Apple May Never Find Out How The FBI Cracked The iPhone

Apple May Never Find Out How The FBI Cracked The iPhone
Apple CEO Tim Cook Mike Deerkoski / Flickr cc

The iPhone that was used by the San Bernardino shooter, Syed Farook, has been unlocked by the FBI. But the government found no important evidence after spending over $1.3 million to decrypt the phone.


The tool used by the FBI to break into the iPhone was purchased from an outside provider when its public battle against Apple brought no conclusion. Although the Justice Department was unsure about this method, it decided to pass the motion, cancelling their fight against getting Apple onboard in cracking Syed Farook’s iPhone.

In the court filing, the Justice Department’s lawyer wrote “On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking Farook’s iPhone,” Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple…set forth in the All Writs Act Order in this case.”

The bureaus lead may have ran cold but, Apple’s keen interest in learning how the IOS was hacked has been ignored by the FBI as they seem to have no intention to share. The FBI is seemingly trying to tackle the situation as they say the process is quite a mystery even to them according to The Wall Street Journal.

Like us on Facebook

The reports from Journal say that a group going by the name Vulnerabilities Equities Process panel could provide information to Apple to tackle the security weakness, if any. But, it still requires the FBI to report the vulnerability to the group to share their details.

During the FBI’s cybersecurity event in Washington, DC, on Tuesday, Director James Comey said disclosing such information is not essential. According to a report by Fortune, Comey went on to say, “The threshold is, are we aware of the vulnerability, or did we just buy a tool and don’t have sufficient knowledge of the vulnerability to implicate the process?”

Also Read: Apple’s Encryption Flawed- John Hopkins 

For more technology news, you can subscribe to our newsletter. If you are a social media junkie and would like to receive updates on your timeline, then you can also like us on Facebook or follow us on Twitter.