EFTA01740175
EFTA01740176 DataSet-10
EFTA01740180

EFTA01740176.pdf

DataSet-10 4 pages 985 words document
D6 P19 P17 V16 V13
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (985 words)
From: Richard Kahn ‹ > Sent: Tuesday, March 29, 2016 9:56 PM To: Jeffrey E. james commentary on apple / fbi situation Richard Kahn HBRK Associates Inc. 575 Lexington =venue 4th Floor New York, NY 10022 tel fax cell Begin forwarded message: From: =/b>james I personal genius Subject: =/b>Re: Date: =/b>March 29, 2016 at 5:32:36 PM =DT To: qb>Richard Kahn One more thing of note, had the FBI / DOJ =revailed in court, they'd have wide reaching new powers to compel =hird-parties to act on their behalf, even at the expense of the =hird-parties' self interest. They could, for example, have a court =ompel me to install tracking software on Jeffrey's systems and forbid =e from disclosing it. Not that they could actually get me to do =omething like that, but it's within their proposed legal =ustification. Also relevant is this: https://www.washingtonpost.com/news/the-watch/wp/2016/03/10/sur=rise-nsa-data-will- soon-routinely-be-used-for-domestic-policing-that-has-=othing-to-do-with-terrorism/ The surveillance state is not just for =errorism anymore. Thank you, EFTA_R1_00029344 EFTA01740176 On Mar 29, 2016, at 5:19 PM, Richard Kahn > wrote: interesting„ thanks Richard Kahn HBRK Associates Inc. 575 Lexington =venue 4th Floor New York, NY 10022 tel fax cela On Mar 29, 2016, at 4:22 PM, james ce I personal genius = <mato > wrote: There are two =ikely methods* that could have been used to access the data on that =hone: 1. An =npublished "zero-day" bug that allows hackers to bypass =he lock screen and access encrypted data on the phone. 2. A =ardware solution where the memory chip (the flash storage on the phone) =as un-soldered from the logic board, and plugged into a machine that =an read / write the data from the chip (this is not new, this method =as actually used in the 1985 movie "Real Genius"), =hich then duplicated the data on the chip and simulated the =hone's hardware. With that setup you can brute-force try =11 four-digit passcode options. When the device slows down/erases the =ata from too many failed attempts, you just copy it over and pickup =here you left off. Depending on how much data / size of the flash =emory chip, you can restore the original data in 5-20 =inutes. The =econd method is MUCH more likely to have been used. It will work on any =Phone that does NOT have a fingerprint reader. Touch ID relies on a =secure enclave" chip that manages the login attempts and would =e effectively impossible to impersonate — so this method is =omething that Apple is aware of and has considered. *there's a third method called "de-capping=E244 which involves using microlasers to sear off the top of the =PU to read the device's unique identifier, which is the much =ore complex part of the two-part encryption key that the iPhone =ses. 2 EFTA_R1_00029345 EFTA01740177 Basically, =pple uses this hardware device ID combined with the passcode as the key =o encrypt the data. With the device ID, they can try to decrypt the raw =ata from the flash module within 10,000 tries. The problem is that de-capping is very risky =amp; fragile. If you cut a micron too deep you destroy the identifier =ou're looking for and there's no possibility of =ecovering the data in anyway after. This makes this method practically =seless for any legal inspection. We'll never know which, if either method was used .=94 or even if any relevant data was recovered. Since the suspects are =ead, any evidence recovered from the phone and the methodology used to =ccess it will never be entered into any court case. If the first method was =sed and such a zero-day does exist — then yes, a "hacker =rmy" could have been theoretically unleashed on Apple. In that =ituation, it's very likely we'll see it used in a =uture public jailbreak method to break into the OS — hackers =re notoriously bad at keeping secrets, being that exposing secrets is =he primary motivation for most hackers — at which point =pple will find out about it and fix it. It's at least =qually as likely that the whole "we broke in without Apple'= help" story is complete fiction that the FBI / DOJ used it as =n excuse to bail from a case that was going to make them look like =echnical incompetents, and would be lost, setting the precedent they =ant in the wrong direction. The last brief Apple filed exposed some =ajor technical inaccuracies in the DOJ briefs, and any hearing would =ave included Apple Engineers schooling the courts on the basics of how =ncryption works and embarrassed the FBI's technical =esources. Also,=remember that this iPhone belonged to the terrorist's employer. =oth he & his wife had personal cell phones and computers which they =estroyed the day of the attack. The iCloud backup of this phone from a =ouple weeks previous to the attack revealed NO personal email, text =essages or any other internet accounts on the device. It's very =nlikely that iPhone was ever used for anything outside of work or =ontains anything of value to investigators. This case was never =bout anything on that phone, rather it was a hot-button political case =o expand the government's investigatory powers. (Also, contrary to that article's subheading, =he FBI never asked for Apple to unlock the phone before pursuing legal =rders... that sounds nitpicky, but were they actually concerned =ith the contents of the device, you'd expect the FBI to ask =icely before trying to force-conscript private corporate resources into =ewriting the device's operating system.) I =et this will come up again as soon as the FBI's newest toys =top working, but next time it will be an Android device in hopes that =oogle won't raise as much of a fuss as Apple. 3 EFTA_R1_00029346 EFTA01740178 On Mar 29, 2016, at 3:27 PM, Richard Kahn < wrote: http://www.thedailybeast.com/articles/2016/03/29/did-the-fbi-ju=t-unleash-a-hacker- army-on-apple.html thoughts? Richard Kahn HBRK Associates Inc. 575 Lexington =venue 4th Floor New York, NY 10022 tel = fax cell 4 EFTA_R1_00029347 EFTA01740179
ℹ️ Document Details
SHA-256
414e50b8cfc6553bd59b3b0f5b01e33fd7d50c875813d62186fa86c69b13dfaf
Bates Number
EFTA01740176
Dataset
DataSet-10
Document Type
document
Pages
4

Comments 0

Loading comments…
Link copied!