He criticized the company, as it complicated the breaking of their smartphones.
During a speech at the International Conference on Cyber Security, FBI forensic expert Steven Flatley publicly called Apple “assholes” and “evil geniuses.” He believes that by his actions the company constantly complicates the work of his colleagues. About this reports Motherboard.
As an example, Flatley described an increase in the time between possible attempts to enter a password, as a result of which the FBI must now spend two months instead of two days on going through one password. He said that with the help of special tools the bureau could sort out 45 passwords per minute. However, now investigators can enter only one password every 18 seconds.
Apple copes well with such things as an evil genius.
Stephen Flatley FBI expert
After that, Flatley praised the Israeli company Cellebrite, which, according to him, is the only one that can “fight Apple”. The company supplies technology for hacking various devices to agencies around the world.
On December 2, 2015, Syed Farouk and his wife, Tashfim Malik , fired San Bernardino, killing 14 people and injuring 21. After that, the FBI received the iPhone 5C owned by Faruk, but could not unlock it due to iOS protection.
The agency appealed to the company with the requirement to develop a special version of the system with backdoor (a loophole in the code to bypass the protection), put it on a smartphone and bypass restrictions. Apple refused , and Tim Cook said publicly that the company could not help the FBI, since it did not provide iOS with loopholes even for its own needs.
Soon, the agency has withdrawn the requirements, as it was able to find contractors and circumvent the protection. The details of the process were then kept secret, but former FBI director James Komi stated at a hearing in the Senate about the figure of 900 thousand dollars. After that, he said that the FBI can only crack the “narrow slice” of iPhones up to the 5S model, and the enthusiastic researchers have come up withseveral ways to circumvent password protection.