{"id":201319,"date":"2016-03-24T06:50:33","date_gmt":"2016-03-24T06:50:33","guid":{"rendered":"http:\/\/4cd.e16.myftpupload.com\/?p=201319"},"modified":"2016-03-24T06:50:33","modified_gmt":"2016-03-24T06:50:33","slug":"israels-cellebrite-linked-to-fbis-iphone-hack-attempt","status":"publish","type":"post","link":"https:\/\/citifmonline.com\/2016\/03\/israels-cellebrite-linked-to-fbis-iphone-hack-attempt\/","title":{"rendered":"Israel’s Cellebrite linked to FBI’s iPhone hack attempt"},"content":{"rendered":"
An Israeli cybersecurity firm is under pressure to reveal its involvement in efforts to extract data from an iPhone.<\/p>\n
The FBI said on Monday that it might have found a way to deal with the password lock set by killer Syed Rizwan Farook, who was behind an attack in San Bernardino, California, in December.<\/p>\n
An Israeli newspaper has since reported that data forensics experts at Cellebrite are involved in the case.<\/p>\n
Cellebrite told the BBC that it works with the FBI but would not say more.<\/p>\n
Its website, however, states that one of its tools can extract and decode data from the iPhone 5C – the model in question – among other locked handsets. Apple has refused to help the FBI do this.<\/p>\n
“File system extractions, decoding and analysis can be performed on locked iOS devices with a simple or complex passcode,” Cellebrite’s site states.<\/p>\n
“Simple passcodes will be recovered during the physical extraction process and enable access to emails and keychain passwords.<\/p>\n
“If a complex password is set on the device, physical extraction can be performed without access to emails and keychain.”<\/p>\n