Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apple, FBI, and the Burden of Forensic Methodology
Zdziarski's Blog of Things ^ | February 18, 2016 | Jonathan Zdziarski

Posted on 03/11/2016 5:51:41 PM PST by Swordmaker

Recently, FBI got a court order that compels Apple to create a forensics tool; this tool would let FBI brute force the PIN on a suspect’s device. But lets look at the difference between this and simply bringing a phone to Apple; maybe you’ll start to see the difference of why this is so significant, not to mention underhanded.

First, let me preface this with the fact that I am speaking from my own personal experience both in the courtroom and working in law enforcement forensics circles since around 2008. You can find my CV here. I’ve testified as an expert in three cases in California, and many others have pleaded out or had other outcomes not requiring my testimony. I’ve spent considerable time training law enforcement agencies around the world specifically in iOS forensics, met LEOs in the middle of the night to work on cases right off of airplanes, gone through the forensics validation process and clearance processes, and dealt with red tape and all the other terrible aspects of forensics that you don’t see on CSI. It was a lot of fun but was also an incredibly sobering experience, as I have not been trained to deal with the evidence (images, voicemail, messages, etc) that I’ve been exposed to like LEOs have; my faith has kept me grounded. I’ve developed an amazing amount of respect for what they do.

For years, the government could come to Apple with a warrant and a phone, and have the manufacturer provide a disk image of the device. This largely worked because Apple didn’t have to hack into their phones to do this. Up until iOS 8, the encryption Apple chose to use in their design was easily reversible when you had code execution on the phone (which Apple does). So all through iOS 7, Apple only needed to insert the key into the safe and provide FBI with a copy of the data.

This service worked like a “black box”, and while Apple may have needed to explain their methods in court at some point, they were more likely considered a neutral third party lab as most forensics companies would be if you sent them a DNA sample. The level of validation and accountability here is relatively low, and methods can often be opaque; that is, Apple could simply claim that the tech involved was a trade secret, and gotten off without much more than an explanation. An engineer at Apple could hack up a quick and dirty tool to dump disk, and nobody would need to ever see it because they were providing a lab service and were considered more or less trade secrets.

Now lets contrast that history with what FBI and the courts are ordering Apple to do here. FBI could have come to Apple with a court order stating they must brute force the PIN on the phone and deliver the contents. It would have been difficult to get a judge to sign off on that, since this quite boldly exceeds the notion of “reasonable assistance” to hack into your own devices. No, to slide this by, FBI was more clever. They requested that Apple developed a forensics tool but did not do the actual brute force themselves.


This was apparently enough for the courts to look past the idea of “reasonable assistance”, however there are some unseen caveats that are especially dangerous here. What many  haven’t considered is the significant difference – in the legal world – between providing lab services and developing what the courts will consider an instrument.

An instrument is the term used in the courts to describe anything from a breathalyzer device to a forensics tool, and in order to get judicial notice of a new instrument, it must be established that it is validated, peer reviewed, and accepted in the scientific community. It is also held to strict requirements of reproducibility and predictability, requiring third parties (such as defense experts) to have access to it. I’ve often heard Cellebrite referred to, for example, as “the Cellebrite instrument” in courts. Instruments are treated very differently from a simple lab service, like dumping a phone. I’ve done both of these for law enforcement in the past: provided services, and developed a forensics tool. Providing a simple dump of a disk image only involves my giving testimony of my technique. My forensics tools, however, required a much thorough process that took significant resources, and they would for Apple too.

The tool must be designed and developed under much more stringent practices that involve reproducible, predictable results, extensive error checking, documentation, adequate logging of errors, and so on. The tool must be forensically sound and not change anything on the target, or document every change that it makes / is made in the process. Full documentation must be written that explains the methods and techniques used to disable Apple’s own security features. The tool cannot simply be some throw-together to break a PIN; it must be designed in a manner in which its function can be explained, and its methodology could be reproduced by independent third parties. Since FBI is supposedly the ones to provide the PIN codes to try, Apple must also design and develop an interface / harness to communicate PINs into the tool, which means added engineering for input validation, protocol design, more logging, error handling, and so on. FBI has asked to do this wirelessly (possibly remotely), which also means transit encryption, validation, certificate revocation, and so on.

