Friday, May 10, 2013, 10:20 am PT (01:20 pm ET)
Police asking Apple to decrypt seized iPhones must wait their turnApple is inundated with so many requests from law enforcement agencies to decrypt seized iPhones that officials must endure a waiting list before their case is handled.
The waiting list was revealed in a judge's recent court decision that was spotted by CNet and highlighted on Friday. U.S. District Judge Karen Caldwell revealed that the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives had contacted Apple for assistance in decrypting a particular seized iPhone, but the agency was placed on a waiting list.
An ATF agent turned to Apple for help after discovering that the agency "did not have the forensic capability" to decrypt the phone. Once the agent reached out to Apple, they were told it would be a wait of at least 7 weeks before the case could be addressed.
Law enforcement agencies are attempting to bypass Apple's security in order to gather evidence that can be used to charge suspected criminals. But because they're unable to break Apple's encryption, agencies are forced to seek assistance from the iPhone maker.
The U.S. Drug Enforcement Administration also issued a memo last month calling Apple's iMessages platform a "challenge" to intercept. DEA officials attempting to tap into suspects' text messages have run into problems with iPhone-to-iPhone iMessages, which are securely encrypted.
Apple's strength of security has iOS on track to gain security clearance from the Department of Defense. Specifically, iOS 6 is expected to gain approval for use among Pentagon employees.
On Topic: iPhone
- Apple to roll out in-store iPhone 5s screen replacement program on Aug. 4
- Redesigned Typo 2 physical keyboard for Apple's iPhone 5 & 5s now available for preorder
- Resurgent T-Mobile passes 50M subscribers, but CEO refuses to talk about Apple's 'iPhone 6'
- Rumor: Apple's 'iPhone 6' to launch on Oct. 14 as part of 'busy month'
- Verizon's plan to throttle LTE speeds draws scrutiny from FCC chairman