我更备份,Police couldn't crack Toronto van attack driver's laptop, phone passwords despite eight months

zhangulei

干部。干是一种美德。
注册
2018-01-06
消息
6,866
荣誉分数
1,325
声望点数
223
Police couldn't crack Toronto van attack driver's laptop, phone passwords despite eight months of trying
Toronto police consulted with other agencies, including the RCMP, and private security firms. No one could help. Apple was 'unable or unwilling' to assist

Adrian Humphreys



September 27, 2019
12:01 AM EDT

Last Updated
September 27, 2019
12:01 AM EDT

Filed under
Comment
Facebook
Twitter
Reddit
Email
More
TORONTO — Toronto police spent more than eight months continually trying to guess the password to unlock the laptop of Alek Minassian, the admitted driver during the 2018 Toronto van attack that killed 10 people.

In the face of “almost infinite” combinations of letters, numbers and symbols, the automated process had not been successful, according to police documents dated this May.

Toronto police say investigators were unable to crack the password and encryption on both Minassian’s Apple MacBook Pro laptop and the Asus cellphone he carried when arrested at the scene of the carnage from the April 23, 2018, attack.

Toronto police seized the laptop from the home Minassian shared with his parents in Richmond Hill, Ont., according to a police affidavit, sworn on May 13, 2019, and filed in court.

The cellphone has an added layer of encryption that appears to have been built by Minassian, who was completing a software development degree program at the time of the attack.

Minassian bought the laptop six months before the attack.

With the court’s authorization to search it, police found the laptop was “file vault encrypted” and requires a password to unlock it, wrote Christopher Sloan, the detective in charge with the Toronto police Technical Crimes Unit.

Investigators consulted with other law enforcement agencies, including the RCMP and Ontario Provincial Police, as well as private security firms. No one could help, Sloan said.

Police also asked Apple Inc., the laptop’s manufacturer, for assistance.

“Apple has advised that it does not store device specific passwords related to their products,” Sloan said, “and is not aware of any other bypassing method. As such, Apple is either unable or unwilling to offer any assistance with unlocking this device.

“There does not appear to be a solution available.”

phones.png

Access to digital devices has become an increasingly difficult and important aspect of police investigations. Saeed Khan/AFP/Getty Images
Investigators have turned to a labourious, automated entry of characters in the hopes of stumbling upon the right combination of letters, numbers or symbols.

“This process has been taking place for over eight months,” Sloan wrote in May.

Without someone telling them the password, Sloan said, it is “virtually impossible to predict how long it will take to bypass the password.” It was “highly unlikely” police will be able to examine the contents of the laptop prior to Minassian’s trial for 10 counts of first-degree murder and 16 counts of attempted murder, scheduled to begin next February.

As a result, police declined to return the laptop to the Minassians.

Further the phone has “several layers of encryption,” Sloan said, including “an additional layer of encryption that appears to have been added to the original operating system.

“Minassian took active steps to alter the entire (operating) system and manipulate and increase the security settings,” Sloan said.

The phone was turned over to a private security firm to try to bypass its security.

“Their efforts are continuing to date, to no avail,” Sloan wrote.

Their efforts are continuing to date, to no avail




Access to digital devices has become an increasingly difficult and important aspect of investigations as the use of digital equipment climbs. Increasingly, that involves police turning to private companies to carry out their investigations.

After a 2015 killing spree in San Bernardino, Calif., the Federal Bureau of Investigation was unable to access the contents of the iPhone of one of the shooters, Syed Farook. Agents were thwarted by the phone’s encryption software, sparking a high-profile fight between the FBI and Apple, the phone’s manufacturer.

Apple refused the FBI’s requests and even rebuffed a court order to help agents crack open the phone by designing a way to defeat its own security. That legal faceoff ended — without legal resolution — when the FBI announced it had cracked the encryption by paying a third party for a solution.

U.S. law enforcement agencies made more than 130,000 requests for digital evidence in 2017 to six of the largest tech companies: Google, Facebook, Microsoft, Twitter, Oath (formerly Yahoo!), and Apple, according to a report by the Center for Strategic and International Studies released last year. When three large U.S. phone providers are included in the data — Verizon, AT&T and Comcast — the number of requests climbs to around 750,000.

The Toronto police affidavit about Minassian’s laptop and phone is included in pre-trial material filed in court. Postmedia, along with other news organizations won a court ruling allowing publication now, because Minassian’s case will be decided by a judge without a jury and because of the compelling public importance of the case.
 
:D 八个月,除了瞎白货,他们到底用了多少小时做尝试?
 
为什么不当场击毙?留下这么多麻烦!
 
看来设密码是个高技术活。:D
 
:D 八个月,除了瞎白货,他们到底用了多少小时做尝试?
花的钱还是要照8个月算的,别管干了多少事。
 
后退
顶部