Click to Skip Ad
Closing in...

Edward Snowden says FBI is lying and could easily break into San Bernardino shooter’s iPhone

Updated Dec 19th, 2018 9:14PM EST
BGR

If you buy through a BGR link, we may earn an affiliate commission, helping support our expert product labs.

Known for his numerous leaks that exposed the NSA’s mass surveillance operations, Edward Snowden is now the latest expert to take a side in the Apple vs. FBI iPhone encryption case. According to him, the FBI’s claims are “BS,” and there is at least one way to bypass the iOS security features the Bureau wants Apple to remove.

DON’T MISS: Ex-boyfriend brilliantly trolls woman who won’t return iPhone he gave her as a gift

According to The Intercept, Snowden made an appearance at the Common Cause’s Blueprint for Democracy conference over a video link from Moscow.

“The FBI says Apple has the ‘exclusive technical means,’” he said. “Respectfully, that’s bulls**t.” He then proceeded to explain how the FBI could force its way into the iPhone – which is how the FBI wants to get in – without Apple’s assistance.

The FBI is worried that after entering the wrong PIN for 10 times in a row, the iPhone could automatically erase data stored on it. So that’s one of the things it’s asking Apple to remove. But Snowden revealed that the FBI could physically remove the memory from the phone’s mainboard, copy it, and then try password combinations until it finds the right one.

The method is described in a post on the American Civil Liberties Union (ACLU) site, which claims that FBI’s stance on this particular matter is a lie. The Bureau is worried the iPhone could destroy itself, but this method would let its hackers save the contents without Apple’s help.

“All the FBI needs to do to avoid any irreversible auto erase is simple to copy that flash memory (which includes the Effaceable Storage) before it tries 10 passcode attempts. It can then re-try indefinitely because it can restore the NAND flash memory from its backup copy,” ACLU wrote.

“The FBI can simply remove this chip from the circuit board (“desolder” it), connect it to a device capable of reading and writing NAND flash, and copy all of its data. It can then replace the chip, and start testing passcodes. If it turns out that the auto-erase feature is on, and the Effaceable Storage gets erased, they can remove the chip, copy the original information back in, and replace it. If they plan to do this many times, they can attach a “test socket” to the circuit board that makes it easy and fast to do this kind of chip swapping.”

Of course, the FBI can still argue that this method is too laborious, and guessing the password could take a lot of time, which is why it needs Apple to help out with a special version of iOS that would circumvent security measures. On the other hand, others have also speculated that the FBI has what it takes to crack the iPhone 5c belonging to one of the San Bernardino’s shooters without Apple’s help.

Snowden’s comments on the matter are available in the video interview below while ACLU’s full explanation is available at the source link.

Chris Smith Senior Writer

Chris Smith has been covering consumer electronics ever since the iPhone revolutionized the industry in 2008. When he’s not writing about the most recent tech news for BGR, he brings his entertainment expertise to Marvel’s Cinematic Universe and other blockbuster franchises.

Outside of work, you’ll catch him streaming almost every new movie and TV show release as soon as it's available.