Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Government Iphone Cellphones IOS Privacy Security Software News Apple Technology Your Rights Online

FBI Looks Into Unlocking Minnesota Mall Stabber's iPhone (cnet.com) 99

An anonymous reader quotes a report from CNET: The Minnesota man suspected of stabbing 10 people in a mall before police fatally shot him left behind his iPhone. Now, FBI agents are looking into unlocking his iPhone as part of the investigation. The FBI says Dahir Adan, 20, attacked several shoppers on September 17 in a frenzy, asking his victims if they were Muslim before he stabbed them. ISIS claimed responsibility for attack shortly after. FBI director James Comey told the House Judiciary Committee his agency is reviewing Adan's electronic devices -- but is having issues getting into his iPhone. The device remains locked, as agents are "exploring technical and legal options," Minneapolis FBI spokesman Jeff Van Nest said. He declined to specify what model the iPhone was.
This discussion has been archived. No new comments can be posted.

FBI Looks Into Unlocking Minnesota Mall Stabber's iPhone

Comments Filter:
  • by Anonymous Coward on Friday October 07, 2016 @05:25PM (#53034913)
    ISIS took credit for my stubbed toe last week and these god damn dipshits eat it up ever time. Thanks for being a bunch of fucking gullible retards, America. Begin so incapable of generating even a modicum of rational thought, you deserve every single bad thing that happens to you. Smarten up, you stupid assholes.
    • by gijoel ( 628142 )
      I wish I could mod this up.
    • ISIS took credit for my stubbed toe last week and these god damn dipshits eat it up ever time. Thanks for being a bunch of fucking gullible retards, America. Begin so incapable of generating even a modicum of rational thought, you deserve every single bad thing that happens to you. Smarten up, you stupid assholes.

      ISIS appeals to the obsessive compulsive individuals, who are fully absorbed in their religion, because the religion satisfies a desire to feel good. ISIS makes that individual want to feel great, by doing it's evil deeds. The religion, from what I read, does not tolerate other religions, and thus, there is the motivation to do evil.

  • Please (Score:2, Funny)

    by Anonymous Coward

    Can we start using background checks for knife purchases. How many more incidents like this one before America gets smart and passes sensible knife laws.

  • Terrorists (Score:5, Funny)

    by 110010001000 ( 697113 ) on Friday October 07, 2016 @05:42PM (#53035001) Homepage Journal
    Every terrorist that has been killed has had an iPhone. The only logical conclusion is that iPhones make you a terrorist.
    • by DaHat ( 247651 ) on Friday October 07, 2016 @05:47PM (#53035025)

      Or... terrorists hate the freedom of OSS and prefer the over-priced walled garden model.

    • by rtb61 ( 674572 )

      Every ?terrorist? killed has shown signs of mental health issues, looks like that moron actor Ronny Rayguns idea of crippling social mental health services to save on taxes has been blown up, shot, stabbed and run down, right in all the innocent victims faces. How many lives would have been saved if that idiot had not been allowed to cripple social mental health services and letting US law enforces shoot mentally ill persons at will is not a solution, neither is tying them down and torturing them to death

      • Re:Terrorists (Score:5, Informative)

        by DaHat ( 247651 ) on Friday October 07, 2016 @06:51PM (#53035311)

        I know your hate is strong, your facts are not.

        Do you know how hard it is to involuntarily institutionalize someone due to mental health issues? If you can articulate where you are (ie "in a room, strapped to a bed") and don't make any overt statements about a desire to harm yourself or others... you are going to be left go after just a day or three.

        This was more due to the ACLU and legal challenges and not law/policy of Reagan. Sorry.

        I specifically call out 'involuntarily institutionalize' as that at least gives the hope that someone notices someone is a bit crazy and might do something bad... do you honestly think that the person pondering doing evil is going to say "you know what, I can just so easily go check myself into the dr, spend a few months with some shrinks & meds and be all better and not kill anyone"? Of course not, their mind is so warped that doing what we call evil is good/normal to them.

      • Yeah I am sure the guys who killed 90 in Paris were the fault of Reagan letting the loonies out. You must be one of them.
    • Why, oh why can't we get terrirists to use Android devices?

  • The new line for the Johnnie Cochran's of the world: "If you can't unlock, you must acquit." The reality is that police do have a right, with a court order to search everything related to you, especially if you commit multiple attempted murders. The public has a vested interest in knowing if you had any co-conspirators among other things. That said I am all for strong encryption on all electronics. I think the best solution is some middle ground. I don't know where that middle ground is. The reality i

    • by DaHat ( 247651 ) on Friday October 07, 2016 @06:03PM (#53035113)

      The reality is that police do have a right, with a court order to search everything related to you, especially if you commit multiple attempted murders

      Said right does not require a safe manufacturer to build backdoors into their safes, nor alter the complexity of math.

