When Apple encrypted the iPhone, the Feds built this $10 million hacking compound

While hacking an iPhone to obtain personal information went from the proverbial million bucks for the FBI to crack the San Bernardino shooter’s handset, to the current $15,000 for a Cellebrite machine, the secretive New York lab that the Feds built for the purpose has the price tag of a cool $10 million.
He was a radicalized cadet in the Saudi Air Force who arrived for a training exchange program, and managed to kill three US cadets and wound eight others before being shot by a deputy. The DOJ has pegged the incident as an act of terrorism that was brought on by jihadist beliefs.
Apple immediately jumped for a rebuttal the very same day of Barr’s claim. “We reject the characterization that Apple has not provided substantive assistance in the Pensacola investigation,” stated its PR office. “Our responses to their many requests since the attack have been timely, thorough and are ongoing.”
That “everybody” turns out to be none other than a smorgasbord of government agencies, too, as Grayshift has sold its wares to the U.S. Bureau of Prisons, the Drug Enforcement Administration, the Internal Revenue Service and the FBI. The Bureau has alone purchased $1 million worth of Grayshift devices, meaning that there are probably iPhone encryption crackers in each and every local office now.
The High Technology Analysis Unit opened after Apple started demanding six-digit iPhone passwords
Why is AG Barr co-opting President Trump to pressure Apple into providing a backdoor into its iPhones then? Because cracking them still costs a lot and takes time, it seems, judging from Fast Company’s Manhattan tour of a dedicated FBI facility that sprung into action after Apple started encrypting it all in iOS 8.
The High Technology Analysis Unit’s cracking setup sure looks impressive
The so-called High Technology Analysis Unit has been built on the order of the district attorney of Manhattan, Cyrus Vance Jr., and run by FBI’s Steven Moran.
While you may be fixating on that last sentence, Mr Moran clarifies that the process of cracking an iPhone isn’t really straightforward and requiring brute force only. Apple and Google aren’t sleeping and are making it increasingly harder for the team, so they have to prioritize their hacking approaches.
Since Apple limits the number of times per minute that a passcode can be tried, Moran has to think like Sherlock Holmes to narrow down the possibilities before the prosecution’s window of opportunity—or the statute of limitations—expires. “Do they like the Mets?” Moran explains. “Do they like the Yankees? Is their favorite player Derek Jeter? Is their favorite player Mickey Mantle? What’s the dog’s name? What’s the kid’s birthday? What’s their birthday? Where did they get married? What date did they get married? We are looking for any edge that we can try to find.”
Get that? Never use anything remotely personal as an iPhone password seems to be the takeaway here. It’s still a cat and mouse game, it seems, as at the day of the visit the lab had three thousand handsets waiting to be cracked, and isn’t shy to seek outside help as well. According to Director Moran, “if a third party were to say ‘hey, we have a solution that will work on iOS 12.1.2 and it costs X amount of dollars,’ I can see within five seconds that that’s going to affect 16 different phones.”
That’s where Israeli hacking companies like the one that makes the Cellebrite machine and software come in, and it recently announced a patch that can crack the heretofore off-limits iOS 13 encryption as well. Here is the hacking in action, demonstrated by none other than Scottish law enforcement itself.
Well, revealing the daily pains that FBI’s iPhone cracking forensics lab has to go through in order to find incriminating or exculpatory evidence may very well be part of the strategy to change the public’s perception on the matter but it’s still fascinating to see.