If you’re worried about your iPhone’s security after the Justice Department announced it had broken into yet another terrorist’s cell phone, don’t panic. The FBI and its hacking prowess probably aren’t any concern of yours, as long as you’re not a terrorist.

The Justice Department announced on Monday that it had found a link between the terrorist group Al Qaeda and the man who killed three U.S. sailors in a terrorist attack at a military base in Pensacola, Florida, in December, CNN reported. The bigger deal was that the department was able to make this connection because it broke through the encryption on the shooter’s iPhone after a very public back-and-forth with Apple, wherein the company refused to decrypt the phone.

“To some degree, this is a ‘good’ outcome, with good in quotations marks,” said Hannah Quay-de la Vallee, Senior Technologist at the Center for Democracy and Technology, who told Digital Trends that it was definitely a success story for Apple. “It’s indicative of the fact that the FBI has to put a significant amount of resources into getting into these things. They had access to the phone physically and they had it for a while [before breaking in], so this is not something that will happen to Joe Blow who sent a concerning text message.”

This is the latest high-profile terrorism case wherein the FBI and Apple have been at odds; among the first was over the San Bernardino shooter’s iPhone, which the government cracked in 2016.

The move once again brings to the forefront the ongoing tug-of-war between the government — which has argued for that tech companies need to leave a so-called “encryption backdoor” or “golden key” for law enforcement to have access to people’s phones in criminal cases — and tech companies and privacy advocates, who insist such a loophole would make everyone’s phone less secure.

Cellebrite, the Israeli firm that is reportedly the favorite of the FBI when it comes to breaking into terrorists’ phones, declined a request for comment on whether it had been involved in this hack.

Ron Gula, a former National Security Agency white-hat hacker, pointed out to Digital Trends that it’s unclear how the FBI’s hack was performed; it may have been Cellebrite, but maybe it was a subpoena or some hack that works on older iPhone models. Either way, the average person “should be comfortable” with the level of protection that their phone comes with, he said.

Tom Chivers, Digital Privacy Advocate at the U.K.-based ProPrivacy, agreed. “The average person can rest easy about the thought of the FBI hacking into their phones to see what they’re up to,” wrote Chivers. “It has been a long and arduous process for the FBI and not one they’re likely to repeat in a hurry.”

Indeed, in December when testifying before a Senate committee on the question of phone encryption and public safety, New York County District Attorney Cyrus Vance bemoaned the monetary high cost that third-party workarounds like Cellebrite charge, meaning that, as Vance put it, “all but a handful of law enforcement agencies” can afford it.

But, Chivers continued, Apple will probably take a look at its security. “After all, as they said themselves in January any backdoor for the good guys can also be exploited by the bad guys, and now the FBI have found a way in, who else might try and follow in their footsteps?” Chivers wrote, referring to a statement that Apple made in response to a request from U.S. Attorney General William Barr for help decrypting the phone. Apple at the time said, “There is no such thing as a backdoor just for the good guys.”

Apple reiterated that sentiment in a statement to Bloomberg on Monday, saying that it had “responded to the FBI’s first requests for information just hours after the attack,” and that the creation of a backdoor “will make every device vulnerable to bad actors.”

Apple responds to FBI getting into Pensacola shooter’s iPhone and FBI chief saying, “We received effectively no help from Apple.” pic.twitter.com/KVhtjANsd1

— Mark Gurman (@markgurman) May 18, 2020

Apple also did not respond to Digital Trends’ request for comment as to whether this would force the company to rethink its encryption, or whether the average iPhone user should be concerned.

For some experts, this was more evidence that the government should not be handed any keys to anyone’s phone. “The government continues to ignore the consensus that mandated government access to encrypted devices and communications would compromise everyone’s security,” wrote the Electronic Frontier Foundation’s Senior Staff Attorney Andrew Crocker in an email to Digital Trends. “If these reports are accurate, it is further evidence that the FBI and DOJ demands for encryption backdoors are overblown.”

Related Posts

Google Photos introduces a fun new way to turn yourself into a meme

According to a recent post on Google's support forums, Me Meme is a generative AI feature that lets you star in trending memes using a template and a photo of yourself. It's rolling out in Google Photos for Android in the US, and you can try it out by tapping the "Create" button and selecting the new "Me meme" option.

Your iPhone 18 Pro could get a much smaller Dynamic Island

That’s a meaningful design shift because it’s one of the few pieces of front hardware you notice dozens of times a day. Another rumor comparison post in your screenshots points in the same direction and frames it as a fresh look versus the iPhone 17 Pro.

A phone with a pop-up robot camera is launching soon

That date comes from the company’s media invite, which places the announcement inside its "AI Device Ecosystem Era" showcase. Beyond the timing, Honor is keeping the rest locked down, including core specs, pricing, and which markets will get it first.