Skip to main content

Apple says it immediately contacted FBI about unlocking Texas shooter’s iPhone

Apple says it immediately contacted FBI about unlocking Texas shooter’s iPhone

/

Apple is refuting the FBI’s official account

Share this story

At Least 20 People Killed 24 Injured After Mass Shooting At Texas Church
Photo by Erich Schlegel/Getty Images

Apple today tried to get ahead of another encryption showdown with the Federal Bureau of Investigation related to the Texas gunman’s attack this past Sunday, saying it reached out to the bureau to offer assistance in getting into the gunman’s iPhone and expedite its response to any legal process. The attack, which left 26 dead and many more injured, was committed by now-deceased Devin P. Kelley, who is confirmed to have been carrying an iPhone that may have crucial information about his activities in the lead up to the shooting.

The FBI originally cast blame on Apple yesterday without mentioning the company by name, with FBI special agent Christopher Combs blaming industry standard encryption from preventing law enforcement from accessing the contents of devices owned by mass shooters. “Law enforcement is increasingly not able to get into these phones,” Combs said at a press conference. “I can assure you that we are working very hard to get into the phone.”

However, a Reuters report earlier today revealed that the FBI did not ask Apple for assistance during a critical 48-hour window, in which Kelley’s fingerprint could have still unlocked an iPhone equipped with Touch ID. (The model of Kelley’s iPhone remains unknown, as does whether he enabled Touch ID.) An Apple spokesperson, in a statement obtained by BuzzFeed, now confirms it did contact the FBI with an offer of assistance upon learning of Kelley’s locked iPhone on Tuesday:

Apple isn’t saying here that it’s willing to help the FBI bypass the access code on Kelley’s iPhone, something the company has said it will never do and is willing to go to court to fight. However, Apple could have provided other forms of assistance like suggesting they use Kelley’s fingerprint or, as its statement reads, expedite legal warrant requests to get into Kelley’s iCloud account to check for iPhone backups. The Washington Post is reporting that an FBI official even acknowledged Apple’s offer of assistance late yesterday evening, but that they did not ask for any further help as experts in the bureau’s crime lab were determining whether there was another method of accessing the data.

In other words, the FBI appears to be using this situation as another opportunity to paint the iPhone as antagonist to law enforcement procedures, in an apparent effort to drum up support for weakening tech industry encryption. Apple and the FBI engaged in a high-profile showdown last year over the iPhone 5C of San Bernardino shooter Syed Farook, with the FBI ultimately backing down from a court battle with Apple after it paid $1 million to a third-party company to help it bypass that specific device’s encryption. A federal court ruled in late September that the FBI did not have to disclose how much it paid for the exploit, the name of the vendor who supplied it, or any other information about how exactly it broke into Farook’s iPhone.

Still, it would seem as if the FBI would rather not have to go to such extreme measures to access the contents of an American citizen’s device, especially considering the fact that the exploit in the San Bernardino case likely doesn’t work on devices of all types. Although Apple legally complies with warrants for iCloud data, the FBI still has no definitive method for bypassing the encryption protecting iPhone authentication locks, which Apple purposefully makes near-impossible to bypass without the user’s access code.

In the case of Kelley, because 48 hours had passed without him using his fingerprint to unlock the iPhone in question, the access code security feature kicked in and locked the FBI out. Had law enforcement asked for Apple’s assistance right away, within the 48-hour window, perhaps they would already have what they’re looking for. But in that case, the FBI wouldn’t be able to blame encryption for its failure.

Update at 12:10PM ET, 11/9: Clarified that Apple reached out to the FBI after, and not before, learning of the Texas shooter’s iPhone in a Tuesday press conference, presumably after the 48-hour window for Touch ID had already closed.