Author Topic: FBI Director Says Investigators Unable to Unlock San Bernardino Killer's Phone Content  (Read 3300 times)

0 Members and 1 Guest are viewing this topic.

Online mystery-ak

  • Owner
  • Administrator
  • ******
  • Posts: 386,157
  • Let's Go Brandon!
http://www.newsmax.com/PrintTemplate.aspx/?nodeid=713480


Newsmax
FBI Director Says Investigators Unable to Unlock San Bernardino Killer's Phone Content
Tuesday, February 9, 2016 03:45 PM

By: REUTERS

FBI Director James Comey said on Tuesday that federal investigators have still been unable to access the phone contents belonging to one of the San Bernardino killers due to encrypted technology.

Comey told the Senate Intelligence Committee that the phenomenon of communications "going dark" due to more sophisticated technology and wider use of encryption is "overwhelmingly affecting" law enforcement operations, including investigations into murder, car accidents, drug trafficking and the proliferation of child pornography.

Comey cited the San Bernardino attack as an example. Syed Rizwan Farook, 28, launched an Islamic State-inspired attack with his wife, Tashfeen Malik, 29, in the California town in December that left 14 people dead.

Comey and other federal officials have long warned that powerful encryption poses a challenge for law enforcement and national security professionals.

Technology experts and privacy advocates counter that so-called "back door" access provided to authorities would expose data to malicious actors and undermine the overall security of the Internet.
Proud Supporter of Tunnel to Towers
Support the USO
Democrat Party...the Party of Infanticide

“Therefore do not worry about tomorrow, for tomorrow will worry about itself. Each day has enough trouble of its own.”
-Matthew 6:34

Online 240B

  • Lord of all things Orange!
  • TBR Advisory Committee
  • ***
  • Posts: 26,740
    • I try my best ...
I do not believe this is true. I think the powers that be, can break the code.

I believe that there are greater forces at work which do not want the phone code broken.

The last thing Obama wants is to expose a massive underground network of ISIS terrorists in America. It would blow his obsessive compulsive reaction to any act of terror, as not being done by Muslims. 'These are not Muslims committing these horrible acts. These are Christians disguised as Muslims!'

Islam is a 'religion of Peace', when they are not cutting people's heads off, or blowing themselves up, or massacring a Christmas party, according to Hussein.
You cannot "COEXIST" with people who want to kill you.
If they kill their own with no conscience, there is nothing to stop them from killing you.
Rational fear and anger at vicious murderous Islamic terrorists is the same as irrational antisemitism, according to the Leftists.

Wingnut

  • Guest
That is an interesting theory 240B.  I believe it is as simple as the feds wanting to erode our 4th Amendment rights. The Terrorist angle will help them sell the idea of backdoor access law to make us feel safer.   Because encryption "poses a challenge for law enforcement and national security professionals" is not germane to the discussion.

Also I believe they have cracked the encryption on that phone for the simple fact that they said they can't crack it.

Online 240B

  • Lord of all things Orange!
  • TBR Advisory Committee
  • ***
  • Posts: 26,740
    • I try my best ...
That is an interesting theory 240B.  I believe it is as simple as the feds wanting to erode our 4th Amendment rights. The Terrorist angle will help them sell the idea of backdoor access law to make us feel safer.   Because encryption "poses a challenge for law enforcement and national security professionals" is not germane to the discussion.

Also I believe they have cracked the encryption on that phone for the simple fact that they said they can't crack it.

You are correct and enlightened in your response. By saying that they cannot 'crack the code', they are waving a green flag for everyone to use the uncrackable code to do whatever they may want to do.
You cannot "COEXIST" with people who want to kill you.
If they kill their own with no conscience, there is nothing to stop them from killing you.
Rational fear and anger at vicious murderous Islamic terrorists is the same as irrational antisemitism, according to the Leftists.

Offline 17 Oaks

  • Hero Member
  • *****
  • Posts: 341
  • Gender: Male
  • The Ranch in S Texas
25 years in the IT business, I am a software, hardware and network engineer, I started out in R&D US Army and spent over half my career there.  There is no such thing as 'can't be hacked'.  Yea, some of the stuff is not easy and at the highest levels its near impossible, but typical low level encryption can be hacked, just get it in the right hands and they can do it.


Like you guys I don't buy it all and the fact they have said it cannot be, yea, tells me it has and yea, Obama does not want the TRUTH out.  Its my guess if you follow the money and links far enough it will come back to Obama.  He is a radical black Muslim.


SIDEBAR:  Lots of back and forth on NSA access to ALL or only some fone records etc.  Allow me to put this in perspective:  You go to the grocery store.  You are there to find Greek Olives, stuffed with Texas grown Jalapeños in organic French Vinegar made from California Napa Valley Grapes, aged in Kentucky Makers Mark Whiskey Oaks Barrels and aged 13 years 7 mo, 21 days.  You look around the store and do not see a sign for it.  So you go to the check out stand and tell them you want to buy 1 each of every product the store carries....


Stupid?  you bet and so is wanting access to every single fone call, e mail etc from every person in the US.


Besides, ALL the Olives are in aisle 7.


Everything that moves and is made from electrons has a data set attached to it.  This tells where it came from and where its going and all the stops it makes along the way, be it mail or fone.  In this world of almost 100% cell tower, especially in late to the party countries like the ME, China etc that have very little hard wired fone, no telephone poles either its all cell towers.  We can follow a fone across the world, no need to want to collect every fone call in the world.  Tell the govt NO!  Like the Olives are in aisle 7, every ISIS terrorist is a Muzzie...DUH!
« Last Edit: February 10, 2016, 03:59:30 pm by 17 Oaks »
Don:  Got here thru God, Guns and Guts, I speak John Wayne, Johnny Cash and John Deere; this make ME: Christian, Conservative, Capitalist, Constitutionalist...

Online Bigun

  • Hero Member
  • *****
  • Posts: 52,412
  • Gender: Male
  • Resistance to Tyrants is Obedience to God
    • The FairTax Plan
25 years in the IT business, I am a software, hardware and network engineer, I started out in R&D US Army and spent over half my career there.  There is no such thing as 'can't be hacked'.  Yea, some of the stuff is not easy and at the highest levels its near impossible, but typical low level encryption can be hacked, just get it in the right hands and they can do it.


Like you guys I don't buy it all and the fact they have said it cannot be, yea, tells me it has and yea, Obama does not want the TRUTH out.  Its my guess if you follow the money and links far enough it will come back to Obama.  He is a radical black Muslim.


SIDEBAR:  Lots of back and forth on NSA access to ALL or only some fone records etc.  Allow me to put this in perspective:  You go to the grocery store.  You are there to find Greek Olives, stuffed with Texas grown Jalapeños in organic French Vinegar made from California Napa Valley Grapes, aged in Kentucky Makers Mark Whiskey Oaks Barrels and aged 13 years 7 mo, 21 days.  You look around the store and do not see a sign for it.  So you go to the check out stand and tell them you want to buy 1 each of every product the store carries....


Stupid?  you bet and so is wanting access to every single fone call, e mail etc from every person in the US.


Besides, ALL the Olives are in aisle 7.


Everything that moves and is made from electrons has a data set attached to it.  This tells where it came from and where its going and all the stops it makes along the way, be it mail or fone.  In this world of almost 100% cell tower, especially in late to the party countries like the ME, China etc that have very little hard wired fone, no telephone poles either its all cell towers.  We can follow a fone across the world, no need to want to collect every fone call in the world.  Tell the govt NO!  Like the Olives are in aisle 7, every ISIS terrorist is a Muzzie...DUH!

You make WAY to much sense!  Sounds like I was in country before you but not sure I left Nov. 67.
"I wish it need not have happened in my time," said Frodo.

"So do I," said Gandalf, "and so do all who live to see such times. But that is not for them to decide. All we have to decide is what to do with the time that is given us."
- J. R. R. Tolkien

Offline 17 Oaks

  • Hero Member
  • *****
  • Posts: 341
  • Gender: Male
  • The Ranch in S Texas
I got there Aug of 67, came home Oct 68, I Corp, 1st Cav...just a Pfc back in those days.
Don:  Got here thru God, Guns and Guts, I speak John Wayne, Johnny Cash and John Deere; this make ME: Christian, Conservative, Capitalist, Constitutionalist...

Online Bigun

  • Hero Member
  • *****
  • Posts: 52,412
  • Gender: Male
  • Resistance to Tyrants is Obedience to God
    • The FairTax Plan
I got there Aug of 67, came home Oct 68, I Corp, 1st Cav...just a Pfc back in those days.

We may have crossed paths although I doubt it. I was STRATCOM assigned to 5th SFG which, at the time, was running lots of ops with the SVN Spec ops people. I maintained the CRYPTO gear.
"I wish it need not have happened in my time," said Frodo.

