Skip to main content

The FBI still hasn’t cracked the San Bernardino terrorists’ encrypted smartphone

hacker compromises data of nearly 30000 fbi and dhs employees with a simple phone call j edgar hoover building headquarters
The J. Edgar Hoover Building, headquarters for the Federal Bureau of Investigation, in Washington, D.C..
There’s a reason smartphone encryption is a flashpoint for controversy: in those instances when a secured handset is used to facilitate crime, it sometimes presents a significant roadblock to law enforcement. Two months following the Islamic State-inspired rampage in San Bernardino, California that left 14 people dead, technicians at the Federal Bureau of Investigation have been unable to crack security on a smartphone belonging to the terrorist couple who were responsible.

“We still have one of [the] killers’ phones that we haven’t been able to open,” FBI Director James Comey told the Senate Intelligence Committee on Wednesday. “We are still working on it.”

Related Videos

The agency had previously implied that messages exchanged via the cell phone would shed light on the activities of Syed Rizwan Farook, a county health inspector, and Tashfeen Malik, his wife, who together gunned down attendees of an Inland Regional Center holiday party in December. The FBI hopes to learn whether the couple had planned additional attacks and whether they’d coordinated with other parties prior to the attack. (Short of evidence to the contrary, the FBI believes that Farook became self-radicalized via the Internet.)

The Bernardino barrier is the second such type the agency’s faced in recent months. A handset belonging to one of two gunman involved on an attempted Islamic State attack directed at a cartoon contest in Garland, Texas last year was used to exchange 109 messages with “an overseas terrorist,” messages which Director Comey told the Senate Judiciary Committee in May remain encrypted.

The San Bernardino revelations are sure to reinvigorate the contentious debate over mobile device encryption. Opponents of encryption argue that the privacy it affords isn’t worth the investigative obstructions it presents, and that encryption must at the very least accommodate searches authorized by warrant. This rhetoric has resonated with lawmakers: bills before the state assemblies of New York and California would impose a fine on manufacturers and operating system providers for devices that don’t provide a “backdoor” around encryption for authorities. Senators John McCain and Dianne Feinstein and Senate Intelligence Committee Chairman Richard Burr have called for similar legislation at the federal level.

“All of the evidence contained in smartphones and similar devices will be lost to law enforcement, so long as the criminals take the precaution of protecting their devices with passcodes,” reads a statement issued in connection with the proposed New York law. “Simply stated, passcode-protected devices render lawful court orders meaningless and encourage criminals to act with impunity.”

Security proponents refute those claims. A study published by Harvard’s Berkman Center rebuts FBI claims that the use of encryption inhibits law enforcement in terrorism investigations. Tim Cook, NSA Director Admiral Mike Rogers, former CIA analyst John Kiriakou, and others have questioned the need for backdoors in encrypted devices and messaging platforms.

And in an open letter published by digital rights group Access Now in January, nearly 200 cyber security experts and activists from 42 countries urged lawmakers in the U.S., U.K., and China not to curtail encryption on consumer devices. “Users should have the option to use — and companies the option to provide — the strongest encryption available, including end-to-end encryption, without fear that governments will compel access to the content, metadata, or encryption keys without due process and respect for human rights,” the letter says.

Meanwhile, Democratic representative Ted Lieu and Republican representative Blake Farenthold in early February introduced pro-encryption legislation that would make it illegal for state or political representatives to demand the ability to decrypt communications, effectively nullifying the proposed New York and California laws. So as lawmakers on both sides gear up for what’s sure to be a lengthy legislative battle, an end to the decryption debate is nowhere in sight. And tragic attacks like San Bernardino will only prolong it.

Editors' Recommendations

Will my phone automatically change for daylight saving time?
The iPhone 14 Pro's Dynamic Island showing the timer and music playing.

Like it or not, it's that time of year again — time for daylight saving time. On Sunday, March 12, at 2:00 a.m. (local time), the majority of people in the United States will be "springing forward" and setting their clocks ahead by an hour. Along with losing an hour of sleep, it also poses an important question: will your phone automatically change for daylight saving time?

It's a question that applies regardless of which phone you have. Whether you're rocking an iPhone 14 Pro, a Samsung Galaxy S23 Ultra, or any other smartphone, it's important to know whether or not you need to change it for the new time.

Read more
Apple, please release the iPhone 14 in these colors next 
Mockup render of the iPhone 14 in an orange color.

You've probably heard the news by now. Earlier this week, Apple released a new yellow color for the iPhone 14 and iPhone 14 Plus -- and it's now up for pre-order. Does it look good? I sure think so! It's a bright, vibrant, and saturated yellow that adds a lot of pop to a mostly muted color palette for the iPhone 14 series.

But as much as I like how the yellow looks, it's not the only color I'd love to see the iPhone come in. There are so many possibilities for future iPhone colors, and if Apple's looking for a few tips on what to do next, I have some suggestions. Here are five colors Apple should release the iPhone 14 in next (hopefully soon).
Dark green

Read more
Watch the Galaxy S23 Ultra and iPhone 14 Pro Max face off in brutal drop test
samsung galaxy s23 ultra iphone 14 pro max drop test watch phonebuff

Samsung’s latest flagship, the Galaxy S23 Ultra, is one of the year's best phones. It comes equipped with the powerful new, purpose-build Snapdragon 8 Gen 2 for Galaxy chip, a 200MP main camera, and Corning’s Gorilla Glass Victus 2 on the front and back of the device (which means heavy durability).

But there’s another question — how does Gorilla Glass Victus 2 hold up against Apple’s confidently-named 'Ceramic Shield' on the iPhone 14 Pro Max? YouTuber PhoneBuff did a drop test to find that very answer.

Read more