Learn about the cyber laboratory trying to decode the iPhone
Learn about the cyber laboratory trying to decode the iPhone


President Donald Trump's government wants Apple to create a back door for the iPhone, while New York's current Attorney General, Cyrus Vance, spends millions of dollars trying to find other ways to earn $ 10 million in e-prison.

Cyrus Vance worked with the city's Cybercrime division to oversee a purpose-built high-tech internet lab, including trying to use brute-power algorithms among cell phone owners. Extract data from your phone before trying to remotely wipe content to crack iPhone encryption.

The laboratory is equipped with advanced equipment and a group of technical experts, many of whom are ex-soldiers. The facility itself contains a high-frequency isolation room that blocks access. Remotely access computer-connected iPhones that have been scanned to prevent content analysis.

The entrance to the HF insulation room is strange because it is protected by two closed metal doors specially designed against electromagnetic waves. There are dozens of iPhones and iPads in the room that have been damaged of various kinds and confiscated during the alleged crime. proof.

In the electronic prison there is a huge computer that can generate 26 million random passwords per second, a robot that can remove the memory chip without using heating tools and special tools to repair damaged devices. Bring him back to work.

The prosecutor made attempts after Apple decided to launch iOS 8 about five years ago to encrypt all of its mobile devices to protect consumers. Then Google quickly encrypted Android devices.

The result was an ongoing war between law enforcement and technology companies. Prosecutors like Cyrus Vance tried to crack the phone's encryption, and Apple and Google tried to stop it.

All iPhones in the Network Lab are connected to two powerful computers that create random password guess numbers to access the iPhone. Technicians can use other computers in the office and use unused processing to create giants on their local computer network.

Sometimes, trying to guess the password requires searching in thousands of number combinations, and factory workers try to reduce the chances of using birthdays, important dates and other additional information that can be used in every specific case of the iPhone password. , Because Apple limits the number of password entries. You can try entering your password in a few minutes.

Stephen Moran, the company’s manager, said that one of the phones went through 10,000 random sequences, enough to know a four-digit password with 10,000 possible combinations, but it was launched by Apple in 2015. The six-digit password is required to match the number The total can be swapped to one million.

The laboratory contains about 3000 phones, most of which are linked to ongoing criminal investigations. Moran is not yet available. Therefore the team is encouraged to use open source software to create a special program. Workflow management for the amazing size of incoming devices. Classification and identification of the most common cases. Third-party solutions can undermine the importance of the phone and provide real-time information to claimants on any smartphone they own.

Prosecutor Cyrus Vance, Apple's chief spokesperson, has urged the government to put in place anti-encryption regulations to make it easier for law enforcement officials to use the iPhone needed for criminal investigations. According to Vance, 82% of smartphones entering the sector are unlocked and private network labs can damage half of the encryption.

According to Vance, software updates for the Apple operating system made the iPhone entry process more difficult and complicated so that it couldn't hack the iPhone in time. This is a problem, especially from a law enforcement perspective, and time is the crux of the matter for us

According to Vance, it is unfair for Apple and Google to prevent law enforcement from accessing smartphones, and a balance must be struck between protecting user privacy and ensuring justice for crime victims. Criminal acts.

Apple argues that it can provide iPhone data from iCloud without violating the protection of the iPhone itself, but Vance said that the dangerous criminal has not supported "iCloud", and can choose to store it remotely in many ways. Cases In this case, smartphones do not copy the retention period between the time of the crime and the time the iPhone is turned off.

Police officers can also access metadata on the device using a SIM card or phone company, such as: B. Time and location of the phone. However, Moran notes that this is the difference between being able to read messages, and your ability is limited to where the message was received.

"Even if we are lucky enough to enter into cloud computing or if we are lucky enough to get the metadata, we still lack a lot of important and important information that is necessary for scans," Moran said.



Save 80.0% on select products from RUWQ with promo code 80YVSNZJ, through 10/29 while supplies last.

HP 2023 15'' HD IPS Laptop, Windows 11, Intel Pentium 4-Core Processor Up to 2.70GHz, 8GB RAM, 128GB SSD, HDMI, Super-Fast 6th Gen WiFi, Dale Red (Renewed)
Previous Post Next Post