Apple Encryption-Supporters Chime In

Narrative changing again.


Information contained in an encrypted iPhone could help finally answer whether there was a third assailant in the San Bernardino terror attack that killed 14 people, according to court papers filed by the county’s district attorney.

San Bernardino Police Chief Jarrod Burguan said Friday that the question of a third attacker has nagged investigators despite no supporting evidence.

“We’ve never been able to completely eliminate it,” he said. “We know we have some witnesses that said they thought they saw three … some saw two, some saw one. The majority said two, and the evidence we have up to this point only supports two.”

Still, he said investigators would like to definitively answer the question, and unlocking the phone could help do that.

Syed Rizwan Farook and his wife, Tashfeen Malik, opened fire Dec. 2 at an annual training of his San Bernardino County co-workers. They died hours later in a shootout with police. The 14 people killed marked the deadliest terror attack on U.S. soil since Sept. 11, 2001.

In a brief filed in federal court Thursday, San Bernardino County District Attorney Michael Ramos cited two 911 calls reporting three perpetrators during the attack.

“The information contained solely on the seized iPhone could provide evidence to identify as of yet unknown co-conspirators …” according to Ramos’ brief.

The brief also suggested that the county-owned iPhone used by Farook may have introduced a “lying-dormant cyber pathogen” endangering the county’s computer network.

Burguan said he’s never heard that theory and knew of no problems.

Such a breech is technically possible but unlikely, said David Meltzer, a computer security expert and chief research officer at TripWire, a commercial IT security firm.

If an employee wanted to introduce malicious software into the county’s network, Meltzer said they would be more likely to use a desktop or laptop PC because it’s easier to download and manipulate malicious code on a PC’s operating system.

Keep reading…