“Apple receives so many police demands to decrypt seized iPhones that it has created a ‘waiting list’ to handle the deluge of requests,” Declan McCullagh reports for CNET.
“Court documents show that federal agents were so stymied by the encrypted iPhone 4S of a Kentucky man accused of distributing crack cocaine that they turned to Apple for decryption help last year,” McCullagh reports. “A search warrant affidavit prepared by ATF agent Rob Maynard says that, for nearly three months last summer, he “attempted to locate a local, state, or federal law enforcement agency with the forensic capabilities to unlock” an iPhone 4S. But after each police agency responded by saying they “did not have the forensic capability,” Maynard resorted to asking Cupertino.”
McCullagh reports, “Because the waiting list had grown so long, there would be at least a 7-week delay, Maynard says he was told by Joann Chang, a legal specialist in Apple’s litigation group. It’s unclear how long the process took, but it appears to have been at least four months. The documents shed new light on the increasingly popular law enforcement practice of performing a forensic analysis on encrypted mobile devices — a practice that can, when done without a warrant, raise Fourth Amendment concerns.”
Read more in the full article here.