The Merg
Golden Member
- Feb 25, 2009
- 1,210
- 34
- 91
The Government is not trying to make it so that it is butt-simple to access data from the phones. They are trying to keep things as they were.
Currently (iOS 7 and earlier), there are two ways that law enforcement can access data on an iPhone:
1. Consent
2. Search Warrant
In going the consent route, it is logical to think that the owner of the phone is providing the passcode to allow access to the phone. Once that is done, law enforcement can physically go through the phone or they can download the contents via certain tools at their disposal. There is currently no tool that can bypass the passcode on an iPhone/iPad.
In going the search warrant route, it is logical to assume that the owner of the phone has not provided their passcode. As mentioned above, there is no tool that can bypass the passcode on an iPhone. In these cases, law enforcement have to write and serve a second search warrant to Apple itself in CA. They provide the phone to Apple along with the second search warrant. Apple would then bypass the passcode and download the contents of the phone to provide them to law enforcement.
With iOS 8 and the new encryption, while Apple could bypass the passcode, the data on the phone will be encrypted and useless. The alternative for law enforcement is to request the data that is currently stored in iCloud. This would mean that mail, calendar, and backups would be available. The mail and calendar info is only available if the phone owner used iCloud for their service though.
Brute force is not generally an option as after just a few attempts the phone will lock the user out for extended periods of time and depending on settings will erase the phone.
- Merg
Currently (iOS 7 and earlier), there are two ways that law enforcement can access data on an iPhone:
1. Consent
2. Search Warrant
In going the consent route, it is logical to think that the owner of the phone is providing the passcode to allow access to the phone. Once that is done, law enforcement can physically go through the phone or they can download the contents via certain tools at their disposal. There is currently no tool that can bypass the passcode on an iPhone/iPad.
In going the search warrant route, it is logical to assume that the owner of the phone has not provided their passcode. As mentioned above, there is no tool that can bypass the passcode on an iPhone. In these cases, law enforcement have to write and serve a second search warrant to Apple itself in CA. They provide the phone to Apple along with the second search warrant. Apple would then bypass the passcode and download the contents of the phone to provide them to law enforcement.
With iOS 8 and the new encryption, while Apple could bypass the passcode, the data on the phone will be encrypted and useless. The alternative for law enforcement is to request the data that is currently stored in iCloud. This would mean that mail, calendar, and backups would be available. The mail and calendar info is only available if the phone owner used iCloud for their service though.
Brute force is not generally an option as after just a few attempts the phone will lock the user out for extended periods of time and depending on settings will erase the phone.
- Merg
