Gistwheel Global Community
Hello!
Welcome to the forum,click on login to access your account or register a new account.

Join the forum, it's quick and easy

Gistwheel Global Community
Hello!
Welcome to the forum,click on login to access your account or register a new account.
Gistwheel Global Community
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Search
 
 

Display results as :
 

 


Rechercher Advanced Search

Keywords

13  4  8  16  1  10  21  9  11  24  6  15  18  20  5  7  22  2  25  23  14  19  3  12  17  100  

Latest topics
» DEVOTIONAL'S CONTINUATION
FBI: using local's hacking tool,a new strategy? I_icon_minitimeThu Nov 10, 2016 5:32 pm by Evangelista_GP

»  A Prayer for Integrity
FBI: using local's hacking tool,a new strategy? I_icon_minitimeMon Oct 17, 2016 12:04 pm by Evangelista_GP

»  ‘Restless, Irritable, and Discontent’
FBI: using local's hacking tool,a new strategy? I_icon_minitimeTue Oct 11, 2016 1:25 pm by Evangelista_GP

» ‘Turning … Serving … Waiting’
FBI: using local's hacking tool,a new strategy? I_icon_minitimeMon Oct 10, 2016 1:40 pm by Evangelista_GP

» 'God is (6)'
FBI: using local's hacking tool,a new strategy? I_icon_minitimeThu Oct 06, 2016 3:21 pm by Evangelista_GP

» ‘God Is’ (5)
FBI: using local's hacking tool,a new strategy? I_icon_minitimeWed Oct 05, 2016 12:18 pm by Evangelista_GP

» ‘God Is’ (4)
FBI: using local's hacking tool,a new strategy? I_icon_minitimeTue Oct 04, 2016 12:25 pm by Evangelista_GP

» ‘God Is’ (3)
FBI: using local's hacking tool,a new strategy? I_icon_minitimeMon Oct 03, 2016 11:53 am by Evangelista_GP

» How to Improve Your Relationships
FBI: using local's hacking tool,a new strategy? I_icon_minitimeThu Sep 29, 2016 12:07 pm by Evangelista_GP

April 2024
SunMonTueWedThuFriSat
 123456
78910111213
14151617181920
21222324252627
282930    

Calendar Calendar

Affiliates

free forum

Forumotion on Facebook Forumotion on Twitter Forumotion on YouTube Forumotion on Google+


FBI: using local's hacking tool,a new strategy?

Go down

FBI: using local's hacking tool,a new strategy? Empty FBI: using local's hacking tool,a new strategy?

Post by Sophia Handel Sat Apr 02, 2016 6:56 am

The FBI and Justice Department are debating whether the hacking tool that helped the bureau unlock the iPhone of one of the San Bernardino, Calif., terrorists can be used to help state and local law enforcement, officials said Friday.FBI: using local's hacking tool,a new strategy? 518299346-542

That will be a challenge because the bureau has classified the tool, making it difficult to use in state and local criminal prosecutions requiring disclosure of evidence to defendants, officials said.

“There’s a desire to be forward-leaning to help state and local law enforcement,” said a senior law enforcement official, who, like others, spoke on the condition of anonymity to discuss an ongoing investigation. “But no one knows quite what the answer is.”

Moreover, the tool itself likely will have a shelf life of only a few months, as tech companies may find and fix the vulnerabilities that the tool exploits, and they periodically update the under­lying software.

The firm that helped the bureau — not the Israeli company Cellebrite, as had been widely rumored — charged a one-time flat fee, officials said.

The bureau is not releasing the company’s name and has declined to discuss details of the solution. Officials last week said the approach was aimed at dismantling security features on the iPhone 5C to permit investigators to make many attempts to crack the passcode without wiping data from the device.

Since its announcement, the bureau has been peppered with inquiries from state and local law enforcement officials seeking to know whether the solution might be useful for their cases.

Manhattan District Attorney Cyrus R. Vance Jr. was among those who called. But, he said, he recognized that the solution itself may not be applicable to the more than 200 iPhones that he has sitting in a crime lab and his technicians cannot unlock.

None is a 5C running iOS 9, which is the model and operating system of the phone used by Syed Rizwan Farook, who was killed by police in December after a shooting attack that claimed 14 lives.

“The overwhelming majority of criminal investigations stalled by default device encryption will remain so until Congress intervenes,” Vance said.

One-off technical solutions will result in a “cat-and-mouse cyber arms race” between the government and industry, he said in an interview. “I don’t think that’s the smart way to approach public safety or privacy policy.”

The classification of the method highlights a tension between criminal and national security cases in which the most sophisticated tools are not always available to law enforcement. Unlike state and local courts, federal courts have procedures to protect classified information.

The FBI got into the iPhone, but its fight with Apple isn't over just yet  
The FBI has found a way into San Bernardino Syed Farook's iPhone, and is now dropping bids to force Apple to help them crack into the phone. See all the latest developments in the case, and why the case isn't over yet. (Jhaan Elker/The Washington Post)
“It’s been a challenge for law enforcement for a while,” said Austin Berglas, a former assistant special agent in charge of the FBI’s New York cyber branch and now head of cyber investigations at K2 Intelligence, a consultancy firm.

[How spy agencies keep their “toys” from law enforcement]

Berglas has worked cases on both sides of the divide, including one federal cybercrime investigation in which he was not given permission to use a classified tool because intelligence officials feared it would be disclosed in court.

“The FBI is very prudent when deploying the technologies,” Berglas said. “The question is: Is it going to help the greater good by using this? Knowing that we may never have the ability to use this capability against the adversary again, are we willing to take that risk and use it?”

To referee the issue, the government has an interagency process headed by the attorney general to decide which capabilities should be classified. This is separate from the “vulnerabilities equities process” managed by the
Source: e Washington post
Sophia Handel
Sophia Handel

Posts : 23
Points : 63
Reputation : 5
Join date : 2016-03-10
Age : 33
Location : Texas

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum