Law enforcement sources on Tuesday said that while an iPhone linked to last year's San Bernardino shootings has yielded no actionable intel, the dearth of new information has actually helped the FBI investigation into the terror attack.
Citing unnamed law enforcement officials, CNN reports an iPhone 5c used by terror suspect Syed Rizwan Farook contains no evidence of contact with ISIS sympathizers or transfer of encrypted communications during a specific time window on the day of the attack.
The development has left investigators "more confident" that Farook and his wife Tashfeen Malik did not reach out to co-conspirators during an 18-minute gap in the FBI's model of events. Officials said the FBI could not put these theories to bed without access to Farook's iPhone, according to the report.
What the target iPhone 5c does not, and cannot, reveal is whether Farook and Malik used another mode of communication during the 18 minutes that have gone unaccounted for.
The innocuous iPhone, assigned to Farook by his former employer the San Bernardino County Health Department, was at the center of a divisive court battle involving Apple and the Justice Department. FBI officials requested Apple's help in extracting the passcode-locked phone's data, an action that would require the company to thwart its own security systems. Apple declined, setting up a court battle that in turn sparked debate over how best to weigh public rights to privacy with national security.
Federal prosecutors ultimately withdrew the case after an unnamed third party came forward with a working extraction method. With the passcode cracked, focus has turned to the phone's contents, a major bone of contention for both sides. The DOJ argued the need to exhaust every lead in its investigation, even if chances were slim that Farook's phone contained actionable intelligence.
Apple, which at that point had already handed over iCloud data from the account associated with the device, painted the government's pursuit as reckless. The company disagreed to creating a workaround that would potentially put hundreds of millions of iOS devices at risk of intrusion in return for a small amount of data stored on-device, if any existed.
According to today's report, investigators are satisfied that Farook's iPhone contains no data that was not already known. Quizzically, sources added that data gleaned from the device is still being analyzed, a situation seemingly unchanged from last week.