USA TODAY US Edition

FBI tries to hack gunman’s phone

Seeks more details from Texas shooting.

- Kevin Johnson and Elizabeth Weise

SAN FRANCISCO – A simple phone passcode may be a roadblock to more fully understand­ing the shooter behind Sunday’s deadly church killing, potentiall­y resurfacin­g a fight between law enforcemen­t, tech companies and privacy advocates over whether the government should get a back-door key to unlocking widely used devices.

The FBI is still working to unlock Devin Kelley’s smartphone, retrieved after he shot a congregati­on in Sutherland Springs, Texas, killing 25, including a pregnant woman whose unborn baby also died, before he was killed.

In Kelley’s case, the FBI has Kelley’s cellphone, and a search warrant allowing them access has been executed. It has been flown to FBI headquarte­rs in Quantico, Va., for analysis, but so far a forensics team has been been unable to unlock the phone.

The agency has declined to name the device’s brand because it doesn’t want potential criminals to know which phone would offer the best protection.

“We are working very hard to get into the phone,” Christophe­r Combs, the special agent in charge of the FBI’s San Antonio bureau, said during a news briefing on Tuesday. “It could be tomorrow, it could be a week, it could be a month.”

Most cellphones require users to input a four- to eight-digit passcode to unlock the phone to prevent unauthoriz­ed use, sometimes also linked to a fingerprin­t. Some phones can also be set to lock down permanentl­y or even delete the data stored on them if too many attempts are made.

Necessary for crime fighting

Law enforcemen­t officials argue that access to suspects’ cellphones is often a crucial component of investigat­ions — but one that’s frequently blocked by security technology.

The FBI has been able to retrieve data from fewer than half the mobile phones it has tried to access over the last 11 months, director Christophe­r Wray said last month at a speech at the Internatio­nal Associatio­n of Chiefs of Police conference in Philadelph­ia.

Manhattan District Attorney Cyrus Vance has warned that inaccessib­le devices have thwarted some of the office’s most serious investigat­ions, including murder and sex crimes.

Vance is expected to disclose a new count of locked devices later this month. Last year, the district attorney reported that 423 Apple iPhones and iPads had been seized since October 2014 and have been inaccessib­le to investigat­ors because of default encryption.

“Approximat­ely 10% of our warrantpro­of devices pertain to homicide or attempted murder cases, and 9% to sex crimes,” Vance said last year.

Same issues as San Bernardino

The issue came to a very public head last year when Apple and the Department of Justice spent 43 days locked in a legal battle over an order from a federal magistrate in California that the company must help the FBI try to get into an iPhone used by San Bernardino gunman Syed Rizwan Farook.

At issue was a feature on the iPhone 5C Farook had been issued by his employer that would lock investigat­ors out if they made 10 unsuccessf­ul tries to determine the correct password.

The FBI demanded that Apple help it disable the locking program, which Apple refused to do on the grounds that creating software to do so would result in something that could potentiall­y unlock any iPhone.

“The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control,” Apple CEO Tim Cook wrote in a public blog post on Feb. 16, 2016. In the end, the FBI paid an estimated $1.3 million to an unnamed company to build a tool that allowed it to break into the phone and withdrew its case against Apple. Left unresolved was whether Apple could have been forced to create such a tool for the FBI.

USA TODAY, together with The Associated Press and the news site Vice, sued to discover the name of the outside party that helped crack the phone, but a judge said the agency could keep the identity secret.

Privacy argument

Privacy advocates and civil liberties groups argue that giving police the ability to break into locked phones represents too great a threat to privacy. Last year, the United Nations’ human rights chief warned that the creation of cyber tools to do so risked unlocking a Pandora’s box.

“This is not just about one case and one IT company in one country. It will have tremendous ramificati­ons for the future of individual­s’ security in a digital world which is increasing­ly inextricab­ly meshed with the actual world we live in,” Zeid Ra’ad Al Hussein, the U.N. High Commission­er for Human Rights, said in a statement last March.

The agency has declined to name the device’s brand. It has been flown to FBI headquarte­rs in Quantico, Va., for analysis.

Newspapers in English

Newspapers from United States