"So do I," said Gandalf, "and so do all who live to see such times. But that is not for them to decide. All we have to decide is what to do with the time that is given us."
- J. R. R. Tolkien

Offline ABX

  • Hero Member
  • *****
  • Posts: 900
  • Words full of sound and fury, signifying nothing.
Give it to a 13 year old boy and tell him there is porn on it. It will be unlocked in five minutes.

Online 240B

  • Lord of all things Orange!
  • TBR Advisory Committee
  • ***
  • Posts: 26,740
    • I try my best ...
Give it to a 13 year old boy and tell him there is porn on it. It will be unlocked in five minutes.

It doesn't take a 13 year old.
43 will do just fine.
You cannot "COEXIST" with people who want to kill you.
If they kill their own with no conscience, there is nothing to stop them from killing you.
Rational fear and anger at vicious murderous Islamic terrorists is the same as irrational antisemitism, according to the Leftists.

Online mountaineer

  • Hero Member
  • *****
  • Posts: 79,945
Quote
Also I believe they have cracked the encryption on that phone for the simple fact that they said they can't crack it.
Agreed. Why else would they be telling us this?
Support Israel's emergency medical service. afmda.org

Offline flowers

  • Hero Member
  • *****
  • Posts: 18,798
Agreed. Why else would they be telling us this?
exactly....why tell us?  they got the info......teamobama doesn't want it out.


Offline Fishrrman

  • Hero Member
  • *****
  • Posts: 35,941
  • Gender: Male
  • Dumbest member of the forum
240b wrote above:
"I do not believe this is true. I think the powers that be, can break the code.
I believe that there are greater forces at work which do not want the phone code broken."


I very, very seldom disagree with what you post, 240b, but on this one I will.

I'm going to -guess- that the killer owned a recent-issue iPhone.

On the most recent iPhones (and iOS controlling software), Apple has implemented an encryption scheme in which even Apple itself is unable to crack.

Even Apple - which created the phone and the software - doesn't have "a way in" once the user sets up encryption, security codes, etc.

Of course, the feds are quite unhappy about this, and are leaning on Apple to modify the phones so that there's a "backdoor" -- but Apple [so far] has refused, citing user privacy.

If it's an iPhone, I'm sure the feds have already taken it to Apple, and have been told that there's no way into it.

I'm not sure if -other- phone makers (such as Samsung) have this level of user-encryption, but it -is- standard now on iPhones ...

Addendum:
An article of interest:
http://www.gizmodo.com.au/2012/08/not-even-the-nsa-can-hack-apples-ios-encryption/
« Last Edit: February 10, 2016, 11:47:19 pm by Fishrrman »

Offline 17 Oaks

  • Hero Member
  • *****
  • Posts: 341
  • Gender: Male
  • The Ranch in S Texas
Fish,
What you say about the "encryption", AES/256 is true.  BUT as a general rule there is a 'gate' and this gate requires a pass code and or (in the case of newer iphones) a fingerprint.  But you can bypass the fingerprint by doing a hard reboot or pulling the battery, then it defaults to the pass code.

In the case of iphone AES is turned on and off at the iphone level, not by the user direct.  In other words I don't toggle a AES button.

Now the finger print is disabled and that opens up the pass code.  Here is what Apple says:

"By setting up a device passcode, the user automatically enables Data Protection."
 
"iOS supports six-digit, four-digit, and arbitrary-length alphanumeric passcodes. In addition to unlocking the device, a passcode provides entropy for certain encryption keys. This means an attacker in possession of a device can’t get access to data in specific protection classes without the passcode."

Yes its near impossible to break the 256 code level using "brute force":

AES-256 is the standardized encryption specification. It's used worldwide by everyone from corporations to the US government. It's largest key size is 256 bits. This means that the, the thing that turns encrypted data into unencrypted data, is string of 256 1s or 0s.  With each character having two possibilities (1 or 0), there are 2 possible combinations."

To break that and I will skip all the math and just say with a room full of super computers it would take almost 10 years to crack the encryption using "brute force".  But we don't have to, all we have to do is crack the pass code to get thru the gate and at that time the AES 256 is turn off by the that action, not the user.  Everything on the iphone is now accessible to the user or the hacker.Hacking pass words (gate codes) is generally easy. 

At one time when I was the CTO I have 452 users that my help desk supported.  NOT everyone who left the company left happy, as a result they would lock their computer with a passcode.  If the help desk could not get access it got elvated and generally the boss (me) got the call to get access usually because there were files on the computer that needed to be accessed.First thing I did was move the computer off the desk.  Then I turned EVERYTHING on the desk, the desk, the drawers all upside down.  More often than not the passcode was found at that stage.

IF not, I gather everyone that worked in the vicinity of the desk.  Then I asked who was his friends, what kind of car did he drive, what was his fav sport, what team, where where he from etc etc.

I have hacked:

'bluetoyota'

'NYGIANTS'

'SPECIALIZED' (the make of the bicycle he rode)

'65MUSTANG'

Just to name a few, I have NEVER been denied!

So FISH, you are right, breaking AES 256 ain't happen on anyones watch, but hacking a passcode which open the gate WIDE OPEN is not hard.My guess is they got in the phone, if they didn't, they do not know what they are doing.

If anyone wants the down and dirty on the iphone, here it is:
 
iOS Security

iOS 9.0 or later
September 2015

https://www.apple.com/business/docs/iOS_Security_Guide.pdf
« Last Edit: February 11, 2016, 03:52:31 am by 17 Oaks »
Don:  Got here thru God, Guns and Guts, I speak John Wayne, Johnny Cash and John Deere; this make ME: Christian, Conservative, Capitalist, Constitutionalist...

Offline sneakypete

  • Hero Member
  • *****
  • Posts: 52,963
  • Twitter is for Twits
http://www.newsmax.com/PrintTemplate.aspx/?nodeid=713480


Newsmax
FBI Director Says Investigators Unable to Unlock San Bernardino Killer's Phone Content
Tuesday, February 9, 2016 03:45 PM

By: REUTERS

FBI Director James Comey said on Tuesday that federal investigators have still been unable to access the phone contents belonging to one of the San Bernardino killers due to encrypted technology.

...

Ok,so does anyone believe this?
Anyone who isn't paranoid in 2021 just isn't thinking clearly!

Offline sneakypete

  • Hero Member
  • *****
  • Posts: 52,963
  • Twitter is for Twits
240b wrote above:
"I do not believe this is true. I think the powers that be, can break the code.
I believe that there are greater forces at work which do not want the phone code broken."


I very, very seldom disagree with what you post, 240b, but on this one I will.

I'm going to -guess- that the killer owned a recent-issue iPhone.

On the most recent iPhones (and iOS controlling software), Apple has implemented an encryption scheme in which even Apple itself is unable to crack.

If the NSA wants to crack it,they will crack it.

Anyone who isn't paranoid in 2021 just isn't thinking clearly!

Offline 17 Oaks

  • Hero Member
  • *****
  • Posts: 341
  • Gender: Male
  • The Ranch in S Texas

BREAKING NEWS:


From FOX 2:45 pm 12 feb

Well, the CIA. FBI and DHS director just got hacked by a 16 yr old kid who ALSO rewrote the encryption code.


YEP, pass codes are easy to break, encryption, not so much....
Don:  Got here thru God, Guns and Guts, I speak John Wayne, Johnny Cash and John Deere; this make ME: Christian, Conservative, Capitalist, Constitutionalist...

Offline sneakypete

  • Hero Member
  • *****
  • Posts: 52,963
  • Twitter is for Twits
BREAKING NEWS:


From FOX 2:45 pm 12 feb

Well, the CIA. FBI and DHS director just got hacked by a 16 yr old kid who ALSO rewrote the encryption code.


YEP, pass codes are easy to break, encryption, not so much....

Yes,but the NSA has access to more brainpower as well as restricted and even classified equipment than the average hacker.
Anyone who isn't paranoid in 2021 just isn't thinking clearly!

Offline 17 Oaks

  • Hero Member
  • *****
  • Posts: 341
  • Gender: Male
  • The Ranch in S Texas
Yes,but the NSA has access to more brainpower as well as restricted and even classified equipment than the average hacker.
I would like to believe that but in fact I don't.  3 of the TOP folks in the US dealing with ultra classifed just got hacked by a 16 year old KID.  This is the norm for our govt....
Don:  Got here thru God, Guns and Guts, I speak John Wayne, Johnny Cash and John Deere; this make ME: Christian, Conservative, Capitalist, Constitutionalist...

Online DCPatriot

  • Hero Member
  • *****
  • Posts: 46,470
  • Gender: Male
  • "...and the winning number is...not yours!



