Skip to main content

Dell Vostro

See All Stories
Site default logo image

Apple says it didn’t give FBI UDIDs, soon replacing and banning the use of UDIDs

After a denial from the FBI, Apple finally confirmed in a statement to AllThingsD that it did not give any UDIDs to the FBI, nor did the FBI request the information from Apple. Apple spokesperson Natalie Kerris also confirmed iOS 6 would introduce a new set of APIs that both replace and ban UDIDs:

“The FBI has not requested this information from Apple, nor have we provided it to the FBI or any organization. Additionally, with iOS 6 we introduced a new set of APIs meant to replace the use of the UDID and will soon be banning the use of UDID,” said Apple spokesperson, Natalie Kerris.

Why is the FBI carrying around a file with 12M Apple user UDIDs? (and is yours one of them?)

Site default logo image

Update: The FBI has issued a denial

HackerNews linked last night to a Pastbin file, which is a long-rambling diatribe by hacker group AntiSec, that eventually said the group infiltrated an FBI laptop in March and was able to download files off  the machine. One of those files, NCFTA_iOS_devices_intel.csv, contained more than 1 million Apple UDIDs, but the group claimed to have over 12 million UDIDs and other personal information, which it apparently gathered after breaching the Dell Vostro of an FBI operative.

 During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of “NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc.

“NCFTA_iOS_devices_intel.csv” looks like it stands for the National Cyber-Forensics and Training Alliance, which “functions as a conduit between private industry and law enforcement.” (http://www.ncfta.net/)

Apple previously said it would limit developer access to UDIDs, but the Pastebin post asserted AntiSec published the identifiers, after first leaving out full names, cell numbers and addresses, to warn folks about the FBI tracking U.S. citizens with the mobile data.

Fun Fact: 166 devices in the data set  are named “Titanic” or “The Titanic” because of the “Titanic is syncing” joke.

Cydia creater Saurik took to Hacker News to note that it is unlikely that the source was from jailbreaking:

I run Cydia, and have determined only 16.7% of the UDIDs in that file are from jailbroken devices: I thereby do not believe that whatever managed to get this data is anywhere in our ecosystem.


Expand
Expanding
Close