The FBI's attempt to expand its surveillance and hacking authority, spotlighted by a public spat over encryption with Apple, has met resistance from members of the U.S. Senate, where a newly introduced bill would block search warrants for remote devices [updated].
The District Attorney of New York County is reportedly lobbying members of U.S. Congress in the hope they'll back legislation requiring companies like Apple to decrypt data on-demand following court orders.
FBI Director James Comey on Wednesday said the U.S. government will continue to wage legal war with tech companies to gain access to encrypted devices, intimating that such measures are weakening terror organizations like ISIL.
In a select number of cases, authorities have been able to compel courts to force criminal suspects to unlock their Touch ID-equipped iPhone using their fingerprint. That security bypass is likely to continue, legal experts say, because capturing someone's fingerprint is a well-established practice in investigations.
An iPhone 5S being held as evidence in the investigation of a 2014 murder has reportedly been unlocked by the Los Angeles Police Department, though the timing of the crime suggests that the phone in question may not have been protected by encryption.
Infamous NSA whistleblower Edward Snowden has once again weighed in on the Apple-FBI battle, this time saying that the bureau should disclose the vulnerability used to crack the San Bernardino iPhone in the interest of national cybersecurity.
A report on Thursday claims the U.S. Federal Bureau of investigation spent less than $1 million on an exploit used to access an iPhone tied to last year's San Bernardino terror attack, far below a previously estimated sum of more than $1.3 million.
The FBI will not be submitting the exploit used to hack into the iPhone of San Bernardino shooter Syed Rizwan Farook to a review process that could clear it for sharing with outside parties, a report said on Wednesday.
Apple on Tuesday said the FBI divulged its first vulnerability tip under a White House process for sharing digital security flaws with private corporations on April 14, but the information was useless as Apple had already patched the issue nine months earlier.
The FBI has yet to decide whether an exploit used to crack the iPhone of San Bernardino shooter Syed Rizwan Farook will even be reviewed for possible disclosure, agency director James Comey said on Tuesday.
The U.S. Department of Justice on Friday withdrew an appeal seeking Apple's help in accessing data from a locked iPhone 5s tied to an ongoing New York drug case, saying an unnamed individual furnished the device passcode on Thursday.
A group of four tech industry associations — representing businesses like Apple, Amazon, Microsoft and Google — have published an open letter opposing a draft bill by U.S. Senators Richard Burr and Dianne Feinstein, which would make it possible for courts to order help bypassing encryption.
Law enforcement sources on Tuesday said that while an iPhone linked to last year's San Bernardino shootings has yielded no actionable intel, the dearth of new information has actually helped the FBI investigation into the terror attack.
Chinese authorities have asked Apple to turn over source code twice in the past two years, but the company refused in both cases, Apple general counsel Bruce Sewell told a hearing of the U.S. House Energy and Commerce subcommittee on Tuesday.
In its latest report on government requests for user information released Monday, Apple revealed U.S. law enforcement agencies lodged 1,015 requests for customer account information affecting 5,192 users in the second half of 2015.
While reports covered the broad strokes of Apple's conference call on encryption last Friday, bits of information are still surfacing, including an interesting statistic that reveals an average iPhone user unlocks their device about 80 times a day.