I'll betcha that Felicity Smoak could crack it.    :whistle:

"It aint what you don't know that kills you.  It's what you know that aint so!" ...Theodore Sturgeon

"Journalism is about covering the news.  With a pillow.  Until it stops moving."    - David Burge (Iowahawk)

"It was only a sunny smile, and little it cost in the giving, but like morning light it scattered the night and made the day worth living" F. Scott Fitzgerald

Offline sneakypete

  • Hero Member
  • *****
  • Posts: 52,963
  • Twitter is for Twits
I would like to believe that but in fact I don't.  3 of the TOP folks in the US dealing with ultra classifed just got hacked by a 16 year old KID.  This is the norm for our govt....

Yeah,but we both know the top people at the NSA are like the top people at all the other gubbermint agencies,political appointees that don't know squat about signal security and have no interest in learning.

I'll put the geeks that build the machines and write the software at the NSA up against anybody in the world when it comes to knowing what they are doing. Those people ain't letting no horses out of no barns. Political appointees are an entirely different critter,though. Just look at Bubbette! Clinton and John Wayne Kerry for proof of this.
Anyone who isn't paranoid in 2021 just isn't thinking clearly!

Offline sneakypete

  • Hero Member
  • *****
  • Posts: 52,963
  • Twitter is for Twits



I'll betcha that Felicity Smoak could crack it.    :whistle:

Or at least charm the pants off of him.
Anyone who isn't paranoid in 2021 just isn't thinking clearly!

HonestJohn

  • Guest
25 years in the IT business, I am a software, hardware and network engineer, I started out in R&D US Army and spent over half my career there.  There is no such thing as 'can't be hacked'.  Yea, some of the stuff is not easy and at the highest levels its near impossible, but typical low level encryption can be hacked, just get it in the right hands and they can do it.


Like you guys I don't buy it all and the fact they have said it cannot be, yea, tells me it has and yea, Obama does not want the TRUTH out.  Its my guess if you follow the money and links far enough it will come back to Obama.  He is a radical black Muslim.


SIDEBAR:  Lots of back and forth on NSA access to ALL or only some fone records etc.  Allow me to put this in perspective:  You go to the grocery store.  You are there to find Greek Olives, stuffed with Texas grown Jalapeños in organic French Vinegar made from California Napa Valley Grapes, aged in Kentucky Makers Mark Whiskey Oaks Barrels and aged 13 years 7 mo, 21 days.  You look around the store and do not see a sign for it.  So you go to the check out stand and tell them you want to buy 1 each of every product the store carries....


Stupid?  you bet and so is wanting access to every single fone call, e mail etc from every person in the US.


Besides, ALL the Olives are in aisle 7.


Everything that moves and is made from electrons has a data set attached to it.  This tells where it came from and where its going and all the stops it makes along the way, be it mail or fone.  In this world of almost 100% cell tower, especially in late to the party countries like the ME, China etc that have very little hard wired fone, no telephone poles either its all cell towers.  We can follow a fone across the world, no need to want to collect every fone call in the world.  Tell the govt NO!  Like the Olives are in aisle 7, every ISIS terrorist is a Muzzie...DUH!

About PGP encryption and Tor, what are your thoughts on them?

Online mystery-ak

  • Owner
  • Administrator
  • ******
  • Posts: 386,157
  • Let's Go Brandon!
http://www.newsmax.com/PrintTemplate.aspx/?nodeid=714703


Newsmax
Apple Resists Helping FBI Crack San Bernardino Terrorist iPhone
Wednesday, February 17, 2016 07:00 AM

By: Nick Sanchez

Apple has resisted helping the FBI crack the iPhone passcode of the San Bernardino terrorists voluntarily, and is now opposing a court ruling in the agency's favor.

On Tuesday, U.S. Magistrate Sheri Pym ordered Apple to provide "reasonable technical assistance" to the FBI, prompting CEO Tim Cook to issue an opposing statement.

"We can find no precedent for an American company being forced to expose its customers to a greater risk of attack," said Cook, USA Today reported.

"For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data."

After Tashfeen Malik and her husband, Syed Rizwan Farook, shot and killed 14 people at a San Bernardino holiday party in December, the FBI recovered an iPhone from their vehicle.

The iPhone has a security feature that will erase all of the data from the device if 10 unsuccessful passcode attempts are made.

The FBI has requested that Apple deploy software to disable the feature, and allow the bureau to use "brute force" software that will guess at the passcode using potentially millions of combinations until it unlocks the device.

According to technology website Wired, Apple previously maintained a kind of master key that could unlock its devices.

