Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 14 submissions in the queue.
posted by mrpg on Tuesday November 21 2017, @01:54AM   Printer-friendly
from the isn't-it-easier-to-ask-the-nsa? dept.

The Texas Rangers have served Apple a warrant for iPhone and iCloud data connected to the recent mass shooter Devin Patrick Kelley. However, it is unknown whether Kelley actually used iCloud to store data, and unlikely that Apple will be able or willing to help unlock the iPhone:

Texas Rangers investigating the mass shooting in Sutherland Springs have served a search warrant on Silicon Valley giant Apple Inc. and are seeking digital photos, messages, documents and other types of data that might have been stored by gunman Devin Patrick Kelley, who was found with an iPhone after he killed himself.

Court records obtained by the San Antonio Express-News show Texas Ranger Kevin Wright obtained search warrants on Nov. 9 for files stored on Kelley's iPhone, a second mobile phone found near his body and for files stored in Kelley's iCloud account — Apple's digital archive that can sync iPhone files.

The iCloud feature is an optional service. Obtaining such records, if they exist, directly from Apple could aid authorities investigating the worst mass shooting in modern Texas history. Apple's policy regarding iCloud content states that material may be provided to law enforcement agencies if they obtain search warrants.

In addition, the FBI may have already screwed it up.

Also at Engadget, BGR, and Fast Company.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 5, Insightful) by Snotnose on Tuesday November 21 2017, @01:58AM (15 children)

    by Snotnose (1623) on Tuesday November 21 2017, @01:58AM (#599480)

    They had 48 hours to get his fingerprint info. You really think the fibbies didn't know about that 48 hour limit? Now they want Apple to spend bookoo bux to hack into his phone. If I was Apple I'd say "this is gonna cost us x engineers at $y per hour, you pay for it. And our encryption experts say we can't break it".

    What do the fibbies need to know? This guy was a major asshole, with multiple red flags over his head. Close the loophole where he was allowed to buy guns and move on.

    --
    When the dust settled America realized it was saved by a porn star.
    • (Score: 3, Insightful) by frojack on Tuesday November 21 2017, @02:58AM

      by frojack (1554) on Tuesday November 21 2017, @02:58AM (#599496) Journal

      Now they want Apple to spend bookoo bux to hack into his phone.

      I suspect they don't expect to gather any information from the phone or iCloud.
      They have never gathered any useful sole-source information from a phone. They have already had more data via other means. (Pen registers, phone records, text message logs, Tower tracks, GPS logs on telco servers).

      The idea is that if they can force Apple to make it easy (by forcing them to bear the costs) encrypted phones will disappear.
      Of course that makes it easier to plant data too.

      To this day they are utterly clueless about the Las Vegas shooter's motives or movements. If they had his phone, they wouldn't find anything there either. The Texas guy was a walking powder keg, there will be nothing on his phone either. No elaborate plans. No accomplices. Nobody else to arrest (except in the AirForce).

      --
      No, you are mistaken. I've always had this sig.
    • (Score: 4, Insightful) by julian on Tuesday November 21 2017, @03:08AM (13 children)

      by julian (6003) Subscriber Badge on Tuesday November 21 2017, @03:08AM (#599499)

      Now they want Apple to spend bookoo bux to hack into his phone.

      They're thinking much bigger than that. They want Apple to change how they do crypto on all their products. What they really want is the per-device key to be exported from the device at setup and stored by Apple in case the Government ever needs to ask for it. Steve Gibson explained it in a recent podcast, [grc.com]

      Ultimately, in every single one of these devices is a master 256-bit symmetric key which is the thing which unlocks the stored data. And we know that it is super well guarded by multiple layers of security, by hardware, by enclave processors and all this, and that Apple doesn't have it currently. We believe them that the device, when it initializes the first time, it uses available entropy to invent this key for its own use, and it never leaves the device. That one thing is all that would need to change. That is, when the device invents this key, comes up with its super-secret, super-guarded, 256-bit symmetric key, that key could be encrypted with a very long, very safe, master transport key, that is, that's in the device.

      This would be a public key using public key technology, which could be used to encrypt this 256-bit per-device symmetric key for transport to Apple, so that Apple then has this unique per-device key in their database. And if called upon on an individual per-device basis, Apple could decrypt that using the highly guarded at Apple matching private key, which would allow per-device access to the contents of the phone. They don't want to do it. I get that. I respect that.

      But there are solutions, is my point, to providing under law single-device access which Apple could at their discretion with this technology choose to make available if legislation is enacted to cause that to happen, without anybody getting a master, any third party, any law enforcement getting any sort of carte blanche access to all of the iPhones in the world.

      • (Score: 5, Informative) by edIII on Tuesday November 21 2017, @03:22AM (4 children)

        by edIII (791) on Tuesday November 21 2017, @03:22AM (#599504)

        They just still don't fucking get it. Security is from the OWNER's point of view. If Apple has your security keys, you have no security.

        Key escrow is an intellectual failure to understand how crypto works.

        --
        Technically, lunchtime is at any moment. It's just a wave function.
        • (Score: 0) by Anonymous Coward on Tuesday November 21 2017, @03:48AM (2 children)

          by Anonymous Coward on Tuesday November 21 2017, @03:48AM (#599518)

          Indeed. I'd love to have the ability to give access to my computers and my stuff after I die, but there's no way of doing that which doesn't compromise security.

          • (Score: 2) by julian on Tuesday November 21 2017, @04:58AM (1 child)

            by julian (6003) Subscriber Badge on Tuesday November 21 2017, @04:58AM (#599541)

            You could create an encryption key and split it into two or more parts and give each part to a different person. Then use that key to encrpyt a Keepass file filled with all your usernames, passwords, and unspeakable secrets.

            Obviously this is only as strong as the integrity of your friends holding the keys; but I think it would be hard to get four different family members or friends to all agree to conspire against you to recombine the key before you died. You could alternatively store one part of the key with your attorney, or put it in a safety deposit box.

            • (Score: 1) by MindEscapes on Tuesday November 21 2017, @02:26PM

              by MindEscapes (6751) on Tuesday November 21 2017, @02:26PM (#599649) Homepage

              And once you pass, they each contrive to kill the others, getting the complete key for themselves, hoping for the riches you kept so securely locked up, an overflowing bitcoin wallet perhaps?!...only to find out it is your SN login info.

              --
              Need a break? mindescapes.net may be for you!
        • (Score: 2) by crafoo on Tuesday November 21 2017, @01:41PM

          by crafoo (6639) on Tuesday November 21 2017, @01:41PM (#599634)

          No, they get it. They just don't care. About your personal security that is.

      • (Score: 4, Informative) by sjames on Tuesday November 21 2017, @03:40AM

        by sjames (2882) on Tuesday November 21 2017, @03:40AM (#599512) Journal

        And then Apple, like the CIA and NSA before them, somehow leaks the gold key to the kingdom to criminals who will then be able to access any iPhone at any time.

      • (Score: 2) by frojack on Tuesday November 21 2017, @04:35AM (3 children)

        by frojack (1554) on Tuesday November 21 2017, @04:35AM (#599534) Journal

        Steve Gibson?
        That idiot is still around?

        --
        No, you are mistaken. I've always had this sig.
        • (Score: 2) by julian on Tuesday November 21 2017, @04:41AM (2 children)

          by julian (6003) Subscriber Badge on Tuesday November 21 2017, @04:41AM (#599538)

          Not a fan? Maybe I've missed something in his long career, I've only been listening to his podcast for a few years. He doesn't seem like an idiot.

          • (Score: 0) by Anonymous Coward on Tuesday November 21 2017, @01:56PM (1 child)

            by Anonymous Coward on Tuesday November 21 2017, @01:56PM (#599640)

            All the hate I've seen for him has been because he was wrong a few times in the past, or because someone disagreed with his stance on something (eg. raw socket availability in Windows).

            • (Score: 1, Insightful) by Anonymous Coward on Tuesday November 21 2017, @07:31PM

              by Anonymous Coward on Tuesday November 21 2017, @07:31PM (#599803)

              Or maybe it's because he says stupid shit like what was quoted above. That's just thinly-veiled propaganda.

      • (Score: 2) by mhajicek on Tuesday November 21 2017, @04:39AM

        by mhajicek (51) on Tuesday November 21 2017, @04:39AM (#599537)

        Saying the words "highly guarded" and "super safe" do not make them true.

        --
        The spacelike surfaces of time foliations can have a cusp at the surface of discontinuity. - P. Hajicek
      • (Score: 3, Informative) by pTamok on Tuesday November 21 2017, @01:22PM (1 child)

        by pTamok (3042) on Tuesday November 21 2017, @01:22PM (#599624)

        This would be a public key using public key technology, which could be used to encrypt this 256-bit per-device symmetric key for transport to Apple, so that Apple then has this unique per-device key in their database. And if called upon on an individual per-device basis, Apple could decrypt that using the highly guarded at Apple matching private key, which would allow per-device access to the contents of the phone. They don't want to do it. I get that. I respect that.

        But there are solutions, is my point, to providing under law single-device access which Apple could at their discretion with this technology choose to make available if legislation is enacted to cause that to happen, without anybody getting a master, any third party, any law enforcement getting any sort of carte blanche access to all of the iPhones in the world.

        If this is what Steve Gibson said, then he was having a seriously off day.

        If Apple have a database of device keys, all the government needs to do is compel Apple to provide either (a) ad lib access to that database to parties nominated by the government or (b) a regularly updated copy of that database. It is so not secure I would be laughing in hysterics if I thought someone really thought that was a reasonable solution. If anyone thinks Apple can't be compelled, there are little things called National Security Letters. If the US government get access, then any jurisdiction where Apple sells iPhones will make a condition of market access that their government gets access too.

        Of course, Apple could already have been compelled to compile such a database in the way Steve Gibson describes, and what we are seeing is a major misdirection campaign to convince us that it hasn't happened. There are so many ways a device key could be 'leaked' back to Apple using side-channels/steganography etc. that mean that it would be practically impossible to show that this was not happening.

        • (Score: 2) by romlok on Tuesday November 21 2017, @02:18PM

          by romlok (1241) on Tuesday November 21 2017, @02:18PM (#599643)

          If the US government get access, then any jurisdiction where Apple sells iPhones will make a condition of market access that their government gets access too.

          I thought that too as I was listening to the podcast. Fortunately, this was actually the very next thing said:

          LEO: The problem with that, of course, is that they're afraid, not so much about the U.S. government, but other governments asking for that kind of access.

          But I think Steve's point was merely that there are technical solutions to allowing warranted access to individually identified devices, which is what the government claims to want, that don't involve any agency holding any backdoor or "golden key".

  • (Score: 1, Informative) by Anonymous Coward on Tuesday November 21 2017, @02:24AM (3 children)

    by Anonymous Coward on Tuesday November 21 2017, @02:24AM (#599489)

    Check that wikipedia article. Woah.

    So 120 officers to deal with all of Texas. The "uniform" is that they are required to wear western-style clothing. So, at their discretion, something vaguely like boots and a cowboy hat.

    Texas disbanded the state police. This is it. WTF.

    • (Score: 5, Funny) by c0lo on Tuesday November 21 2017, @03:04AM (2 children)

      by c0lo (156) Subscriber Badge on Tuesday November 21 2017, @03:04AM (#599497) Journal

      So 120 officers to deal with all of Texas...
      Texas disbanded the state police. This is it. WTF.

      Oh, 119 of them are just the paper-pushers.
      There's only one of them doing the field work and he's more than sufficient**.

      ---

      ** if you don't get it, here are some hints:

      "Not even his heart is foolish enough to attack him"
      "He makes onions cry."
      "He doesn't turn the lights on, he turns the dark off."
      "His calendar goes straight from March 31st to April 2nd. No one fools with him"
      "He and and Hitler were diner having a conversation over dinner when Chuck Norris says 'I hate juice'. Hitler misheard"

      If you clicked this, you are really beyond hope.
      Come on! Really?!?
      You know that, if you dig deep enough, the background will become black?
      You'll need his help to turn the dark off!
      Click the spoiler again. Click it again, I dare you, I double dare you motherfucker, click the spoiler one more Goddamn time!
      Cʜᴜᴄᴋ Nᴏʀʀɪs
      Here you have it . [wikipedia.org]
      --
      https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
      • (Score: 2) by FatPhil on Tuesday November 21 2017, @06:04AM (1 child)

        by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Tuesday November 21 2017, @06:04AM (#599559) Homepage
        > ... Chuck Norris ...
        >
        > [7 layers of nested spoiler tags]
        > Chuck Norris

        Erm, you shot your load too early there, methinks.
        --
        Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
        • (Score: 4, Funny) by c0lo on Tuesday November 21 2017, @12:29PM

          by c0lo (156) Subscriber Badge on Tuesday November 21 2017, @12:29PM (#599612) Journal

          Shit... So it happened.
          Age... retirement...

          --
          https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
  • (Score: 0) by Anonymous Coward on Tuesday November 21 2017, @02:30AM (4 children)

    by Anonymous Coward on Tuesday November 21 2017, @02:30AM (#599491)

    As long as it wasn't Walker, I think Apple will be ok.

    • (Score: 0) by Anonymous Coward on Tuesday November 21 2017, @02:39AM (3 children)

      by Anonymous Coward on Tuesday November 21 2017, @02:39AM (#599495)

      Obviously one of the losers. Chuck Norris don't serve nobody no nothing.

      • (Score: 3, Funny) by c0lo on Tuesday November 21 2017, @03:06AM (2 children)

        by c0lo (156) Subscriber Badge on Tuesday November 21 2017, @03:06AM (#599498) Journal

        When Walker isn't enough [schneierfacts.com]

        --
        https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
        • (Score: 0) by Anonymous Coward on Tuesday November 21 2017, @03:09PM (1 child)

          by Anonymous Coward on Tuesday November 21 2017, @03:09PM (#599671)

          This is the most relevant I have ever seen that site be.

          • (Score: 2) by c0lo on Tuesday November 21 2017, @03:20PM

            by c0lo (156) Subscriber Badge on Tuesday November 21 2017, @03:20PM (#599679) Journal

            If you want the very best within the context, have this [schneierfacts.com] one

            --
            https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
  • (Score: 3, Informative) by NotSanguine on Tuesday November 21 2017, @03:46AM (1 child)

    The Engadget article has been updated as follows:

    Update: We've since learned that the source story isn't entirely accurate. Apple was only served a warrant for iCloud information. There is another warrant to obtain data from the iPhone itself, but it's not targeted at Apple.

    It's not clear how long ago that update appeared.

    --
    No, no, you're not thinking; you're just being logical. --Niels Bohr
  • (Score: 5, Insightful) by MichaelDavidCrawford on Tuesday November 21 2017, @05:05AM

    by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Tuesday November 21 2017, @05:05AM (#599545) Homepage Journal

    my damn phone is endlessly harassing me to sign into the App Store. I already installed Radio Paradise, what more apps do I need?

    You'd have to be an idiot to use cloud storage. I expect it's popular with law enforcement.

    --
    Yes I Have No Bananas. [gofundme.com]
(1)