ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label

Apple Decrypts Seized iPhones For The Police Unknown rwxr-xr-x 0 5/11/2013

Filename Apple Decrypts Seized iPhones For The Police
Permission rw-r--r--
Author Unknown
Date and Time 5/11/2013
Label
Action
Ethical Hacking Institute in Pune
./Arizona Team

The security features built into Apple’s iOS software are so good that the police are unable to gain access to defendant’s iPhones when they need to.  Companies like Apple and Google are being asked by law enforcement officials to bypass these protections to aid in investigations.






















Apple receives so many police demands to decrypt seized iPhones that it has created a waiting list to handle the deluge of requests. In one of the recent cases, according to court documents, the federal agents were baffled by the encrypted iPhone 4S of a man in Kentucky who was charged for supplying crack cocaine.

CNET reports that ATF agent Rob Maynard spent three months trying to “locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock” an iPhone 4S. After everyone said that they did not have the capabilities, Maynard turned to Apple.

Apple can reportedly bypass the security lock to get access to data on a phone, download it to an external device and hand that over to the authorities.

In Nevada also, a similar case surfaced when the agents there told a judge that they are not able to probe into a sized iPhone and iPad because it is encrypted. The Drug enforcement Administration has also faced a similar issue with encryption problem in iMessage chat service as per an internal document.

The documents shed light on the law enforcement practice of doing forensic analysis on locked mobile devices, and it is growing in demand.

It’s unclear whether Apple has purposely built a backdoor into its iOS software for access in these situations, or whether it uses custom tools to gain access. Apple specifically states in its privacy policy that it may disclose personal information "by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence".

There are a few software packages that claim to be able to extract some or all information stored on encrypted iOS devices and other mobile phones, like Elcomsoft's iOS Forensic Toolkit and Oxygen Forensics Suite 2013.

www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan