Refuses to tell news organizations who made the hacking tool or the cost of breaking into San Bernardino shooter's iPhone 5C Credit: Thinkstock The U.S. Department of Justice yesterday argued that it should not have to reveal the maker of a tool used last year to crack an alleged terrorist’s iPhone or disclose how much it paid for the hacking job, court documents showed.That tool was used last year by the FBI to access a password-protected iPhone 5C previously owned by Syed Rizwan Farook, who along with his wife, Tafsheen Malik, killed 14 in San Bernardino, Calif., in December 2015. The two died in a shootout with police later that day. Authorities quickly labeled them terrorists.In March 2016, after weeks of wrangling with Apple, which balked at a court order compelling it to assist the FBI in unlocking the iPhone, the agency announced it had found a way to access the device without Apple’s help. Although the FBI acknowledged it had paid an outside group to crack the iPhone, it refused to identify the firm or how much it paid.Three news organizations — the Associated Press wire service, the USA Today newspaper, and Vice Media — later filed requests under the Freedom of Information Act (FOIA) for that information, and more. When the FBI redacted the tool’s maker and what the agency paid, the news trio objected. In Monday’s filing, government attorneys asked a federal judge to uphold the redactions. They contended that both the vendor’s identity and the price the FBI paid might be used by criminals or foreign intelligence services to help assemble a more complete picture of the tool’s efficacy and divine the government’s security priorities.Information, including the exact workings of the technique used to hack Farook’s iPhone, might be stolen if the hack’s maker was made public, the DOJ continued. “Revealing the vendor’s identity immediately exposes the vendor to attacks and infiltration by hostile entities willing to exploit the technology they provided to the FBI,” wrote David Hardy, a FBI section chief responsible for record dissemination, in a supporting declaration. “Since the same proprietary technology now owned by the FBI is also stored within the vendor’s facilities and computer systems, the security of this technology would only be as good as the vendor’s own security measures.”Last year, the FBI confirmed that it would not tell Apple how it had hacked the iPhone, saying at the time that while it had paid for the crack — and from the information in Hardy’s declaration, actually owns the technology and technique — it had not purchased “the rights to technical details about how the method functions” or the iOS 9 vulnerability it exploited, and so had nothing to tell the Cupertino, Calif. company. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe