A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation, March 2018

Background

According to the document:

“On December 2, 2015, a terror attack in San Bernardino, California killed 14 people and injured 17 others. The next day, the Federal Bureau of Investigation (FBI) seized pursuant to a search warrant the iPhone of one of the subjects believed to have been responsible for the attack, Syed Rizwan Farook. Thereafter, on February 9 and March 1, 2016, then-FBI Director James Comey testified before Congress, in substance, that the FBI was not able to obtain access to data on the Farook iPhone, and then that it would require assistance from the manufacturer, Apple, to do so. To accomplish this, on February 16, 2016, the U.S. Attorney’s Office for the Central District of California (USAO) sought and obtained an ex parte court order requiring Apple to assist the FBI in its effort to search the iPhone.

A few days later, the USAO filed a motion with the Court seeking to compel Apple’s compliance with the ex parte order, and Apple filed a motion to vacate the order. However, on March 21, 2016, before the District Judge ruled on these pending motions, the USAO reported to the Court that an outside party had  demonstrated to the FBI a possible method for unlocking the iPhone. One week later, on March 28, 2016, the USAO reported back to the Court that the FBI had successfully accessed the iPhone and no longer required assistance from Apple. On April 19, 2016, then- FBI Executive Assistant Director (EAD) Amy Hess testified about the matter before Congress and cited rapidly changing technology as a reason the FBI was not able to exploit the iPhone without the assistance of a third party.

Continue scrolling for more...

On August 31, 2016, the Office of the Inspector General (OIG) received a referral from the FBI Inspection Division after former EAD Hess expressed concern about an alleged disagreement between units within the FBI Operational Technology Division (OTD) over the “capabilities available to the national security programs” to access the Farook iPhone following its seizure, and concerns that this may have resulted in her or Comey giving inaccurate testimony to Congress on the FBI’s capabilities. Specifically, EAD Hess expressed concerns that an OTD unit may have had techniques available to exploit the Farook iPhone that certain unidentified OTD officials did not employ and that these officials were indifferent to the fact that FBI leadership and others were testifying to Congress, and filing affidavits in court, that the FBI had no such capability. The OIG has conducted inquiries into the situation, including interviewing relevant key participants, and found no evidence that OTO had the capability to exploit the Farook iPhone at the time of the Congressional testimony and initial court filings. We therefore determined that neither the Congressional testimony nor the submissions to the Court were inaccurate when made. However, we found that inadequate communication and coordination within OTO caused a delay in engaging all relevant OTO personnel in t he search for a technical solution to the Farook iPhone problem, as well as the outside party that ultimately developed the method that unlocked the phone, issues that we learned the FBI has since taken steps to address.”

Document Archive

 A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation, March 2018 [17 Pages, 2.5MB]

https://documents.theblackvault.com/documents/fbifiles/o1803.pdf

Follow The Black Vault on Social Media:

This post was published on April 4, 2018 6:24 am

John Greenewald

Recent Posts

AARO Releases Final Report on “Eglin UAP” Incident

Today, the All-domain Anomaly Resolution Office (AARO) of the U.S. Department of Defense provided their…

April 24, 2024

AATIP and the Pentagon: The Struggle Over UFO Program Records

Since October 2017, The Black Vault has investigated the Advanced Aerospace Threat Identification Program (AATIP),…

April 23, 2024

FOIA Documents Reveal AARO’s Authorized and Repeated Attempts to Engage with David Grusch

https://www.youtube.com/watch?v=3GNITLBj0hM The All-domain Anomaly Resolution Office (AARO), tasked to investigate Unidentified Anomalous Phenomena (UAP), made…

April 18, 2024

DoD Releases “KONA BLUE” Documents

The following was the description by the DoD about KONA BLUE. It is reproduced here,…

April 16, 2024

Newly Released 1963 Report Sheds Light on Nuclear Era Urban Defense Strategies

After nearly a decade of waiting, The Black Vault has successfully acquired a document through…

April 12, 2024

National Guard Bureau Transition Book, Date Unknown

These records were provided by the family of anthologist and transparency activist Russ Kick, from his…

April 9, 2024