Originally Posted By: tanstaafl.
Since the FBI thinks that Apple can decrypt the phone, why don't they just give the phone to Apple, let Apple do whatever magic it is they do, then put just the data on a flash drive and give that to the FBI?
For all devices running iOS 8.0 and later versions, Apple will not perform iOS data extractions as data extraction tools are no longer effective. The files to be extracted are protected by an encryption key that is tied to the user’s passcode, which Apple does not possess.

For iOS devices running iOS versions earlier than iOS 8.0, upon receipt of a valid search warrant issued upon a showing of probable cause, Apple can extract certain categories of active data from passcode locked iOS devices. Specifically, the user generated active files on an iOS device that are contained in Apple’s native apps and for which the data is not encrypted using the passcode (“user generated active files”), can be extracted and provided to law enforcement on external media. Apple can perform this data extraction process on iOS devices running iOS 4 through iOS 7. Please note the only categories of user generated active files that can be provided to law enforcement, pursuant to a valid search warrant, are: SMS, iMessage, MMS, photos, videos, contacts, audio recording, and call history. Apple cannot provide: email, calendar entries, or any third-party app data.

The FBI is asking Apple to create a new instrument (in legal terms) to restore the ability to extract some data like what was possible from iOS 4 - iOS 7.

iOS 8 and above encrypt everything user created with the passcode entangled with the device UID, thus this instrument would be different then the past one. It would have to crack encryption too since the passcode is never sent to Apple.

Previous extraction was possible because that data wasn't encrypted by using the passcode, instead it only used the UID known to Apple at point of manufacturing. The previous instrument had no encryption breaking capabilities, it simply opened what was accessible with a known to Apple key unique to each phone. *edit* My explanation here is a bit off on the technical details, will add some diagrams that help explain the iOS 7 to iOS 8 changes easier then with words.

Specifically the FBI is asking Apple to create an instrument that defeats the following protections:
  • Disable the Apple programmed time delays between passcode entry attempts
  • Enable a way to attempt passcode entry over a USB, WiFi, Bluetooth or Cellular connection instead of direct touch screen entry.
  • Disable the user/owner facing setting that wipes user data after 10 failed passcode entries, a setting that the terrorist or San Bernardino County may have turned on


Edited by drakino (24/02/2016 21:19)
Edit Reason: Off on wording with how iOS 8 changed