Why the US government can’t tell Apple how the FBI hacked into the San Bernardino terrorist’s iPhone

How the FBI hacked into the iPhone of the San Bernardino terrorist
How the FBI hacked into the iPhone of the San Bernardino terrorist

This saga goes on and on. First it was that Apple refused to help the FBI hack into the San Bernardino shooter’s iPhone. Then there was a controversy regarding whether the FBI has actually been able to hack into the iPhone or not. The employees at Apple got so worked up that they were about to leave their jobs rather than being forced to help the FBI (it almost turned into a tiny revolution).

And now when it has been established that the iPhone has actually been hacked, it is being debated whether the US government is willing to share the information regarding how the FBI was able to hack into the terrorist’s iPhone with Apple or not.

Read everything you need to know about the Apple-FBI case.

There is a law in the US according to which if any government body finds some vulnerability in some technology, may it be computer software/hardware or mobile devices, it has to share the information with the manufacturer.

In this case the US government seems to have found a workaround for hacking into the iPhone of the San Bernardino terrorist and hence due to the Vulnerability Equities Process (VEP) policy the government needs to disclose information about the security vulnerability that was used in order to get the job done.

But the government sources are saying that the technology that was used to hack into the iPhone of the San Bernardino terrorist is proprietary technology obtained from a 3rd party. So the business interests of that 3rd party will be compromise if the technology is shared with Apple, just the way Apple’s right to protect its encryption technology was supposedly being violated when the FBI asked its help.

The government sources have declined to identify the non-US company that has helped the FBI. Without the help of the company, the FBI won’t be able to submit the “method” to the Vulnerabilities Equities Process even if it wants to.

It is being speculated that even the FBI doesn’t have a clue how the technology works. This is not even the main issue. The FBI wanted the iPhone hacked, and the iPhone has been hacked, the job is done and they are not bothered what sort of technology helped them.

New source

About Amrit Hallan
Amrit Hallan is the founder of TechBakBak.com. He writes about technology not because "he loves to write about technology", he actually believes that it makes the world a better place. On Twitter you can follow him at @amrithallan

Be the first to comment

Leave a Reply

Your email address will not be published.


*