Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Sunday, 21 February 2016 17:57

Apple v FBI: looks like the spooks have been caught out Featured


Last week, when Apple refused to obey a court order asking it to effectively create a backdoor into iOS, its mobile operating system, it looked like a straightforward fight with the FBI.

But now, it looks like the FBI has contrived a situation to try and force Apple to do what many government officials and their supporters have been asking for: get the company to create backdoors into the iPhone.

That is the only conclusion one can draw after a remarkable few days following the FBI's obtaining of the court order asking Apple to create a way to bypass security on an iPhone 5C in order that it could gain access to data on the phone.

After Apple rejected the court order, the FBI filed a motion on Friday, asking that Apple be forced to comply with the earlier court order.

The iPhone that the FBI wants to access belongs to the San Bernardino County Department of Public Health; it was being used by its employee Syed Rizwan Farook, one of the two terrorists who launched an attack last year that killed 14 people.

Apple did not sit quietly by while the FBI was going to court; it began to leak information to the media, something very unusual for a company that only rarely indulges in leaks.

And from these leaks, it looks like Apple has been trying to help the FBI to gain access to the date since January; four options were apparently proposed for data recovery by the company, none of which involved creating a backdoor.

A passcode can be set on any iPhone and when this is entered one can use the device. All data is stored in the cloud and to look at that, the iPhone needs to have its correct Apple ID — again created by the user — entered.

The FBI does not know the passcode. It cannot guess it for two reasons: as one keeps entering passcodes, the time one has to wait to enter the next increases. And random guessing will work only up to a point after which the phone locks up and become useless.

The FBI's initial court order asked Apple to make changes in the firmware to remove these two limitations. It also asked Apple to provide a means of loading this firmware on the iPhone in question. This would then allow the FBI to indulge in random guessing of the passcode using brute force.

Now it turns out that the Apple ID on the phone was changed after the FBI took possession of it; the change was done via the web. Hence one means of gaining access to the data went out the window.

The FBI was pushing the line that this change of ID was done by the San Bernardino County but this has been countered by the revelation that the change was made in co-operation with the FBI. (Feb 22: The FBI has now admitted it asked for the Apple ID to be reset.)

After all these developments, it looks like the claim made by Apple chief executive Tim Cook is true: the FBI wants to create a legal precedent for asking Apple for a backdoor into iOS. This would open the door for everyone and his dog to follow suit.

And it looks like Cook was right to refuse to comply. The FBI has been caught out, not for the first time in its history, of trying to be too clever.


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments