How the FBI Might Hack Into an iPhone Without Apple's Help

Advertisement
By Associated Press | Updated: 23 March 2016 12:11 IST

For more than a month, federal investigators have insisted they have no alternative but to force Apple to help them open up a phone used by one of the San Bernardino shooters.

That changed Monday when the Justice Department said an "outside party" recently showed the FBI a different way to access the data on the phone used by Syed Farook, who with his wife killed 14 people in the Dec. 2 attack.

Advertisement

The magistrate judge in the case postponed a hearing scheduled for Tuesday and gave the government two weeks to test its method. But federal officials have been mum about who came forward and what method they've proposed. Here are some of the leading options outside experts think the FBI might be exploring.

Back up and attack
One likely scenario involves making multiple copies of the iPhone's flash memory, which investigators could use to restore the phone's data should they inadvertently trigger the phone's "self-destruct" feature by making too many wrong guesses at the passcode.

Advertisement

That feature doesn't actually erase all the files on the iPhone. Instead, it erases a section of the iPhone's memory that contains one of the keys necessary to unlock the data on the phone. This section, known as the "effaceable storage," sits in a memory chip that theoretically could be removed and plugged into a reader device that's capable of electronically copying what's stored on the chip - and then replacing the data if it's been erased.

While the technique hasn't been proven for this purpose, forensic expert Jonathan Zdziarski said it was demonstrated in a widely circulated video that shows a Chinese smartphone vendor using a similar procedure to install more memory capacity on an iPhone. FBI Director James Comey was asked about the technique during a congressional hearing on March 1, but Comey didn't say directly whether the FBI had considered the approach.

Advertisement

Reset the count
A more nuanced approach would involve isolating the portion of the phone's memory where the count of how many passcode attempts have been made is stored, said Ajay Arora, CEO and co-founder of Vera, an encryption software company.

In theory, the person working on the phone would then be able to reset the count each time it approached 10, allowing investigators to make an infinite number of guesses.

Advertisement

"This is more technical and a little more difficult, because you'd have to isolate the section," he said. Apple hasn't provided any maps to show where that data is stored. The main problem: The FBI would run the risk of losing information if something went wrong.

Shane McGee, chief privacy officer at the FireEye cybersecurity firm, agreed that this kind of approach could potentially work. "All the government really needs is the opportunity to do a very simple, brute-force attack," he said.

De-capping
Another approach, sometimes known as "chip de-capping," calls for physically removing the casing of the iPhone's processor chip, using acid or a laser drill. In theory, investigators could then connect electronic probes capable of reading the phone's unique identification code bit by bit from the location where it is "fused" into the phone's hardware. This method would also have to read the algorithm that combines that code with the user passcode to unlock the phone.

Once they get that information, investigators could then load it onto another computer, where they can run thousands of attempts at guessing the passcode without worrying about triggering the auto-erase function on the phone itself.

Forensic investigators have used similar procedures to read other kinds of data from computer chips, according to McGee. But experts say the process of physically dismantling a chip is technically demanding and has a high risk of causing damage that would make the data unreadable.

A brand new 'zero day'
Even a tiny flaw unknown to the software's creator - known as a zero-day vulnerability - could potentially give the government, or someone else, a way in, said Jay Kaplan, CEO of Synack and an a former NSA counterterrorism researcher.

Those exploits are considered valuable to hackers, who often sell them to others, and to intelligence agencies that use them for gathering data. It isn't clear if the government would share the information with Apple - which might then try to fix the vulnerability - or if the government would try to keep the information "in its back pocket" so it can be used for future cases, Kaplan said.

While in theory it's possible that investigators could go with some kind of brute-force attack, Kaplan thinks it's more likely that the FBI's mystery assistant found a zero day instead.

"There's plenty of them out there that vendors don't know about," Kaplan said. "Regardless of the method, it's going to be a pretty complex process, whether it involves a zero day or not. I'm sure a lot of really smart people are working on the problem."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Apple, Apple iPhone, Encryption, FBI, Hack, iPhone
Advertisement

Related Stories

Popular Mobile Brands
  1. Motorola Edge 70 Pro Arrives With a 6,500mAh Battery at This Price in India
  2. Best Smartphones in India Under Rs. 30,000: Vivo T5 Pro, Oppo A6 Pro and More
  3. How Instagram's Edits App Evolved Over the Past Year and What's Next
  1. NASA’s Curiosity Rover Finds Crater Filled With Sand, Alters Drilling Plans
  2. Control Ultimate Edition Arrives on iPhone and iPad With Touch Controls, Universal Purchase
  3. Asus ExpertBook Ultra With Intel Core Ultra X7 Series 3 CPU Launched in India Alongside ExpertBook P3, ExpertBook P5 Series
  4. Boat Aavante Prime X Soundbar Launched in India With Dolby Atmos, Wireless Satellite Speakers: Price, Features
  5. Qualcomm CEO Reportedly Visits Samsung Foundry in Korea to Discuss Producing 2nm Chips
  6. Coinbase Announces USDC-INR Trading Services for Users in India
  7. Redmi K Pad 2 Launched With 8.8-Inch 3K Display, Dimensity 9500 Chip: Price, Specifications
  8. Suyodhana OTT Release Date: When and Where to Watch This Telugu Mystry Thriller Online?
  9. OnePlus Watch 4 Launch Appears Imminent as Listing Confirms Snapdragon W5 Chip, OxygenOS Watch 8
  10. Sennheiser CX 80U, Sennheiser HD 400U With USB Type-C Connectivity Launched in India: Price, Features
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.