I like Google's approach, resetting the password and then supplying that
the LE. You definitely get notified. I am wondering what happens when you
have two factor author enabled? I imagine you would receive an SMS the
first time LE tries to log in. You could then reset the password and make
them go through the whole process again. :-)
On May 10, 2013 7:00 PM, "Jeffrey Walton" <noloa...@gmail.com> wrote:

> Why break it when you can go around it....
>
>
> http://news.cnet.com/8301-13578_3-57583843-38/apple-deluged-by-police-demands-to-decrypt-iphones/
>
> Apple receives so many police demands to decrypt seized iPhones that
> it has created a "waiting list" to handle the deluge of requests, CNET
> has learned.
>
> Court documents show that federal agents were so stymied by the
> encrypted iPhone 4S of a Kentucky man accused of distributing crack
> cocaine that they turned to Apple for decryption help last year.
>
> An agent at the ATF, the federal Bureau of Alcohol, Tobacco, Firearms
> and Explosives, "contacted Apple to obtain assistance in unlocking the
> device," U.S. District Judge Karen Caldwell wrote in a recent opinion.
> But, she wrote, the ATF was "placed on a waiting list by the company."
>
> A search warrant affidavit prepared by ATF agent Rob Maynard says
> that, for nearly three months last summer, he "attempted to locate a
> local, state, or federal law enforcement agency with the forensic
> capabilities to unlock" an iPhone 4S. But after each police agency
> responded by saying they "did not have the forensic capability,"
> Maynard resorted to asking Cupertino.
>
> Because the waiting list had grown so long, there would be at least a
> 7-week delay, Maynard says he was told by Joann Chang, a legal
> specialist in Apple's litigation group. It's unclear how long the
> process took, but it appears to have been at least four months.
>
> [Image and excerpt from ATF affidavit, which says Apple "has the
> capabilities to bypass the security software" for law enforcement.]
>
> The documents shed new light on the increasingly popular law
> enforcement practice of performing a forensic analysis on encrypted
> mobile devices -- a practice that can, when done without a warrant,
> raise Fourth Amendment concerns.
>
> Last year, leaked training materials prepared by the Sacramento
> sheriff's office included a form that would require Apple to "assist
> law enforcement agents" with "bypassing the cell phone user's passcode
> so that the agents may search the iPhone." Google takes a more
> privacy-protective approach: it "resets the password and further
> provides the reset password to law enforcement," the materials say,
> which has the side effect of notifying the user that his or her cell
> phone has been compromised.
>
> Ginger Colbrun, ATF's public affairs chief, told CNET that "ATF cannot
> discuss specifics of ongoing investigations or litigation. ATF follows
> federal law and DOJ/department-wide policy on access to all
> communication devices."
>
> In a separate case in Nevada last year, federal agents acknowledged to
> a judge that they were having trouble examining a seized iPhone and
> iPad because of password and encryption issues. And the Drug
> Enforcement Administration has been stymied by encryption used in
> Apple's iMessage chat service, according to an internal document
> obtained by CNET last month.
> Bypassing Apple's security
>
> The ATF's Maynard said in an affidavit for the Kentucky case that
> Apple "has the capabilities to bypass the security software" and
> "download the contents of the phone to an external memory device."
> Chang, the Apple legal specialist, told him that "once the Apple
> analyst bypasses the passcode, the data will be downloaded onto a USB
> external drive" and delivered to the ATF.
>
> It's not clear whether that means Apple has created a backdoor for
> police -- which has been the topic of speculation in the past --
> whether the company has custom hardware that's faster at decryption,
> or whether it simply is more skilled at using the same procedures
> available to the government. Apple declined to discuss its law
> enforcement policies when contacted this week by CNET.
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.
>
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to