Unsolder the flash memory ICs, and then read them
If the SEC can't figure it out, hire a hacker.
The Feds can't make suspects give up their company-issued smartphone passcodes because doing so violates the Fifth Amendment of the US Constitution. So ruled Judge Mark Kearney of the federal court in East Pennsylvania in the case of Securities and Exchange Commission v Huang, an insider-trading case brought against two ex- …
SEC can and should have figured it out. According to their rules the bank should have (by whatever means necessary) kept a copy of all messages and ensured that the messages traverse the bank audit system so they are stored there.
I am surprised that SEC has not nailed Capital bank for violating their rules to the tune of a few million.
iOS devices are encrypted by default these days, aren't they?
If Apple have implemented it properly, then the encryption key will be stored inside a secure module which will only release it if sent the correct passcode; and if you send the wrong passcode too many times, it erases the key.
This appears to be what they've done:
http://smallbusiness.chron.com/happens-enter-wrong-password-iphone-many-times-69874.html
https://support.apple.com/en-gb/HT204306
(Aside: this means it's very easy to annoy an iPhone user by wiping their device)
If you want to get around that, you'll have to crack open the secure module and examine it using something like a tunnelling electron microscope. That's assuming the secure module doesn't have defences against being opened.
If you want to get around that, you'll have to crack open the secure module and examine it using something like a tunnelling electron microscope. That's assuming the secure module doesn't have defences against being opened.
It appears you have just produced an argument for a low iFixIt Repairability score :).
“17. Azl Jan 26, 2012 4:34 PM CST” at the American Bar Association said it best:
http://www.abajournal.com/news/article/judge_orders_mortgage_fraud_defendant_to_reveal_encrypted_contents_of_lapto/
“Unlike files in a safe, the contents of an encrypted drive are entirely visible, just not understandable. A seized hard drive can have its contents examined right down the 1’s and 0’s of each bit, regardless of encryption.
Thus, turning over the password does not hand them new information, like papers out of safe. Instead, it interprets the data they already have, but do not understand.
It is precisely testifying against one’s self. It is the act of taking data the prosecution already has but does not understand and interpreting it for them so that they may use it against you.
A better analogy would be a diary written in code. The government, which already HAS the diary, can see its contents clearly, but without your cooperation, cannot understand it.
They are free to try and crack the diary code on their own [as they are free to try and brute-force your encryption] but to compel you to interpret it for them - to supply the meaning - is precisely the act of testifying against yourself. ”
These cases seem to go either way, on fairly arcane procedural rules. I wonder how long it will be until we get a broader precedent (and which way it will go). I'm encouraged by the supreme court's ruling not that long ago that phones can't be searched without a warrant, but this is a separate issue, so who knows.
If you are about to get collared by the US Police then power down your iPhone before that can cuff you.
That way, any fingerprint unlocking bypass of the court ruling is null and void because for some strange reason iOS seems to want you to put in your passkey after a powerup.
Perhaps for once Apple has done the right thing for its Hipster owners?
I'm like the guys in the article in that I have a company iPhone 5s and I get to choose the passkey. Not that I have anything stored on it that could anyway incriminate me in any crime unless you think that having Office 365 (Word etc) on a phone is a crime? (Well I do but that is another story)
This post has been deleted by its author
It's not double jeopardy at all... refuse the first time, you get two years. They release you and ask again. You refuse, you get two years because this now a "new" offense. Ad nauseum ad infinitum ad mortem and if the device finally rolls over and dies, they'll probably keep asking and not believe that the device has died.
So, whatever you access by being you, is also accessible to the Government. Well that finally kills the "biometric security" platform in one fell swoop.
Kudos there, maybe we'll finally stop hearing about that nonsense.
I think you'll find that still falls under the Fifth Ammendment. "Nor shall be compelled in any criminal case to be a witness against himself" means offering any evidence for their own prosecution, verbal or otherwise. The prosecution can present any evidence they can legally uncover, or is freely offered by a defendant, but they can't compel them to show where the evidence is or to testify against themselves. If the prosecution knew EXACTLY what was in the phone then they can subpoena them to produce the data, but as it stands they are only fishing.
If they had been smarter, they would have wiped their phones before handing them over.
Even if they surprised them in a meeting, they could have "had to go to the bathroom real bad", then poof.
Every job I've left, I clean house before I even put notice in.
Can't the fuzz subpoena the cell phone text records?