Apple receives so many police demands to decrypt seized iPhones that it has created a “waiting list” to handle the deluge of requests, CNET has learned.
Court documents show that federal agents were so stymied by the encrypted iPhone 4S of a Kentucky man accused of distributing crack cocaine that they turned to Apple for decryption help last year.
An agent at the ATF, the federal Bureau of Alcohol, Tobacco, Firearms and Explosives, “contacted Apple to obtain assistance in unlocking the device,” U.S. District Judge Karen Caldwell wrote in a recent opinion. But, she wrote, the ATF was “placed on a waiting list by the company.”
A search warrant affidavit prepared by ATF agent Rob Maynard says that, for nearly three months last summer, he “attempted to locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock” an iPhone 4S. But after each police agency responded by saying they “did not have the forensic capability,” Maynard resorted to asking Cupertino.
Because the waiting list had grown so long, there would be at least a 7-week delay, Maynard says he was told by Joann Chang, a legal specialist in Apple’s litigation group. It’s unclear how long the process took, but it appears to have been at least four months.
A few thoughts:
- Apple is required by law to cooperate with law enforcement if served with a warrant for accessing data.
- Either Apple has as yet unknown ability to crack the encryption on iOS devices (either through having a built-in backdoor or through a security hole).
- In both cases Apple is leaving customers open to being attacked by these same means by hackers.
- How many iOS devices have been seized by law enforcement and are waiting to have their data retrieved by law enforcement if there is a 7 week delay?
Update: Apple is more likely not using a backdoor but simply brute forcing the encryption, in which case the 7 week delay seems more reasonable as well.