Once the tool itself is designed, it must be tested internally on a number of devices with exactly matching versions of hardware and operating system, and peer reviewed internally to establish a pool of peer-review experts that can vouch for the technology. In my case, it was a bunch of scientists from various government agencies doing the peer-review for me. The test devices will be imaged before and after, and their disk images compared to ensure that no bits were changed; changes that do occur from the operating system unlocking, logging, etc., will need to be documented so they can be explained to the courts. Bugs must be addressed. The user interface must be simplified and robust in its error handling so that it can be used by third parties.

Once the tool is ready, it must be tested and validated by a third party. In this case, it would be NIST/NIJ (which is where my own tools were validated). NIST has a mobile forensics testing and validation process by which Apple would need to provide a copy of the tool (which would have to work on all of their test devices) for NIST to verify. NIST checks to ensure that all of the data on the test devices is recovered. Any time the software is updated, it should go back through the validation process. Once NIST tests and validates the device, it would be clear for the FBI to use on the device. Here is an example of what my tools validation from NIJ looks like: https://www.ncjrs.gov/pdffiles1/nij/232383.pdf

During trial, the court will want to see what kind of scientific peer review the tool has had; if it is not validated by NIST or some other third party, or has no acceptance in the scientific community, the tool and any evidence gathered by it could be rejected.

Apple must be prepared to defend their tool and methodology in court; no really, the defense / judge / even juries in CA will ask stupid questions such as, “why didn’t you do it this way”, or “is this jail breaking”, or “couldn’t you just jailbreak the phone?” (i was actually asked that by a juror in CA’s broken legal system that lets the jury ask questions). Apple has to invest resources in engineers who are intimately familiar with not only their code, but also why they chose the methodology they did as their best practices. If certain challenges don’t end well, future versions of the instrument may end up needing to incorporate changes at the request of FBI.

If evidence from a device ever leads to a case in a court room, the defense attorney will (and should) request a copy of the tool to have independent third party verification performed, at which point the software will need to be made to work on another set of test devices. Apple will need to work with defense experts to instruct them on how to use the tool to provide predictable and consistent results.

In the likely event that FBI compels the use of the tool for other devices, Apple will need to maintain engineering and legal staff to keep up to date on their knowledge of the tool, maintain the tool, and provide testimony as needed.

In other words, developing an instrument is far more involved than simply dumping a phone for FBI, which FBI could have ordered:

The risks are significant too:

This far exceeds the realm of “reasonable assistance”, especially considering that Apple is not a professional forensics company and has no experience in designing forensic methodology, tools, or forensic validation. FBI could attempt to circumvent proper validation by issuing a deviation (as they had at one point with my own tools), however this runs the risk of causing the house of cards to collapse if challenged by a defense attorney.

So in light of the demand of sound forensic science, the Department of Justice’s outrageous arguments seem quite inaccurate.


Quite the contrary, unless Department of Justice is asking Apple to completely ignore sound forensic science, and simply pump out a reckless (and possibly harmful) hacking tool, it would seem that false statements are being made to the court. Or perhaps they’re attempting to skirt the reality of this by using the verbiage, “after its purpose”, which requires disseminating it outside of Apple, as well as opening it up to work on other devices, and thereby relinquishing custody of it.

In the same vein, you’ll also notice that in demanding a tool, FBI has sneakily ensured that a more “open” copy of the software will have to be released (that will work on other devices) in order for it to be tested, validated, and re-tested by a defense team. This guarantees that the hacking tool FBI is forcing Apple to write will be out in the public, where it will be in the hands of multiple agencies and private attorneys.

Not only is Apple being ordered to compromise their own devices; they’re being ordered to give that golden key to the government, in a very roundabout sneaky way. What FBI has requested will inevitably force Apple’s methods out into the open, where they can be ingested by government agencies looking to do the same thing. They will also be exposed to private forensics companies, who are notorious for reverse engineering and stealing other people’s intellectual property. Should Apple comply in providing a tool, it will inevitably end up abused and in the wrong hands.

But will this case ever need to see a court room? Absolutely, they’ve already admitted they’re following leads and looking at (or at lest for) other people. If a relative or anyone else involved is prosecuted, these tools will come up in court. Outside of this one case, you’re no doubt aware of the precedent this sets, and the likelihood this tool won’t be used once, but many times, each having to establish courtroom acceptance in different jurisdictions, different defense challenges, giving the software to more parties for analysis and reproducible results, and so on.

You’re asking the wrong question. Consider this, even if a suspect never went to court, we’re talking about practicing sound forensic science. Everything I’ve outlined in this article is consistent with best practices in the field. For anyone to be okay with a simple ugly hack job instead of a forensics tool would set an ugly precedent of skirting sound science and methodology in handling of evidence. This would undoubtedly do damage to the reputation of the forensic process, and lower the bar on all such standards. In other words, the reputation of forensic science is more important than whether or not this case will ever see a courtroom.


TOPICS: Constitution/Conservatism; Culture/Society; Government; News/Current Events
KEYWORDS: applepinglist
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last
To: Swordmaker

Oh come on. A team of 8 to 10 engineers, (also a made up number) in a high profile task, in a deeply litigious environment, working for a month. And working to change the entire nature of the company’s flagship product.

How could THAT cost over 150k? lol /s


41 posted on 03/11/2016 7:39:55 PM PST by DesertRhino ("I want those feeble mined asses overthrown,,,")
[ Post Reply | Private Reply | To 39 | View Replies]

To: Swordmaker

“That code is worth, at a modest estimate, $150 billion, and probably much more. Are you willing for the government to pay that for it?”

Classic.


42 posted on 03/11/2016 7:41:29 PM PST by DesertRhino ("I want those feeble mined asses overthrown,,,")
[ Post Reply | Private Reply | To 40 | View Replies]

To: ctdonath2

Not ubiquitous unbreakable encryption.
If it had been available to every dumb thug it would have been addressed by the Common Law and the Fourth Amendment, since a judicial system cannot function if can’t compel evidence.

Law must be passed to make the Fourth and encryption compatible, and soon. In the mean time the court must fulfil it’s functions in this new environment as best it can.

There was a judicial system, many thousands of years ago, that couldn’t compel evidence:
barbarism.
There’s NO Roe v Wade ‘right to privacy’ under barbarism.


43 posted on 03/11/2016 7:47:36 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 31 | View Replies]

To: DesertRhino; jessduntno; ctdonath2
Cool, I just won, you couldn’t refute my point.

He doesn't ever refute any points. He starts insulting people. . . and calling them names, to which we call him names in return in sheer frustration. NOT once has this ignoramus ever posted anything of value on these threads.

44 posted on 03/11/2016 7:47:47 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 38 | View Replies]

To: DesertRhino; mrsmith; ctdonath2
How could THAT cost over 150k? lol /s

I think he ignores all ancillary costs. . . all he can look at is labor. He ignores completely the work these people were taken OFF of that has to go idle while they do work not for Apple's benefit. That has a high cost. There is overhead, there is R&D costs not even thought of in his world. . . Attorneys have to be involved. Management. Being an ex-CEO, I'd put it closer to $1 to 1.5 million to even start. That does not even begin looking at the on going support team that Jonathan Zdziarski outlines will be necessary. Apple did not even address the team necessary for the input from an external computer to get the passcode tries into the iPhone. . . that would have to a separate team, because it requires a hardware hack to get the system to ignore a hardware requirement to only accept the input from the touch screen. The FBI designated remote, remember?

45 posted on 03/11/2016 7:54:32 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Swordmaker
The problem seems to be that many on this forum and elsewhere get their information on what is and isn't forensically possible from watching CSI:Cyber...
46 posted on 03/11/2016 7:59:32 PM PST by CA Conservative (Texan by birth, Californian by circumstance)
[ Post Reply | Private Reply | To 45 | View Replies]

To: Swordmaker

“I find the ignorance coming from you BURNS. It is, frankly, mind numbingly, deeply painful to read, over and over again.”

Well, at some point you should ask yourself why you do it. You know I am right and it bothers you that you can’t overcome the fact that what you are doing is undermining the Constitution. You’re such a lost sad soul.


47 posted on 03/11/2016 8:06:30 PM PST by jessduntno ("Where the Hell do you put the bayonet?" - Gen. "Chesty" Puller, at a flamethrower demonstration.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: ctdonath2

Au contraire. Implementing virtually unbreakable encryption is MUCH cheaper than implementing the “back door” you want.”

Never even one time uttered the phrase backdoor. Some fantasy of yours, I suppose. My argument is with your undermining the Constitution, a point I will make again. You supply yuour own auto erotic fantasies about back doors and cracking...have a ball. Just don’t include me OK, boys?


48 posted on 03/11/2016 8:09:18 PM PST by jessduntno ("Where the Hell do you put the bayonet?" - Gen. "Chesty" Puller, at a flamethrower demonstration.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: jessduntno

How else do you expect to go from encrypted data to decrypted based on a warrant, without a “back door”?

Insults are unwarranted.


49 posted on 03/11/2016 8:18:52 PM PST by ctdonath2 ("Get the he11 out of my way." - John Galt)
[ Post Reply | Private Reply | To 48 | View Replies]

To: Swordmaker

“Cool, I just won, you couldn’t refute my point.
He doesn’t ever refute any points. He starts insulting people. . . and calling them names, to which we call him names in return in sheer frustration. NOT once has this ignoramus ever posted anything of value on these threads.”

You won? Won what? You still have no idea what I’m talking about, you are all wrapped up in your little cabal, running your mouths like old broken toilets, saying the same mind numbing irrelevant crap over and over like bleating sheep. I posted dozens of relevant thoughts to the point...which is, if you don’t adhere to the Constitution, you will eventually be owned by the big Corporate interests you so obviously worship. When we restore the SCOTUS and take back the country, you germs MIGHT come to your senses, but I doubt it. And when you say you won, do you mean all 10 of you, or just you, or what? What a dimwitted pack you turned out to be. This wasn’t even a fair battle of wits, what with you all being unarmed.


50 posted on 03/11/2016 8:20:07 PM PST by jessduntno ("Where the Hell do you put the bayonet?" - Gen. "Chesty" Puller, at a flamethrower demonstration.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: mrsmith

“Not ubiquitous unbreakable encryption.”

They knew of “one time pads” which are very old and even more secure than any modern encryption technique.
Seizing evidence under warrant doesn’t include compelling an unwilling third party to make sense of it.


51 posted on 03/11/2016 8:23:25 PM PST by ctdonath2 ("Get the he11 out of my way." - John Galt)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Swordmaker

“He doesn’t ever refute any points. He starts insulting people.”

And true to form, a few posts later, there it is again. And I gotta tell you. A year ago I wasn’t the biggest apple fan. But a few experiences this year have really changed my opinion. First, their behavior in this case. Second, the behavior of MS in windows 10. And third, though I cannot explain it, the Camera in a work issued 5s that I used.
On paper it seems less capable than my Samsung cam. But the reality is that something in it produced some of the most amazing cell photos ive ever taken.
A friend of mine overseas actually asked me if I had acquired a new camera.

The last year I have changed my position on their products. I till don’t get what’s different in the Apple camera. But I like it.


52 posted on 03/11/2016 8:24:27 PM PST by DesertRhino ("I want those feeble mined asses overthrown,,,")
[ Post Reply | Private Reply | To 44 | View Replies]

To: ctdonath2

“How else do you expect to go from encrypted data to decrypted based on a warrant, without a “back door”?
Insults are unwarranted.”

Insults are unwarranted? Take a look down thread for some of the gems your little buddies have put up.

I’m talking about the FBI v Apple. It keeps getting broadened into something else by the gang here, though.

You don’t have to put in a back door to accomplish what was requested in the court order. If you can’t do what has been requested, as is contended, then you are creating something that will inevitably coerce the user into an untenable position v established law.

You can sell cars without brakes, but you WILL have consequences. That has been my point since the beginning.

