FBI and Justice Department accuse Apple of stalling terrorist probe

US government found al Qaeda connections on terrorist’s iPhone without Apple’s help

US law enforcement officials have accused Apple of stalling an investigation into a Saudi aviation student who killed three people at a Florida Naval base last year. 

Second Lt. Mohammed Alshamrani, a member of the Saudi air force, had been communicating with al Qaeda operatives for years. The discovery was made using information recovered from his two iPhone devices. 

Officials have since accused Apple of stalling the probe by refusing to unlock the shooter’s devices. 

Ultimately, the FBI had to bypass Apple’s security features to access the information on the gunman’s phones. The information uncovered on the devices led to a counterterrorism operation against Abdullah al-Maliki, an associate of Alshamrani, Attorney General William Barr said. Unfortunately, Apple was of little help during the FBI’s investigations.

“We received effectively no help from Apple," FBI director Christopher Wray stated during a news conference, adding that the struggle to unlock the encrypted devices caused months-long delays and jeopardized public safety.

Apple, on the other hand, disagrees with Barr and the FBI’s assessment.

“The false claims made about our company are an excuse to weaken encryption and other security measures that protect millions of users and our national security,” Apple shared in a statement provided to The Wall Street Journal.

“It is because we take our responsibility to national security so seriously that we do not believe in the creation of a backdoor—one which will make every device vulnerable to bad actors who threaten our national security and the data security of our customers.”

Despite its condemnations of the company, the Justice Department is no closer to convincing Apple to provide backdoor access to its tech. At this time, Barr and Wray have also declined to comment on how they unlocked the devices.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

iPhone 12 poses potential security risk for WhatsApp users
Security

iPhone 12 poses potential security risk for WhatsApp users

19 Oct 2020
iPhone 12 lineup official with A14 Bionic chip and 5G support
Mobile Phones

iPhone 12 lineup official with A14 Bionic chip and 5G support

13 Oct 2020
Apple will ship iPhones and other devices from retail stores
logistics

Apple will ship iPhones and other devices from retail stores

12 Oct 2020
iPhone 12 launch event confirmed for 13 October
Mobile Phones

iPhone 12 launch event confirmed for 13 October

7 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
Security

Mobile browser flaw exposes users to spoofing attacks

21 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020