      That said I am all for strong encryption on all electronics. I think the best solution is some middle ground. I don't know where that middle ground is. The reality is that we the people need to start by requiring the federal government to treat our computers, email and cell phones with the same level of respect for privacy as is given to the US mail (i.e. its a felony to tamper/interfere/gain unauthorized access). Once that is established we can have a conversation about giving access with court order to some or all of these items.

      Easier said than done. The contents of a letter remain secret because people treat it that way. The contents of a safe remain secret because people treat it that way... and have a physical impediment to easy access. The contents of an encrypted device remain secret because the system is designed not to be easily be openable by anyone other than those the legitimate owner has chosen thanks to lots of math.

      Currently, there is no legal requirement for a company like Apple to have a way that they & only can unlock a phone, in fact they've purposely engineered ways to make it more difficult.

      It's easy to say "but in the case of terrorism, we should have the right to compel them!" ok... where do you want that right to end? Are you & Apple ready for divorcing spouses to be going to court to order the seizing of their spouses cell phone and ordering Apple to decrypt it to prove infidelity?

      Such an ability also lowers the bar not only for law enforcement to legitimately investigate (via search warrant) suspects, but also the ability to plenty of others in law enforcement & government to go fishing.

      • by Anonymous Coward on Friday October 07, 2016 @06:22PM (#53035175)

        The current U.S. administration has said (at least in internal documents) that all conservative Christians are potential terrorists and are a bigger threat to security in the U.S. than ISIS. Since this policy has gone uncontested for at least 6 years despite all evidence and statistics to the contrary, I guess all the bureaucrats don't have a problem with this. If we say that encryption must have back doors "because terrorists" then aren't we saying that any group that is out of favor politically should loose their 4th & 5th amendment rights?

        • by Agripa ( 139780 )

          If we say that encryption must have back doors "because terrorists" then aren't we saying that any group that is out of favor politically should loose their 4th & 5th amendment rights?

          They want to deny 2nd amendment rights to those placed on the no-fly list so why not?

        • I see nothing that goes against the fourth or fifth here.

          The right of the people to be secure in their persons, houses, papers, and effects,[a] against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

          No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.

          For the Fifth in fact, it doesn't even apply, the guy is dead.

      • Giving any government backdoor keys will always be bad.

        What about physical access to device. Should the device contain the decryption key, so that it could be decrypted if the flash chip is removed?

        Disassembly that might take a tech an hour or two?

        I ask not for government but for other third parties. If you die should your spouse gave legal right to access your phone and encrypted storages?

        • by DaHat ( 247651 ) on Friday October 07, 2016 @06:44PM (#53035271)

          What about physical access to device. Should the device contain the decryption key, so that it could be decrypted if the flash chip is removed?

          The device always contains a decryption key... it's just a matter of how hard it is to get to... and it may not actually be located in flash memory.

          Disassembly that might take a tech an hour or two?

          Disassembly yes, retrieval, no.

          What do you know about focused ion beam hacking? http://semiengineering.com/eve... [semiengineering.com]

          Short version: A reverse engineer can take a dozen or two chips of the same kind, slowly grind them down layer by later, selecting the best example of each level, then continue the process. Once you've gone through all of the layers you can actually construct a pretty accurate design of the internals. From there, you can use a FIB and some probes to actually get access to the inner workings of the chip.

          Chip designers for years have to various extents attempted to take steps to prevent this. The one advantage they have is doing so is very difficult & expensive... but a successful hack can more than pay for itself.

          I ask not for government but for other third parties. If you die should your spouse gave legal right to access your phone and encrypted storages?

          Which is a fair point. If your loved one goes missing and leaves their phone behind, unlocking it to find out who they were recently talking with may be difficult if not impossible. If someone dies, your window to use their finger to unlock the device is quite short.

          This is only a wider version of a long standing problem... as I don't know many people who make it a point to stash a BitLocker/TrueCrypt/etc keys to a safe spot that will be discoverable upon their disappearance or death, but secure enough that an angry spouse or law enforcement agent wouldn't be able to uncover.

          • by Agripa ( 139780 )

            The device always contains a decryption key... it's just a matter of how hard it is to get to... and it may not actually be located in flash memory.

