Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

LiberalArkie

(15,713 posts)
Fri Feb 19, 2016, 05:06 PM Feb 2016

The San Bernardino Terrorist's iCloud Password Was Accidentally Reset By His Employer

Everybody is in a tizzy over whether Apple should comply with a court order to unlock the iPhone of the dead San Bernardino terrorist. But there’s one detail in this whole mess that’s completely bizarre. The terrorist’s employer, the San Bernardino Health Department, accidentally reset the guy’s iCloud password.

Technically, the iPhone in question (the one the FBI is demanding that Apple unlock) was purchased by the San Bernardino Department of Health. And as security researcher Christopher Soghoian has pointed out on Twitter, the Department tried to reset the phone’s password remotely in the hours after the attack. They hoped to gain information from a possible back-up of the phone to iCloud. Instead, they rendered the account useless.

From today’s filing by the Justice Department against Apple :

The four suggestions that Apple and the FBI discussed (and their deficiencies) were: (1) to obtain cell phone toll records for the SUBJECT DEVICE (which, while the government has of course done so, is insufficient because there is far more information on the SUBJECT DEVICE than simply toll records); (2) to determine if any computers were paired with the SUBJECT DEVICE to obtain data (which the government has determined that none were); (3) to attempt an auto-backup of the SUBJECT DEVICE with the related iCloud account (which would not work in this case because neither the owner nor the government knew the password to the iCloud account, and the owner, in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup); and (4) obtaining previous back-ups of the SUBJECT DEVICE (which the government has done, but is insufficient because these backups end on October 19, 2015, nearly one-and-a-half months prior to the IRC shooting incident, and also back-ups do not appear to have the same amount of information as is on the phone itself). After subsequent conversations, though, Apple conceded that none of these suggestions would work to execute the search warrant or to sufficiently obtain the information sought.


Snip

http://gizmodo.com/the-san-bernardino-terrorists-icloud-password-was-accid-1760158613
2 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
The San Bernardino Terrorist's iCloud Password Was Accidentally Reset By His Employer (Original Post) LiberalArkie Feb 2016 OP
"eliminating the possibility of an auto-backup" scscholar Feb 2016 #1
Wait a minute. The data is in iCloud? KamaAina Feb 2016 #2
 

scscholar

(2,902 posts)
1. "eliminating the possibility of an auto-backup"
Fri Feb 19, 2016, 05:10 PM
Feb 2016

So in other words this group of wealthy doctors that didn't know what they were doing ruined the investigation. We'll never know what really happened.

Latest Discussions»General Discussion»The San Bernardino Terror...