San Francisco Chronicle

If Apple cooperates, leaks grow more likely

-

Suppose Apple loses its court fight with the FBI and has to produce a software tool that would help agents hack into an iPhone — specifical­ly, a device used by one of the San Bernardino mass shooters. Could that tool really remain secret and locked away from potential misuse?

Not very likely, according to security and legal experts, who say a “potentiall­y unlimited” number of people could end up getting a close look at the tool’s inner workings. Apple’s tool would have to run a gauntlet of tests and challenges before any informatio­n it helps produce can be used in court, exposing the company’s work to additional scrutiny by forensics experts and defense lawyers — and increasing the likelihood of leaks with every step.

True, the Justice Department says it wants a tool that would only work on the San Bernardino phone and that would be useless to anyone who steals it without Apple’s closely guarded digital signature.

But widespread disclosure of the software’s underlying code could allow government agents, private companies and hackers across the world to

dissect Apple’s methods and incorporat­e them into their own devicecrac­king software. That work might also point to previously unknown vulnerabil­ities in iPhone software that hackers and spies could exploit.

Cases in which prosecutor­s have signaled interest in the Apple tool, or one like it, continue to pile up. In Manhattan, for instance, the district attorney’s office says it holds 205 encrypted iPhones that neither it nor Apple can currently unlock, up from 111 in November. Such pent- up demand for the tool spells danger, said Andrea Matwyshyn, a professor of law and computer science at Northeaste­rn University, since its widespread disseminat­ion presents a clear threat to the security of innocent iPhone users.

“That’s when people get uncomforta­ble with a potentiall­y unlimited number of people being able to use this in a potentiall­y unlimited number of cases,” Matwyshyn said.

The concerns raised by experts mirror those in Apple’s own court filings, where the company argues that the tool would be “used repeatedly and poses grave security risks.” Outside experts note that nothing would prevent other prosecutor­s from asking Apple to rewrite the tool for the phones they want to unlock, or hackers from reverse engineerin­g it for their own purposes.

Apple’s long history of corporate secrecy suggests it could keep the tool secure during developmen­t and testing, said John Dickson, principal at Denim Group, a San Antonio software security firm. But after that, “the genie is out of the bottle,” he said.

Even if the software is destroyed after use in the San Bernardino case, government authoritie­s — in the U. S. or elsewhere — could always compel them to re- create it.

Apple argues that the tool, which is essentiall­y a new version of its iOS phone operating software, would need rigorous testing. That would include installing it on multiple test devices to ensure it won’t alter data on the San Bernardino iPhone.

Similarly, the company would need to log and record the entire software creation and testing process in case its methods were ever questioned, such as by a defense attorney. That detailed record itself could be a tempting target for hackers.

Before informatio­n extracted by the Apple tool could be introduced in court, the tool would most likely require validation by an outside laboratory, according to forensics experts such as Jonathan Zdziarski, who described the process in a post on his personal blog. For instance, Apple might submit it to the National Institute of Standards and Technology, an arm of the Commerce Department, exposing its underlying code and functions to another outside group of experts.

The likelihood of someone stealing the tool grows with every copy made, said Will Ackerly, a former National Security Agency employee who’s now chief technology officer at Virtru, a computer security startup. And while Apple may be known for its security, the federal government isn’t.

Lance Cottrell, chief scientist at Ntrepid, a Virginia provider of secured Internet browsers, pointed to last year’s hacking of the Office of Personnel Management, which compromise­d the informatio­n of 21 million Americans, including his own.

Once such a tool exists, “it will become a huge target for hackers, particular­ly nation- state hackers,” Cottrell said. “If I was a hacker and I knew this software had been created, I’d be trying really hard to get it.”

Then there’s court, where defense experts would want a close look at the tool to ensure that it wasn’t tainting evidence, said Jeffrey Vagle, a lecturer at the University of Pennsylvan­ia Law School. “It could get quite tangled from a technical standpoint,” he said.

One very likely consequenc­e: more eyes on the tool and its underlying code. And as more jurisdicti­ons face the issue of iPhones they can’t unlock, it’s impossible to calculate where that would end.

The Manhattan district attorney’s office, for instance, says it expects the number of locked phones to rise over time. The vast majority of iPhones now run iOS 8 or more recent versions, which all support the high level of encryption in question.

Elsewhere in the country, the Harris County district attorney’s office in Texas encountere­d more than 100 encrypted iPhones last year. And the Cook County State Attorney’s Cyber Lab received 30 encrypted devices in the first two months of this year, according to the Manhattan district attorney’s office.

 ?? Chip Somodevill­a / Getty Images ?? The FBI’s official seal is shown on an iPhone’s camera screen outside the J. Edgar Hoover headquarte­rs in Washington. Apple is fighting a court order to hack one of its phones, saying it would create a way for hackers, foreign government­s and others to invade its customers’ privacy.
Chip Somodevill­a / Getty Images The FBI’s official seal is shown on an iPhone’s camera screen outside the J. Edgar Hoover headquarte­rs in Washington. Apple is fighting a court order to hack one of its phones, saying it would create a way for hackers, foreign government­s and others to invade its customers’ privacy.

Newspapers in English

Newspapers from United States