extracted data in the hope that something of significance will yet be discovered.

After a very public legal battle in which the FBI obtained a court order demanding Apple help the government unlock the iPhone used by Farook, the Justice Department dropped the lawsuit after announcing it had found an alternate method to gain access to the phone's data.

Comey has since said the exploit only works on a "narrow slice of phones", which does not include models of the iPhone 5s and after.

Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Politics, Religion, Social Issues forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.

Top Rated Comments

Gymgenius Avatar
112 months ago
How can someone have legal ownership of an exploit?

That's like me saying I have legal ownership of 'smashing a window with a hammer to break it'.
Score: 8 Votes (Like | Disagree)
0007776 Avatar
112 months ago
The FBI itself likely does not know the details of the technique, only simply that it worked, according to government sources and Rob Knake, who managed the Vulnerabilities Equities Process before leaving the White House last year.
If it is true that they were briefing senators on the technique then they know how to do it. And as for not revealing the technique I can't imagine that a competent defense lawyer can't force them to reveal it to prove that incriminating data wasn't added to the phone in the process if it is ever used in a case that comes to trial. Also I would think if they try to force Apple to create a backdoor again Apple could get a judge to make them reveal the technique so their engineers can be sure that it doesn't work on whatever version of the phone they want a backdoor to.
Score: 5 Votes (Like | Disagree)
Dilster3k Avatar
112 months ago
Something seems so off about this whole thing. The way the trial got delayed and then cancelled, how the method is kept under wraps, and even more reports saying that the content on the phone has been deemed irrelevant as well, apparently. As far as we know they may have not even gotten into the phone and it's all just a bluff.
Score: 4 Votes (Like | Disagree)
JosephAW Avatar
112 months ago
This is just a smoke screen. They figured out the guys password. It was password.
Score: 3 Votes (Like | Disagree)
NT1440 Avatar
112 months ago
FBI won't say anything, purely because it would cast sunshine on the grey industry of shopping around exploits in common software (windows/Mac/iOS/Android/etc.) to private companies and law enforcement/regimes around the world.
Score: 3 Votes (Like | Disagree)
b0nd18t Avatar
112 months ago
So the FBI is essentially turning apples own defense tactic against them. Saying they "don't know" how to access the phone so their hands are tied. Well played FBI.
Score: 2 Votes (Like | Disagree)

Popular Stories

iPhone SE 4 Thumb 1

iPhone SE 4 With Apple's Own 5G Modem 'Confirmed' to Launch in March

Tuesday November 19, 2024 12:12 pm PST by
Barclays analyst Tom O'Malley and his colleagues recently traveled to Asia to meet with various electronics manufacturers and suppliers. In a research note this week, outlining key takeaways from the trip, the analysts said they have "confirmed" that a fourth-generation iPhone SE with an Apple-designed 5G modem is slated to launch towards the end of the first quarter next year. In line with previo...
airtag purple

AirTag 2 Rumored to Launch Next Year With These New Features

Sunday November 17, 2024 5:18 am PST by
Apple released the AirTag in April 2021, so it is now three over and a half years old. While the AirTag has not received any hardware updates since then, a new version of the item tracking accessory is rumored to be in development. Below, we recap rumors about a second-generation AirTag. Timing Apple is aiming to release a new AirTag in mid-2025, according to Bloomberg's Mark Gurman....
Magic Mouse Next to Keyboard

No, Apple CEO Tim Cook Didn't Say He Prefers Logitech's MX Master 3 Over the Magic Mouse

Sunday November 17, 2024 3:03 pm PST by
While the Logitech MX Master 3 is a terrific mouse for the Mac, reports claiming that Apple CEO Tim Cook prefers that mouse over the Magic Mouse are false. The Wall Street Journal last month published an interview with Cook, in which he said he uses every Apple product every day. Soon after, The Verge's Wes Davis attempted to replicate using every Apple product in a single day. During that...
Generic iOS 18 Feature Real Mock

Apple Releases iOS 18.1.1 and iPadOS 18.1.1 With Security Fixes

Tuesday November 19, 2024 10:10 am PST by
Apple today released iOS 18.1.1 and iPadOS 18.1.1, minor updates to the iOS 18 and iPadOS 18 operating systems that debuted earlier in September. iOS 18.1.1 and iPadOS 18.1.1 come three weeks after the launch of iOS 18.1. The new software can be downloaded on eligible iPhones and iPads over-the-air by going to Settings > General > Software Update. Apple has also released iOS 17.7.2 for...
at t turbo indicator iphone 16 pro max v0 8hrh7w5f3w1e1

AT&T Turbo Indicator Showing Up in iPhone Status Bar for Subscribers

Wednesday November 20, 2024 3:42 am PST by
AT&T has begun displaying "Turbo" in the iPhone carrier label for customers subscribed to its premium network prioritization service, according to reports on Reddit. The new indicator seems to have started appearing after users updated to iOS 18.1.1, but that could be just coincidence. Image credit: Reddit user No_Highlight7476 The Turbo feature provides enhanced network performance through ...
iPhone 17 Slim Feature Single Camera 1 Redux

'iPhone 17 Air' Rumored to Surpass iPhone 6 as Thinnest iPhone Ever

Monday November 18, 2024 1:07 pm PST by
In a research note with Hong Kong-based investment bank Haitong today, obtained by MacRumors, Apple analyst Jeff Pu said he agrees with a recent rumor claiming that the so-called "iPhone 17 Air" will be around 6mm thick. "We agreed with the recent chatter of an 6mm thickness ultra-slim design of the iPhone 17 Slim model," he wrote. If that measurement proves to be accurate, there would be ...
bug security vulnerability issue fix larry

Make Sure to Update: iOS 18.1.1 and macOS Sequoia 15.1.1 Fix Actively Exploited Vulnerabilities

Tuesday November 19, 2024 10:52 am PST by
The iOS 18.1.1, iPadOS 18.1.1, and macOS Sequoia 15.1.1 updates that Apple released today address JavaScriptCore and WebKit vulnerabilities that Apple says have been actively exploited on some devices. With the JavaScriptCore vulnerability, processing maliciously crafted web content could lead to arbitrary code execution. The WebKit vulnerability had the same issue with maliciously crafted...