What the FBI’s Fight With Apple Means for Data Recovery
Apple devices may not be the best choice when you anticipate having to employ data recovery services. Apple publicly denied the FBI’s request.
In the wake of mass shootings in San Bernardino, much news was made of the fact that the FBI couldn’t access the data contained in one of the shooters’ iPhones. Even more of a commotion arose after the intelligence agency asked Apple to unlock the device and potentially millions of others by creating new tools that would disable built-in security features.
The Root of the Issue: FBI & Apple Company Feud Over Data Recovery

-
The FBI isn’t just demanding that Apple unlock the lone device
Belonging to the deceased individual who undoubtedly committed this heinous crime. Its court order requested software tools that could bypass the phone’s encryption, which irretrievably erases a phone’s data following ten incorrect password entry attempts. -
That the FBI seeks to override this technology
And potentially overcome the waiting periods between allowed password entry attempts implies that it wants to brute force the password. Obviously, this could enable it or anyone else who gets their hands on the tool to guess passwords on all iOS devices. What This Means for Data Security -
Apple publicly denied the FBI’s request
In the process, the tech giant kicked off a highly-politicized debate about whether a single investigation was worth the privacy of millions of users. What many media outlets overlooked, however, was the fact that any outcome of this situation could have huge implications for the data recovery industry. -
Would valid data recovery attempts be better served by an iOS version that didn’t lock people out so securely?
While it’s easy to assume that such software could help companies retrieve their data after losing device passwords, it would probably also facilitate corporate espionage. A bad actor who steals corporate hardware and the appropriate credentials could conceivably send the device in question to a recovery service and access data they shouldn’t possess. This possibility also raises a whole host of liability and consumer privacy concerns. -
FBI can’t breach a locked Apple device should serve as a clear warning to users
You only have so many tries to get into your phone, and you may be blocked out for up to an hour between attempts. In short, guessing your passwords could constitute an unacceptable risk, especially when essential professional data is at stake. On the other hand, it also means that base Apple devices may not be the best choice when you anticipate having to employ.

About the AuthorTommy Khamoushi, Data Recovery Expert
Tommy Khamoushi is an IACRB-certified Data Recovery Engineer and a Certified Forensic Computer Investigator. He has more than 20 years of experience in data recovery including providing technical support for the House of Representatives.
Tommy leads a team of data recovery engineers and experts at TTR Data Recovery to recover highly sensitive data for government agencies like the National Aeronautics and Space Administration (NASA) and enterprise businesses using advanced and proprietary techniques and processes.
Connect with Tommy on LinkedIn.