Apple: FBI's surprise postponement of court hearing is a 'bolt from the blue'

The FBI now says it doesn't need any help from Apple to get into the San Bernardino shooter's iPhone—shocking Apple, and raising a lot of new questions.

No more than 18 hours before a scheduled court hearing, the FBI is now saying it doesn’t need any help from Apple to get into San Bernardino shooter Syed Rizwan Farook’s iPhone 5c. So, as of Monday night, the hearing has been called off, and the February 16 court order that started Apple’s battle with the FBI has been stayed.

Wait, what?

“On Sunday, March 20, 2016, an outside party demonstrated to the FBI a possible method for unlocking Farook’s iPhone,” the Department of Justice wrote in a Monday afternoon court filing. “Testing is required to determine whether it is a viable method that will not compromise data on Farook’s iPhone. If the method is viable, it should eliminate the need for the assistance from Apple set forth in the All Writs Act Order in this case.”

Early Monday night, Apple held a conference call with reporters to discuss the latest development, which surprised Apple as much as everyone else who’s been following the case. After all, the FBI and its director, James Comey, have insisted multiple times that only Apple has the expertise to break into this phone.

This premise was the linchpin to the FBI’s request for Apple to write “GovtOS,” a version of iOS that would run on Farook’s phone and remove the Erase Data feature that would wipe the phone after 10 incorrect guesses at his passcode. In fact, warrants issued under the All Writs Act need to pass some tests (established by the courts in prior cases), and one of them is whether such a warrant is “necessary and appropriate.” If the FBI is now claiming it doesn’t need Apple’s help, it’s suddenly uncertain whether that court order would pass the “necessary” test.

The stay, issued by Magistrate Judge Sheri Pym on Monday afternoon, reads in part:

As there is presently uncertainty surrounding the government’s need for Apple’s assistance, the court’s February 16, 2016 Order Compelling Apple, Inc. to Assist Agents in Search, in case number ED 15–451-M, is hereby stayed, pending further submissions in this case.

It’s not over yet, though. The stay also gives the government a deadline of April 5 “to file a status report.” If the FBI is indeed able to get into Farook’s phone without destroying its data, the government might choose to drop the issue altogether.

Of course, if the government is successful in accessing Farook’s phone, then Apple will be left with unanswered questions of its own—the first being, How exactly did the FBI get inside the phone? “This was a bolt from the blue from them,” said Apple’s lawyers. Indeed, the company says it had no idea the FBI was still attempting to break the iPhone’s encryption on its own.

Right now, Apple doesn’t know how—or even if—the phone was breached. But they’re curious. Apple’s lawyers said that if the government decides it wants to pursue the case, the company would want to find out who the government consulted to get into the phone without Apple’s assistance, and what “method” they were offered. If the government drops the case, Apple still hopes the FBI would share what it learned about iOS’s vulnerabilities.

So for the time being, the case is on hold. Judge Pym wants a status update from the government by April 5. The stay is embedded below.

Apple-FBI March 21 order

Join the CSO newsletter!

Error: Please check your email address.

Tags Apple

More about AppleAssistDepartment of JusticeFBIInc.indeed

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Susie Ochs

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts