web analytics

The Justice Department Successful Hacks Into iPhone Without Apple

Will Justice Department Disclose The Vulnerability

iphone-hacked

The long on going case of the US Justice Department compelling Apple to create a backdoor which would allow the authorities to access Syed Rizwan Farook, a gunman which took lives of 14 people in San Bernardino has now come to a close. The authorities hinted earlier that they have found a third party hacker which would allow them to hack into the iPhone without altering any data. This process raises a question, because according to Authorities, Justice Department don’t have to disclose the vulnerability, if they choose not to then they may use it on other cases as well.

The government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple… Accordingly, the government hereby requests that the Order Compelling Apple Inc. to Assist Agents in Search dated February 16, 2016 be vacated.

“It remains a priority for the government to ensure that law enforcement can obtain crucial digital information to protect national security and public safety, either with cooperation from relevant parties, or through the court system when cooperation fails,” she added. “We will continue to pursue all available options for this mission, including seeking the cooperation of manufacturers and relying upon the creativity of both the public and private sectors.” – Melanie Newman, a spokeswoman for the Justice Department


From a legal standpoint, what happened in the San Bernardino case doesn’t mean the fight is over,” said Esha Bhandari, a staff attorney at the American Civil Liberties Union

She continues saying that she hopes authorities disclose the information so Apple can patch the security on the iPhones.

“I would hope they would give that information to Apple so that it can patch any weaknesses,” she said, “but if the government classifies the tool, that suggests it may not.”

Author: Shivniel Gounder

TheGeek : Writes about information security, privacy, cybersecurity and latest tech gadgets and more.

Share This Post On

Submit a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: