Connect with us

Technology

Cracked iPhone: Should You be Worried?

Published

on

inside apple company

The US government’s declaration that it has “successfully accessed the data stored on [San Bernardino gunman] Farook’s iPhone and therefore no longer requires” assistance from Apple, ends a six week-long legal clash between the tech firm and the FBI.

But it leaves the issue at the heart of the dispute unresolved: could the FBI have forced Apple to help it unlock the device?

It is unlikely that this will be the last time a law enforcement agency tries to compel a tech company to help bypass security measures.

What are the implications for other cases?

It had been reported that there were about a dozen other cases in which the US Justice Department was pursuing court orders to force Apple to help its investigators.

The highest profile of these was in Brooklyn, New York, where the FBI wanted access to an iPhone belonging to a defendant who had already pleaded guilty to drug dealing.

In that case, a federal judge had rejected the DoJ’s effort to invoke the All Writs Act – a three-centuries-old statute that allows court orders to be issued in circumstances where other laws don’t apply.

The DoJ had launched an appeal, but it is not yet clear if it will continue or drop it. Its decision may be based on whether the technique used to extract data from Farook’s handset can be used in other cases.

The New York case involved an iPhone 5S running the iOS 7 operating system, while the San Bernardino, California case was about an iPhone 5C running the more modern iOS 9. What works against one device might not work against the other.
But assuming the US government will at some point try again to use the All Writs Act to force Apple or some other tech company to circumvent its data protection measures, it may take a Supreme Court ruling to determine whether this is truly within the authorities’ power.

Is there any way to find out how Farook’s iPhone was cracked?

At this point, there is nothing to compel the FBI to reveal how it was done, although Apple is likely to be pressing hard to find out.

The tech firm’s lawyers have already said they would want details of the technique to be made public if evidence from the cracked iPhone is later used at trial.

But it could remain secret. There is scope within US law for the authorities to withhold the source of information if it was supplied to them on a confidential basis, and to protect sensitive intelligence-gathering methodologies.

Should I assume the US authorities can now easily work out any iPhone’s passcode?

Not necessarily.
The court order originally obtained by the FBI had instructed Apple to come up with a special version of its operating system that would have prevented Farook’s iPhone from deleting its data or imposing long lockout periods if too many incorrect passcode guesses were made.

However, the latest court filings do not say that someone else has now done this, but merely that some data stored on the device has been obtained.

Researchers at the cybersecurity firm IOActive had proposed that one way of getting data off an iPhone would be to “de-cap” its memory chips.

The process they described involved using acid and lasers to expose and copy ID information about the device so that efforts to crack its passcode could be simulated on another computer without risk of triggering the original iPhone’s self-destruct tool.

If indeed this is what happened, it is not easy and there’s a high risk of causing so much damage to the phone that the desired data becomes irretrievable.

By contrast, Cellebrite – a data forensics firm that has reportedly helped the FBI with the case – has previously discussed “bypassing” passcode locks rather than trying to deduce the number.

But it is possible that doing this would yield access to only a limited amount of a handset’s data.

One other point is that Apple recently updated its iOS software.

Each upgrade adds security fixes. So, if the FBI has indeed been alerted to a flaw in Farook’s phone’s security settings, that bug may no longer exist in devices that have installed iOS 9.3.

Is there any way to ensure no-one else can read the information held on my handset?

Short of destroying the device, perhaps no.
But you can use encryption-enabled apps to digitally scramble data.

The chat tool Wickr Messenger, for instance, lets you set it so that you have to enter a password each time you log back into the app.

Likewise, PQChat requires typing in a five-digit passcode of its own to get access.

So, even if a cracked iPhone did give up the contents of its text messages, emails and WhatsApp chats, the contents of the apps mentioned above should remain safe.

All this presumes, however, that the authorities do not manage to install spyware on your device. If that happens, all bets are off.

What is the situation in the UK?

As part of her efforts to pass the Investigatory Powers Bill, the home secretary Theresa May has said that tech firms wouldn’t have hand over encryption keys or build backdoors into their platforms.

But the law still makes mention of “equipment interference warrants”.

Campaigners at the Electronic Frontier Foundation have warned that these could be used to force Apple and others to insert new code into a device in order to help the authorities extract data, in a similar manner to the FBI’s earlier order.

The EFF adds that “matching gag orders” would prevent the firms from informing their customers or even their own lawyers about the act.

Equipment interference warrants already exist under the UK’s current law.

And for now, the focus of Apple and other tech firms is getting the Investigatory Powers Bill amended to say that in the future the warrants could only be amended with the permission of a judge.

But were there to be a case where the UK police attempted to coerce Apple to override its protective measures, it might still resist – even if the fact never became public.

BBC

Is the CEO/Founder of Investors King Limited. A proven foreign exchange research analyst and a published author on Yahoo Finance, Businessinsider, Nasdaq, Entrepreneur.com, Investorplace, and many more. He has over two decades of experience in global financial markets.

Continue Reading
Comments

Telecommunications

Lagos Residents Frustrated by Rapid Data Drain, Call for NCC Action

Published

on

Telecommunications - Investors King

Lagos residents are expressing increasing frustration over what they describe as the rapid depletion of their data bundles.

Many subscribers are now calling on the Nigerian Communications Commission (NCC) to address their concerns as they suspect changes in billing practices by telecommunication providers.

Numerous subscribers have reported that their data does not last as long as it used to. A Lagos-based teacher, Mrs. Nafidah Zaynab, shared her experience, stating that a N2,000 data bundle, which previously lasted almost a month, now depletes within just a few days.

This sentiment is echoed by many, including Idowu Anabili, a trader who has reduced his data usage due to rising costs.

Abdullahi Yunus, who runs a café, noted a significant increase in his data expenses, spending between N70,000 and N100,000 monthly, up from N30,000. He attributes this spike to faster data consumption.

Telecom operators deny any wrongdoing, attributing the faster data consumption to increased usage by subscribers.

An anonymous official from MTN explained that the variety of activities performed on smartphones has increased, leading to faster data usage.

Airtel Nigeria’s spokesperson, Mr. Femi Adeniran, suggested that background apps and high-definition streaming contribute to the issue.

Despite complaints, operators assert they have not officially increased data prices. They emphasize that automatic app updates and other technical factors may be responsible for the perceived quick depletion.

Experts suggest that the challenging economic climate may be pressuring telecom companies to subtly reduce data value.

The industry has reported a 43% rise in operational costs, although no formal tariff hikes have been announced.

The NCC has clarified that it has not authorized any increase in data tariffs. The commission highlights technical factors like automatic video play and app updates as potential causes for quick data depletion.

In a bid to assist consumers, the NCC has advised turning on data saver modes and managing app updates to conserve data.

To combat the issue, Mobile Network Operators (MNOs) have initiated a campaign to educate consumers on optimizing their data usage.

They recommend practices such as disabling automatic updates and closing unused apps.

Continue Reading

Social Media

Meta Shuts Down 63,000 Nigerian Accounts in Sextortion Crackdown

Published

on

Facebook Meta

In a significant move to combat online crime, Meta Platforms Inc., the parent company of Facebook, Instagram, and WhatsApp, has removed 63,000 accounts in Nigeria linked to sextortion scams.

This sweeping action is part of Meta’s ongoing effort to address the growing threat of digital extortion on its platforms.

Unmasking the Scammers

The crackdown, which took place at the end of May, targeted accounts engaged in blackmail schemes.

These scammers posed as young women to coerce individuals into sharing intimate photos, which were then used to extort money from the victims.

The removal follows a Bloomberg Businessweek exposé highlighting the rise of such crimes, particularly affecting teenagers in the United States.

The Global Impact

The U.S. Federal Bureau of Investigation (FBI) has identified sextortion as one of the fastest-growing crimes targeting minors.

The schemes often lead to severe consequences, including the tragic suicides of more than two dozen teens.

In one high-profile case, the death of 17-year-old Jordan DeMay in Michigan led to the arrest of suspects traced back to Lagos, Nigeria.

The Role of the Yahoo Boys

Many of the dismantled accounts were linked to the “Yahoo Boys,” a notorious group known for orchestrating various online scams.

These individuals have been using social media to recruit and train new scammers, sharing blackmail scripts and fake account guides.

Meta’s Response

Meta’s spokesperson emphasized the company’s commitment to user safety, stating, “Financial sextortion is a horrific crime that can have devastating consequences.”

The company is continually improving its defenses and has reported offenders targeting minors to the National Center for Missing & Exploited Children.

To enhance protection, Meta has implemented stricter messaging settings for teen accounts and safety notices regarding sextortion.

They are also employing technology to blur potentially harmful images shared with minors.

Ongoing Efforts

Meta’s actions highlight the complex and evolving nature of online crime. The company has pledged to remain vigilant, adapting its strategies to counter new threats as they emerge.

“This is an adversarial space where criminals evolve to evade our defenses,” Meta noted.

Looking Forward

As digital platforms continue to grapple with issues of privacy and security, Meta’s recent actions demonstrate a proactive stance in safeguarding users.

By dismantling these networks, the company aims to reduce the prevalence of sextortion and foster a safer online environment for all.

The crackdown serves as a reminder of the need for continued vigilance and collaboration between tech companies and law enforcement to protect individuals from the harmful effects of digital exploitation.

Continue Reading

Fintech

Flutterwave Celebrates Inclusion in CNBC’s Top 250 Global Fintechs

Published

on

Flutterwave has been recognized as one of the Top 250 Fintech companies globally by CNBC and Statista.

Joining the ranks of industry giants like Ali Pay, Klarna, Piggyvest, and Mastercard, this accolade underscores Flutterwave’s impact on the financial technology sector.

This honor follows Flutterwave’s recent inclusion in Fast Company’s Most Innovative Companies list, highlighting the company’s pivotal role in transforming Africa’s payment landscape.

The recognition is a testament to Flutterwave’s dedication to innovation and excellence in providing seamless payment solutions across the continent.

Expressing gratitude, Flutterwave acknowledged its talented team, supportive board, reliable partners, and loyal customers for contributing to this success.

The company continues to drive progress in the fintech industry, reinforcing its commitment to enhancing financial accessibility and inclusion in Africa and beyond.

Flutterwave’s recognition on these prestigious lists marks a proud moment and a significant milestone in its journey, reflecting the company’s growing influence and leadership in the global fintech arena.

Continue Reading
Advertisement




Advertisement
Advertisement
Advertisement

Trending