"But in iOS 8, Apple has essentially thrown away the key so it can’t access the data anymore. Hackers, cyber criminals, and thieves can’t access it. And governments, foreign and domestic, can’t access it either," the site explained.
Proud Supporter of Tunnel to Towers
Support the USO
Democrat Party...the Party of Infanticide

“Therefore do not worry about tomorrow, for tomorrow will worry about itself. Each day has enough trouble of its own.”
-Matthew 6:34

Offline Fishrrman

  • Hero Member
  • *****
  • Posts: 35,941
  • Gender: Male
  • Dumbest member of the forum
http://www.usatoday.com/story/tech/news/2016/02/16/apple-san-bernardino-iphone-magistrate-order/80478844/

Apple ordered to break into San Bernardino shooter's iPhone

Kevin Johnson and Jessica Guynn
USA TODAY
February 17, 2016

WASHINGTON — Apple must help the FBI break into an iPhone belonging to one of the killers in the San Bernardino, Calif., shootings, a federal judge ordered Tuesday.

Tashfeen Malik and her husband, Syed Rizwan Farook, shot and killed 14 people in December. The couple later died in a gun battle with police. The iPhone was recovered from their vehicle in the aftermath of the attack.

The ruling from U.S. Magistrate Sheri Pym requires Apple to provide "reasonable technical assistance" to the FBI, namely, software that can disable the security feature that erases data from the iPhone after too many unsuccessful attempts to unlock it.

Federal prosecutors told the court they could not access the phone used by Farook because they don’t know his passcode. With the security feature disabled, they can attempt as many combinations necessary to unlock the iPhone.

The iPhone in this case was not the property of Farook, but of his employer, San Bernardino County, which consented to the search.

Apple CEO Tim Cook said late Tuesday that the company would oppose the ruling.

In a message to customers published on Apple's website, he said: "We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data."

FBI director James Comey could not be immediately reached for comment.

Last week, Comey told a Senate panel that investigators still have not been able to unlock the encrypted cellphone of one of the terrorists who carried out the attack, which also left 20 others wounded.

"We still have one of those killer's phones that we haven't been able to open," Comey told members of the Senate Intelligence Committee during a hearing on threats to the homeland. "It's been over two months now. We are still working on it."

A source said on Tuesday that Syed Rizwan Farook had recently taken out a $28,500 loan. This loan came from an online lender and he received the money shortly before he and his wife killed 14 of his co-workers at a holiday party in San Bernardino.

Comey made the comments in response to questions from senators about how encrypted cellphones and other electronic devices can hinder investigations because they cannot be unlocked, even by the companies that made them.

Comey could not be immediately reached for comment.

The encryption debate, which often pits security hawks against privacy advocates, has intensified in the wake of the terrorist attacks in San Bernardino and Paris.

Intelligence Committee Chairman Richard Burr, R-N.C., is working with Vice Chairman Dianne Feinstein, D-Calif., on legislation that would compel tech companies to provide encrypted data to law enforcement agencies.

Following Tuesday’s ruling, Los Angeles U.S. Attorney Eileen Decker said the move to unlock the phone represented an attempt to “exhaust every investigative lead in the case.’’

"We have made a solemn commitment to the victims and their families that we will leave no stone unturned as we gather as much information and evidence as possible,’’ Decker said. "These victims and families deserve nothing less. The application filed today in federal court is another step — a potentially important step — in the process of learning everything we possibly can about the attack in San Bernardino.”

The Obama administration has held high-level discussions with Silicon Valley companies to press Apple, Facebook and others to do more to prevent terrorists from using the Internet to spread propaganda, incite violence and attract new recruits. Companies, sensitive to the fallout from government spying revelations by former National Security Agency contractor Edward Snowden, have been wary of being seen as aiding the government to spy on users.

A major point of contention: law enforcement's concerns that tech companies provide encrypted communications that terrorists can use to hide their activities.

Apple has five business days to respond to the order.

The Electronic Frontier Foundation is considering filing an amicus brief in support of Apple and expects other digital rights groups to do the same, said Kurt Opsahl, general counsel for the Electronic Frontier Foundation.

"If the U.S. government can force Apple to do this, why can¹t the Chinese or Russian governments? Other countries will ask for this same power. Do we want to have this be universal?" Opsahl said.

The risk? If Apple creates a program to break into this iPhone, it will essentially be a "master key" for other iPhones, he warned.

"It would be possible for the government to take this key, modify it and use it on other phones," Opsahl said. "That risks a lot, that the government
will have this power and it will not be misused."