Apple-FBI Update: FBI Cracks San Bernardino Killer’s iPhone, Apple Wants to Know How
This episode of Device Squad, the podcast for the mobile enterprise, features a roundtable discussion with Mobile Strategists Nitin Bhatia & Glenn Gruber. Hosted by Steven Brykman.
This is an update on our earlier podcast detailing the situation between Apple and the FBI.
As you’ll recall, Apple rejected a judge’s order to help the FBI hack into the iPhone of one of the San Bernardino shooters, calling the action “an overreach by the U.S. government.” The FBI had now dropped its case against Apple, claiming they were able to successfully break into the phone.
LA Times just reported Apple wants the FBI to reveal how they hacked into the San Bernadino phone but so far the FBI hasn’t said how they did it or who they hired for help, though the consensus is it was the Israeli cybersecurity firm, Cellebrite.
“One way or another, Apple needs to figure out the details,” said Justin Olsson, product counsel at security software maker AVG Technologies. “The responsible thing for the government to do is privately disclose the vulnerability to Apple so they can continue hardening security on their devices.”
“There is very little debate that it is in everyone’s best interest that Apple find out about this vulnerability and everyone should be asking why that is not the case,” said Alex Rice, chief technology officer at San Francisco security company HackerOne.
Does Apple have a right to know how the FBI broke into the phone?
Steven is Anexinet's Lead Content Strategist, focused on Enterprise Mobile Products, with a diverse background in literature and humor. He has helped countless Fortune 500 companies define the direction of their digital campaigns and web/mobile applications. Additionally, he co-founded Apperian, a Boston-based mobile technology company.