Case File
efta-efta01740176DOJ Data Set 10CorrespondenceEFTA Document EFTA01740176
Date
Unknown
Source
DOJ Data Set 10
Reference
efta-efta01740176
Pages
0
Persons
0
Integrity
Loading PDF viewer...
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From:
Richard Kahn ‹
>
Sent:
Tuesday, March 29, 2016 9:56 PM
To:
Jeffrey E.
james commentary on apple / fbi situation
Richard Kahn
HBRK Associates Inc.
575 Lexington =venue 4th Floor
New York, NY 10022
tel
fax
cell
Begin forwarded message:
From: =/b>james I personal genius
Subject: =/b>Re:
Date: =/b>March 29, 2016 at 5:32:36 PM =DT
To: qb>Richard Kahn
One more thing of note, had the FBI / DOJ =revailed in court, they'd have wide reaching new powers to compel
=hird-parties to act on their behalf, even at the expense of the =hird-parties' self interest.
They could, for example, have a court =ompel me to install tracking software on Jeffrey's systems and forbid =e
from disclosing it. Not that they could actually get me to do =omething like that, but it's within their proposed legal
=ustification.
Also relevant is this: https://www.washingtonpost.com/news/the-watch/wp/2016/03/10/sur=rise-nsa-data-will-
soon-routinely-be-used-for-domestic-policing-that-has-=othing-to-do-with-terrorism/
The surveillance state is not just for =errorism anymore.
Thank you,
EFTA_R1_00029344
EFTA01740176
On Mar 29, 2016, at 5:19 PM, Richard Kahn
> wrote:
interesting„
thanks
Richard Kahn
HBRK Associates Inc.
575 Lexington =venue 4th Floor
New York, NY 10022
tel
fax
cela
On Mar 29, 2016, at 4:22 PM, james ce I personal genius =
<mato
> wrote:
There are two =ikely methods* that could have been used to access the data on that =hone:
1. An =npublished "zero-day" bug that allows hackers to bypass =he lock screen and access
encrypted data on the phone.
2. A =ardware solution where the memory chip (the flash storage on the phone) =as un-soldered
from the logic board, and plugged into a machine that =an read / write the data from the chip (this is not new, this
method =as actually used in the 1985 movie "Real Genius"), =hich then duplicated the data on the chip and simulated
the =hone's hardware.
With that setup you can brute-force try =11 four-digit passcode options. When the device slows
down/erases the =ata from too many failed attempts, you just copy it over and pickup =here you left off. Depending on
how much data / size of the flash =emory chip, you can restore the original data in 5-20 =inutes.
The =econd method is MUCH more likely to have been used. It will work on any =Phone that
does NOT have a fingerprint reader. Touch ID relies on a =secure enclave" chip that manages the login attempts and
would =e effectively impossible to impersonate — so this method is =omething that Apple is aware of and has
considered.
*there's a third method called "de-capping=E244 which involves using microlasers to
sear off the top of the =PU to read the device's unique identifier, which is the much =ore complex part of the two-part
encryption key that the iPhone =ses.
2
EFTA_R1_00029345
EFTA01740177
Basically, =pple uses this hardware device ID combined with the passcode as the key =o
encrypt the data. With the device ID, they can try to decrypt the raw =ata from the flash module within 10,000 tries.
The problem is that de-capping is very risky =amp; fragile. If you cut a micron too deep
you destroy the identifier =ou're looking for and there's no possibility of =ecovering the data in anyway after. This makes
this method practically =seless for any legal inspection.
We'll never know which, if either method was used .=94 or even if any relevant data was
recovered. Since the suspects are =ead, any evidence recovered from the phone and the methodology used to =ccess it
will never be entered into any court case.
If the first method was =sed and such a zero-day does exist — then yes, a "hacker =rmy" could
have been theoretically unleashed on Apple. In that =ituation, it's very likely we'll see it used in a =uture public jailbreak
method to break into the OS — hackers =re notoriously bad at keeping secrets, being that exposing secrets is =he
primary motivation for most hackers — at which point =pple will find out about it and fix it.
It's at least =qually as likely that the whole "we broke in without Apple'= help" story is complete
fiction that the FBI / DOJ used it as =n excuse to bail from a case that was going to make them look like =echnical
incompetents, and would be lost, setting the precedent they =ant in the wrong direction.
The last brief Apple filed exposed some =ajor technical inaccuracies in the DOJ briefs, and any
hearing would =ave included Apple Engineers schooling the courts on the basics of how =ncryption works and
embarrassed the FBI's technical =esources.
Also,=remember that this iPhone belonged to the terrorist's employer. =oth he & his wife had
personal cell phones and computers which they =estroyed the day of the attack. The iCloud backup of this phone from a
=ouple weeks previous to the attack revealed NO personal email, text =essages or any other internet accounts on the
device. It's very =nlikely that iPhone was ever used for anything outside of work or =ontains anything of value to
investigators.
This case was never =bout anything on that phone, rather it was a hot-button political case =o
expand the government's investigatory powers.
(Also, contrary to that article's subheading, =he FBI never asked for Apple to unlock the phone
before pursuing legal =rders... that sounds nitpicky, but were they actually concerned =ith the contents of the device,
you'd expect the FBI to ask =icely before trying to force-conscript private corporate resources into =ewriting the device's
operating system.)
I =et this will come up again as soon as the FBI's newest toys =top working, but next time it will
be an Android device in hopes that =oogle won't raise as much of a fuss as Apple.
3
EFTA_R1_00029346
EFTA01740178
On Mar 29, 2016, at 3:27 PM, Richard Kahn <
wrote:
http://www.thedailybeast.com/articles/2016/03/29/did-the-fbi-ju=t-unleash-a-hacker-
army-on-apple.html
thoughts?
Richard Kahn
HBRK Associates Inc.
575 Lexington =venue 4th Floor
New York, NY 10022
tel =
fax
cell
4
EFTA_R1_00029347
EFTA01740179
Related Documents (6)
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA01765224
0p
DOJ Data Set 11OtherUnknown
EFTA02328489
1p
DOJ Data Set 10CorrespondenceUnknown
EFTA Document EFTA02125460
0p
DOJ Data Set 9OtherUnknown
From: "Jeffrey E." <[email protected]>
4p
DOJ Data Set 11OtherUnknown
EFTA02489202
1p
DOJ Data Set 10OtherUnknown
EFTA02086739
1p
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.