How the FBI Might Hack Into an iPhone Without Apple's Help

Advertisement
By Associated Press | Updated: 23 March 2016 12:11 IST

For more than a month, federal investigators have insisted they have no alternative but to force Apple to help them open up a phone used by one of the San Bernardino shooters.

That changed Monday when the Justice Department said an "outside party" recently showed the FBI a different way to access the data on the phone used by Syed Farook, who with his wife killed 14 people in the Dec. 2 attack.

The magistrate judge in the case postponed a hearing scheduled for Tuesday and gave the government two weeks to test its method. But federal officials have been mum about who came forward and what method they've proposed. Here are some of the leading options outside experts think the FBI might be exploring.

Advertisement

Back up and attack
One likely scenario involves making multiple copies of the iPhone's flash memory, which investigators could use to restore the phone's data should they inadvertently trigger the phone's "self-destruct" feature by making too many wrong guesses at the passcode.

Advertisement

That feature doesn't actually erase all the files on the iPhone. Instead, it erases a section of the iPhone's memory that contains one of the keys necessary to unlock the data on the phone. This section, known as the "effaceable storage," sits in a memory chip that theoretically could be removed and plugged into a reader device that's capable of electronically copying what's stored on the chip - and then replacing the data if it's been erased.

While the technique hasn't been proven for this purpose, forensic expert Jonathan Zdziarski said it was demonstrated in a widely circulated video that shows a Chinese smartphone vendor using a similar procedure to install more memory capacity on an iPhone. FBI Director James Comey was asked about the technique during a congressional hearing on March 1, but Comey didn't say directly whether the FBI had considered the approach.

Advertisement

Reset the count
A more nuanced approach would involve isolating the portion of the phone's memory where the count of how many passcode attempts have been made is stored, said Ajay Arora, CEO and co-founder of Vera, an encryption software company.

In theory, the person working on the phone would then be able to reset the count each time it approached 10, allowing investigators to make an infinite number of guesses.

Advertisement

"This is more technical and a little more difficult, because you'd have to isolate the section," he said. Apple hasn't provided any maps to show where that data is stored. The main problem: The FBI would run the risk of losing information if something went wrong.

Shane McGee, chief privacy officer at the FireEye cybersecurity firm, agreed that this kind of approach could potentially work. "All the government really needs is the opportunity to do a very simple, brute-force attack," he said.

De-capping
Another approach, sometimes known as "chip de-capping," calls for physically removing the casing of the iPhone's processor chip, using acid or a laser drill. In theory, investigators could then connect electronic probes capable of reading the phone's unique identification code bit by bit from the location where it is "fused" into the phone's hardware. This method would also have to read the algorithm that combines that code with the user passcode to unlock the phone.

Once they get that information, investigators could then load it onto another computer, where they can run thousands of attempts at guessing the passcode without worrying about triggering the auto-erase function on the phone itself.

Forensic investigators have used similar procedures to read other kinds of data from computer chips, according to McGee. But experts say the process of physically dismantling a chip is technically demanding and has a high risk of causing damage that would make the data unreadable.

A brand new 'zero day'
Even a tiny flaw unknown to the software's creator - known as a zero-day vulnerability - could potentially give the government, or someone else, a way in, said Jay Kaplan, CEO of Synack and an a former NSA counterterrorism researcher.

Those exploits are considered valuable to hackers, who often sell them to others, and to intelligence agencies that use them for gathering data. It isn't clear if the government would share the information with Apple - which might then try to fix the vulnerability - or if the government would try to keep the information "in its back pocket" so it can be used for future cases, Kaplan said.

While in theory it's possible that investigators could go with some kind of brute-force attack, Kaplan thinks it's more likely that the FBI's mystery assistant found a zero day instead.

"There's plenty of them out there that vendors don't know about," Kaplan said. "Regardless of the method, it's going to be a pretty complex process, whether it involves a zero day or not. I'm sure a lot of really smart people are working on the problem."

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Apple, Apple iPhone, Encryption, FBI, Hack, iPhone
Advertisement

Related Stories

Popular Mobile Brands
  1. iPhone 17 Pro Max Cosmic Orange Variant Out of Stock in the US, India: Report
  2. These New AI Features Are Coming to Your Updated iPhone, iPad and Mac
  3. Samsung Galaxy Tab A11, Tab A11+ Design, Features Leaked Ahead of Launch
  4. Oppo Find X9 Pro Chipset, AnTuTu and Geekbench Scores Revealed
  5. Xiaomi 17 Pro Render Gives Us a Good Look at Its Rear Display, Cameras
  6. Google Pixel 10 Review: A Brilliant Phone We Wanted to Love
  7. iOS 26 Update Brings These New Features to AirPods Pro 3, Pro 2, AirPods 4
  8. Check What's New for Your iPhone in Apple's Latest iOS 26 Update
  9. MediaTek Confirms Dimensity 9500 Launch Date; Timeline to Its First 2nm Chip
  10. Oppo F31 Pro+ 5G Review
  1. Sony Said to Be Planning State of Play Broadcast for Next Week
  2. France Could Block Crypto Firms With MiCA Licenses Due to Enforcement Gap Concerns
  3. Oppo Find X9 Pro With Dimensity 9500 SoC Scores 4 Million Points on AnTuTu; Spotted on Geekbench
  4. Xiaomi 17 Pro Design Render Gives Us a Good Look at Its Leica-Branded Rear Cameras, Secondary Display
  5. Clair Obscur: Expedition 33 Has Sold 4.4 Million Copies in Less Than Six Months of Launch
  6. Materialists Now Streaming on Netflix: What You Need to Know About Dakota Johnson’s Starrer Movie
  7. The Trial Season 2 OTT Release Date: When and Where to Watch Kajol’s Legal Drama Series Online
  8. Ghaati OTT Release Reportedly Revealed Online: When and Where to Watch Anushka Shetty-Starrer Movie Online?
  9. American Express Launches NFT Passport Stamps to Commemorate Travel Memories
  10. Huawei Watch GT 6, GT 6 Pro Price, Specifications Leak Ahead of September 19 Launch: Report
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.