            The device may only contain the decryption key in the same sense that the device contains the plaintext. If the decryption key is produced from data stored in the device and data entered by the user, then a brute force attack will depend on whichever one has the least entropy which will normally be the user's key. Usually this is small because large passwords are inconvenient but if the password is strong, then there will be no practical attack which relies only on the device.

            I like the thought that this

      • Currently, there is no legal requirement for a company like Apple to have a way that they & only can unlock a phone, in fact they've purposely engineered ways to make it more difficult.

        Absolutely. A "masterkey" system like that would be such a huge target for corporate/government espionage. It becomes the Golden Snitch. Even if it took decades to plant someone at Apple and have them work their way up to gain access, it would still be worth it.

      • "Are you & Apple ready for divorcing spouses to be going to court to order the seizing of their spouses cell phone and ordering Apple to decrypt it to prove infidelity?"

        That is beside the point, since this is all about *Uncle Sam* knowing what is up with Clarise without Clarise's husband ever having an inkling.

        • by DaHat ( 247651 )

          Today it is about Uncle Sam wanting to know, just as it was long ago just about Uncle Sam being able to send a subpoena to Google or Microsoft for the contents of someones inbox. Once that ability exists, private lawyers will find sympathetic judges who will agree to use it in private legal matters as well.

          Don't believe me? Chat with a divorce lawyer sometime as to the weapons one or both members of the case end up using against each other.

          • I don't believe you because you are an idiot if you think the two have anything even remotely to do with each other.
            • by DaHat ( 247651 )

              Says the person who has offered a single argument as to why an investigatory tool created for government would not later be available to private cases.

              Stored data is stored data, and the law and court history is pretty clear as to who can get access and when (where there exists an access method).

    • There is no middle ground. Strong crypto does not allow for the possibility you suggest.

      • by DaHat ( 247651 )

        There are workarounds... the most recent notable example/request being requiring Apple to push a one time update to the San Bernardino terrorists device which would remove the pin lockout counter so that the FBI could try every single combo without fear of wiping the device.

        This idea runs into legal issues as given such an update would be required to be signed by Apple (so that the device trusts the update), it constitute government compelled speech... which the first amendment tends to prevent.

        The bugger i

        • by Qzukk ( 229616 ) on Friday October 07, 2016 @06:44PM (#53035269) Journal

          There also has to be a limit to how much work the government can compel people to do for free to help them uncover evidence. Creating, testing and pushing an OS update is pushing it in my mind.

          Otherwise, why bother paying for infrastructure projects? Just start pressing people into evidence-discovering gangs: "You, you and you. We think there's a corpse buried somewhere under here, start digging. You brought your own shovel, right?"

          • There also has to be a limit to how much work the government can compel people to do for free to help them uncover evidence

            That's an easy answer, nothing for free. The government is willing to pay for this work. No involved is talking about unpaid work.

            • by Agripa ( 139780 )

              That's an easy answer, nothing for free. The government is willing to pay for this work. No involved is talking about unpaid work.

              I want to see the government pay for a brute force attack against a strong key. Given the rate of currency inflation, it will be practically free.

          • https://assets.documentcloud.o... [documentcloud.org]

            The actual court order did not compel Apple to do anything for free, and offered one possible way for them to do it, but also left Apple open to suggest another method. It asked Apple to do an estimate of how much they wanted to be paid, and the way they wanted to do it, to be approved by the FBI.

        • The bugger is that there is always a way, it's just a matter as to how much time/money/leverage is available.

          How much time and money and leverage do you need to decipher a message encrypted with a one time pad that was burned to ash in the explosion?

          • by DaHat ( 247651 )

            We must not allow an infinite monkey gap to exist!

          • by Agripa ( 139780 )

            How much time and money and leverage do you need to decipher a message encrypted with a one time pad that was burned to ash in the explosion?

            It takes the same amount of time and money to decipher a message encrypted with 128 bit AES or any equivalently strong cypher and key, all of it.

            • Crypto like AES is only theoretically secure, and we know the spooks have had their hands in the design all major crypto algorithms in use today.

              XOR is mathematically proven.

              • by Agripa ( 139780 )

                It would certainly be pretty big and devastating news if it was discovered that AES was compromised and even more so that it was compromised by design. There are alternatives to AES like the 4 other finalists of the Advanced Encryption Standard process: MARS, RC6, Serpent, and Twofish.

