قالب وردپرس درنا توس
Home / WorldTech / The FBI cracked Lev Parnas' iPhone 11 in 2 months

The FBI cracked Lev Parnas' iPhone 11 in 2 months



Lev Parnas, seen here in December 2019.
Photo : Seth Wenig ( AP ) 19659004 ] The US Department of Justice said in a letter to a federal judge this week that it took nearly two months for the FBI to break into an iPhone 11 from Lev Parnas, a former employee of Donald Trump's lawyer Bloomberg reported on Tuesday that Rudy Giuliani had been drawn into the extensive impeachment proceedings before the White House. That the FBI managed to unlock the device at all can raise eyebrows since the DOJ and the FBI have recently launched print campaigns claiming that urgently need Apple's help to unlock the device and Apple to build back doors to its encryption .

Parnas claims that he has Trump's plans to force the Ukrainian government to pseudo-investigate Democratic presidential candidate Joe Biden by withholding nearly $ 400 million in defense assistance – the matter at the center of the ongoing impeachment process Trump is now in the Senate. Parnas, who told Rachel Maddow of MSNBC last week that Trump and numerous other senior White House officials were fully aware of the plan was charged with transferring foreign funds to the United States in October 2019. He is currently out on bail.

According to a letter from the House Intelligence Committee the iPhone and other devices were seized by federal authorities when Parnas was arrested in October. They are still being held by the government, but Parnas later agreed to cooperate, and his defense team sought permission to get the data extracted from the devices by the FBI and to share it with the house's investigators. Parnas's lawyer, Joseph A. Bondy, tweeted that the DOJ successfully extracted data from the iPhone 11 in question on December 3, 2019, but claimed that it intentionally didn't hand over the documents before New Year's. ( The documents have been transferred in the meantime .

In a response from to the US District Judge J. Paul Oetken the DOJ wrote: "First, Parnas refused to provide the password for his devices, which is of course his right, but the FBI is required to unlock iPhone 11 for almost two months." As a lawyer for Parnas, who has since Technical support from the government is required for more than two weeks without a hard drive to transfer the information and unable to navigate through the contents of the files, and the letter also states that the FBI continues to attempt to use other devices Unlock Parnas.

A report in Motherboard said that the company that unlocked the device was Cellebrite, an Israeli company that specializes in devices rt, which can be used to bypass the security built into iPhones and third-party devices. As Apple Insider found the House Intelligence Committee published some of the documents in a format used by Cellebrite. Other files in the batch refer to Parnas' apparent effort to arrange a meeting between Trump and Ukrainian President Volodymyr Zelensky.

iPhone 11 was released in September 2019 as extensive iOS security update . As Bloomberg noted, this timeline indicates that the FBI has been able to break into one of Apple's safest iPhones, and it's not even clear whether it really took two months or the investigators were waiting to clear up the matter. At the same time, the DOJ, the FBI, and Trump itself continued to pressurize the company to set up surveillance backdoors for its security – this time in relation to two older iPhones owned by a gunner who attacked Naval Air Station Pensacola in Florida in December 2019.

Despite the fact that such back doors could endanger security for everyone, not just terrorists. The FBI also previously claimed that Apple couldn't crack the encryption of phones owned by terrorists until targeted third-party hackers federal investigators with "lots of gigabytes" of iCloud data from Pensacola -Protect. On Tuesday Reuters reported that the company had eliminated plans to allow iCloud users to fully encrypt their device backups under pressure from the FBI.


Source link