Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

FBI Asks Apple for Phone Data From Saudi Shooting Suspect

The FBI asked Apple this week to help extract data from iPhones that belonged to the Saudi aviation student who investigators say fatally shot three sailors at a U.S. naval base in Florida last month.

The FBI asked Apple this week to help extract data from iPhones that belonged to the Saudi aviation student who investigators say fatally shot three sailors at a U.S. naval base in Florida last month.

Investigators have been trying to access the two devices — an iPhone 7 and an iPhone 5 that belonged to Mohammed Alshamrani, a 21-year-old 2nd Lt. in the Royal Saudi Air Force — but have been unable to access them because the phones are locked and encrypted, according to the letter from the FBI’s general counsel, Dana Boente.

The FBI has received a court authorization to search the phones and the devices have been sent to the bureau’s lab in Quantico, Virginia, Boente said.

The investigation is considered a “high-priority national security matter,” Boente said in the letter, which was reviewed by The Associated Press. Alshamrani opened fire at the Pensacola naval base on Dec. 6, killing the three sailors and injuring several others before he was shot dead by a sheriff’s deputy.

FBI officials have sought help from other federal agencies and other experts and investigators have been trying to guess the passwords, but those efforts have been unsuccessful, according to the letter.

At least one of the phones was shot by a sheriff’s deputy during the attack, but investigators believe they may still be able to extract data from the device, according to a person familiar with the matter. The person spoke on condition of anonymity in order to discuss an ongoing investigation.

Apple said in a statement that it has already provided investigators with all the relevant data held by the company.

“We have the greatest respect for law enforcement and have always worked cooperatively to help in their investigations,” the company said. “When the FBI requested information from us relating to this case a month ago we gave them all of the data in our possession and we will continue to support them with the data we have available.”

Advertisement. Scroll to continue reading.

Apple, Facebook and other tech companies have periodically tussled with the FBI over the end-to-end encryption they have built into their products to protect customers’ privacy. The tech industry has resisted Justice Department calls for a “backdoor” that would allow authorities to read encrypted messages, arguing that such access could also benefit spies and criminals.

Apple resisted the government’s efforts to gain access to an iPhone belonging to a perpetrator of a 2015 terrorist attack in San Bernardino, California, which killed 14 people. The company went to court to block an FBI demand for Apple to disable security measures that complicated efforts to guess the phone’s passcode. The FBI eventually relented after it found another way of getting into the phone.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.