You are putting up artificial barriers and claiming them to be unscalable. How convenient. You even have experts - real experts! - that conclude you should be able to create a product that will make a vast and essential section of the law unusable. I don’t know why, but it is your contention, from what the cabal tells me, that it will be created now because it CAN be and the Constitution will just have to adjust.

Wonderful. This is a replay of the discovery of the justification for abortion that was found in the Constitution. Once Abortion was high tech and “safe” for women, all of a sudden there became a “variation of the wording that must be obeyed.” You are proposing more corruption, based on your insistence that it must be done to protect us from the portion of the law that protects us from the law. Or is it against the law to ignore a summons? To refuse to submit to discovery without penalty, because it is no longer possible to produce it because of this marvelous new product that thwarts the law...from itself?

We’ll see how it comes out in the courts. And, this is the last time I put forth this proposition. I am talking about THIS case.


53 posted on 03/11/2016 8:34:34 PM PST by jessduntno ("Where the Hell do you put the bayonet?" - Gen. "Chesty" Puller, at a flamethrower demonstration.)
[ Post Reply | Private Reply | To 49 | View Replies]

To: jessduntno
Well, at some point you should ask yourself why you do it. You know I am right and it bothers you that you can’t overcome the fact that what you are doing is undermining the Constitution. You’re such a lost sad soul.

No, I know, for a fact, you are wrong. And you are wrong for all the wrong reasons. You don't have a strong grounding in the theory of WHY the Founding Fathers did what they did, and why the Constitution was made in the first place. . . without that you fall back on literalism. You can't find the basic philosophical meaning underlying it all.

54 posted on 03/11/2016 8:46:17 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Swordmaker

You don’t have a strong grounding in the theory of WHY the Founding Fathers did what they did, and why the Constitution was made in the first place. . . without that you fall back on literalism. You can’t find the basic philosophical meaning underlying it all.”

Once again, you speak from your high horse without bothering to explain why you say what you do. Sound and fury signifying dick.


55 posted on 03/11/2016 8:51:24 PM PST by jessduntno ("Where the Hell do you put the bayonet?" - Gen. "Chesty" Puller, at a flamethrower demonstration.)
[ Post Reply | Private Reply | To 54 | View Replies]

To: ctdonath2
But such efforts were rare, not ubiquitous. they weren't used by every common thug. Common law hadn't addressed this because it, practically, never arose. But take the opposite situation where it arises in not <1% of cases but >90%- how can the courts function?
56 posted on 03/11/2016 8:59:26 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 51 | View Replies]

To: ctdonath2; jessduntno
Insults are unwarranted.

My point is confirmed. Just Don't Know is always this confrontational. His ignorance, when confronted, is always responded by insults and epithets toward the people who call him on his abysmally Just don't know nothing claims. He tries ham-handedly to turn things on anyone in sight, because he cannot admit his own very short comings. He's a legend in his now very small mind, expert at all he knows, which is so obviously very little, and he jealously guards that very little to assure it doesn't grow.

57 posted on 03/11/2016 8:59:44 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 49 | View Replies]

To: DesertRhino
I till don’t get what’s different in the Apple camera.

Larger pixels, with a black wall between them. It prevents bleed over from glare, and the larger pixels allow a greater light gathering capability.

Samsung got the idea about the larger pixels with their latest cameras, but they still haven't figured out to put a separating black wall in.

58 posted on 03/11/2016 9:04:14 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 52 | View Replies]

To: jessduntno; ctdonath2
Once again, you speak from your high horse without bothering to explain why you say what you do. Sound and fury signifying dick.

And again, you cannot post a civil post. You insult and denigrate. You are NOT a conservative. You post like a LIBERAL.

59 posted on 03/11/2016 9:09:53 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 55 | View Replies]

To: Swordmaker

“And again, you cannot post a civil post. You insult and denigrate. You are NOT a conservative. You post like a LIBERAL.”

So, you still got nothing, eh genius?


60 posted on 03/11/2016 10:09:52 PM PST by jessduntno ("Where the Hell do you put the bayonet?" - Gen. "Chesty" Puller, at a flamethrower demonstration.)
[ Post Reply | Private Reply | To 59 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-64 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson