Arthur T Knackerbracket has found the following story:
Law enforcement agents in New York City have been able to crack iPhones in-house since January 2018 — some 18 months before the capability was revealed by the company supplying the technology.
It was June 2019 that Israeli forensics firm Cellebrite announced that its “new” UFED Premium product would, for the first time, allow customers to unlock iPhones in their own offices, rather than have to send them to the company’s own labs. But a new report today found that the product has been in use for far longer than this…
The original announcement made it sound like Universal Forensic Extraction Device Premium was brand-new.
The only on-premise solution for law enforcement agencies to unlock and extract crucial mobile phone evidence from all iOS and high-end Android devices.
A comprehensive solution to access iOS and high-end Android devices.
Bypass or determine locks and perform a full file system extraction on any iOS device, or a physical extraction or full file system (File-Based Encryption) extraction on many high-end Android devices, to get much more data than what is possible through logical extractions and other conventional means.
Gain access to third-party app data, chat conversations, downloaded emails and email attachments, deleted content, and more, increase your chances of finding the incriminating evidence and bringing your case to a resolution.
But a OneZero report says it has proof that the Manhattan District Attorney’s office had already been using the product to crack iPhones in-house for 18 months by that time.
[...]A contract obtained by OneZero shows that the Manhattan District Attorney’s office — one of the largest and most influential prosecution offices in the country — has had UFED Premium in-house since January 2018. According to the contract, the DA’s office agreed to pay Cellebrite about $200,000 over three years for UFED Premium.
(Score: 0) by Anonymous Coward on Thursday October 10 2019, @02:04AM (6 children)
Apple iPhones have been crackable by the LEA-tards since the original working prototypes were designed & built.
(Score: 4, Informative) by takyon on Thursday October 10 2019, @02:33AM (2 children)
Newer revisions fix old software and hardware bugs. What worked for iPhone 0 probably won't work for iPhone 11.
Manufacturers and software developers fixing bugs means that LEAs have to shell out more cash for the latest phone hacking vulns and kit.
Cybrocriminals have an incentive to hack companies like Cellebrite. They are hoarding those sweet, monetizable zero-days.
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: -1, Offtopic) by Anonymous Coward on Thursday October 10 2019, @02:45AM
Do you miss the goode olde days of Civil War times when Glorious President Abraham Lincoln tapped everyone's telegraph lines?
(Score: 3, Interesting) by Freeman on Thursday October 10 2019, @03:48PM
I wouldn't be so sure.
https://soylentnews.org/article.pl?sid=19/09/27/1720202 [soylentnews.org]
When you hear about things like this. You kind of wonder, what haven't they found?
Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
(Score: 3, Funny) by Coward, Anonymous on Thursday October 10 2019, @06:29AM (1 child)
What do you call the engineers who cooked up this weak sauce security that Apple brags about? I guess they were phoning it in.
(Score: 0) by Anonymous Coward on Thursday October 10 2019, @11:20AM
Sorry I don't have any mod points right now. That was nice.
(Score: 2) by corey on Thursday October 10 2019, @08:58AM
Citations?