From Ars Techinica
The phone … may have been the trigger to unleash a "cyber pathogen," county prosecutors said in a brief court filing.
"The iPhone is a county owned telephone that may have connected to the San Bernardino County computer network. The seized iPhone may contain evidence that can only be found on the seized phone that it was used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino's infrastructure," according to a court filing (PDF) by Michael Ramos, the San Bernardino County District Attorney.
[Incidentally, as I point out with some regularity on another forum, "may" exactly equals "may not".]
The county declined to directly comment. A spokesman, David Wert, told Ars in an e-mail that "The county didn't have anything to do with this brief. It was filed by the district attorney." The DA's office did not immediately respond for comment.
Jonathan Zdziarski, a prominent iPhone forensics expert, commented in a telephone interview:
"The world has never seen what he is describing coming from an iPhone," Zdziarski said. "I would expect, I would demand, in order to make that statement at all, he should make some kind of proof."
It sounds like he's making up these terms as he goes. We've never used these terms in computer science. I think what he's trying to suggest is that Farook was somehow working with someone to install a program on the iPhone that would infect the local network with some kind of virus or worm or something along those lines. Anything is possible, right? Do they have any evidence whatseover to show there is any kind of fiber pathogen on the network or any logs or network captures to show that Farook's phone tried to inroduce some unauthorized code into the system?
In a follow-up e-mail, Zdziarski added: "This reads as an amicus designed to mislead the courts into acting irrationally in an attempt to manipulate a decision in the FB'Is favor. It offers no evidence whatsoever that the device has, or even might have, malware on it. It offers no evidence that their network was ever compromised. They are essentially saying that a magical unicorn might exist on this phone."
__._,_.___
Posted by: Jim Saklad <jimdoc@icloud.com>
Reply via web post | • | Reply to sender | • | Reply to group | • | Start a New Topic | • | Messages in this topic (1) |
.
__,_._,___