    • Or they could, you know, stay the fuck out of our personal communications and solve crimes the way they always have. You make it sound like nobody ever solved a crime before computers were invented.
    • by sjames ( 1099 )

      Let's not forget how we got here. Once upon a time, phones didn't encrypt and nobody cared. Then we got secret courts with no working knowledge of the word no, an NSA that decided to ignore the bit about only spying on foreigners, an FBI that decided to get into the spy business, LEOs all the way down to the local yokels thinking it's OK to go fishing and read everyone's papers and effects based on less than probable cause as long as it's electronic, and judges bending over backwards to avoid addressing 4th

    • by plover ( 150551 ) on Friday October 07, 2016 @11:43PM (#53036235) Homepage Journal

      Why should I give up my right to have a secure phone just because some idiot can't keep his sword in his scabbard? It doesn't matter what he's done or if he's alive or dead, I'm not required to have useless encryption on my devices.

      Sure, the police have the right to search his stuff all day long. They can disassemble his phone, unsolder the flash chip, clone it, and try PIN after PIN against the image as many times as they want. They can hire Bruce Schneier, they can subpoena Apple, they can send his phone to the NSA, they can even ask Chuck Norris to roundhouse kick it open. They absolutely have the right to try anything to get in to the phone. But they don't have the right to succeed. They don't have the right to make us make this task easier for them.

      And despite your most fervent wishing that some middle ground exists somewhere, the fact is no middle ground is possible. This is simple logic we're talking about here -- encrypted data is either secure, or it's broken. It's a boolean, not a tri-state value. And law enforcement and intelligence agencies have proven with every leaked secret that they abuse whatever trust or tools they're given, and the volume of abuse increases over time. They have constantly violated our rights and abused our trust, and every single time they start down that path the leaked data shows they've overextended their reach. It's not only irresponsible to trust them again, it's reckless. We can't trust them with a key escrow system, not even with a court protecting us - they'll just stand up another secret FISA court to get around the rules.

      Besides, the existing system worked pretty darn well. Bad guy starts stabbing people, policeman shoots him dead. I don't care what his stupid motives were, because they truly do not matter to anyone. Why should we bother giving his fetid ideas a single extra minute of daylight? Let his defective brain and rancid motives lie buried in the ground with the rest of his corpse in an unmarked grave, and never be shared with the public or media. It's not like learning his motives is useful to anyone. We can't just arrest people who simply share those ideas - people always have the right to think extremely stupid and anti-social thoughts; they just don't have the right to act on them.

      • There is no third option for encryption right now, but that does not mean there can never be one. You argue that there are only two solutions, either good encryption or weak security, and while that may be true right now, and may even always be true from a technical standpoint, there may be other creative options available over time. Maybe it boils down to as you said pulling the phone memory physically and then cloning it and running every possible password until it works. As long as there is a way to g

  • by crimson tsunami ( 3395179 ) on Friday October 07, 2016 @07:07PM (#53035349)

    The Minnesota man suspected of stabbing 10 people in a mall before police fatally shot him left behind his iPhone.

    I didn't realize taking it with you was an option.

  • Local mall. Local police. Why is the FBI in on this gig?

    Yeah for sure they shouldn't get another bite at the [encryption debate] Apple... but why are they even involved and why won't someone say "Hey they have no standing here. This was a simple case of a stabbing and a shooting and it's all local and the FBI has NO JURISmyDICTION here!!!" ?

    E

    • by DaHat ( 247651 )

      Because of ties to terrorism? ... and having more tools to try to recover data than your local PD?

    • Local mall. Local police. Why is the FBI in on this gig?

      Yeah for sure they shouldn't get another bite at the [encryption debate] Apple... but why are they even involved and why won't someone say "Hey they have no standing here. This was a simple case of a stabbing and a shooting and it's all local and the FBI has NO JURISmyDICTION here!!!" ?

      E

      ISIS claimed responsibility. They are an international terrorist organization. That automatically makes it federal jurisdiction.

    • by Agripa ( 139780 )

      Local mall. Local police. Why is the FBI in on this gig?

      The knife traveled in or affected interstate commerce.

  • Given that encryption came due to pressure from celebrities and Apple's failure to unlock to help cases impacting ordinary individuals, it's a bad thing.

    • Given that encryption came due to pressure from celebrities and Apple's failure to unlock to help cases impacting ordinary individuals, it's a bad thing.

      Citation?

  • Given that encryption came due to pressure from immodestly exposed celebrities and Apple's failure to unlock to help cases impacting decent, hard-working, ordinary individuals, it's a bad thing.

"You'll pay to know what you really think." -- J.R. "Bob" Dobbs

Working...