Russia’s Other War, Cyber

 

Finding weakness and exploiting it in the cyber realm is hidden warfare, few speak about. For the West, Russia tops the list. China, Iran and North Korea are also on the short list. For Russia’s other targets, the Baltic States are in the Russian target list.

CBS: The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said Thursday, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country.

“While I can’t go into detail here, the Russian cyber threat is more severe than we had previously assessed,” James Clapper, the director of national intelligence, told the Senate Armed Services Committee, as he presented the annual worldwide threats assessment.

As they have in recent years, U.S. intelligence agencies once again listed cyber attacks as the top danger to U.S. national security, ahead of terrorism. Saboteurs, spies and thieves are expanding their computer attacks against a vulnerable American internet infrastructure, chipping away at U.S. wealth and security over time, Clapper said.

Russia ‘was behind German parliament hack’

BBC: Germany’s domestic intelligence agency has accused Russia of being behind a series of cyber attacks on German state computer systems.

The BfV said a hacker group thought to work for the Russian state had attacked Germany’s parliament in 2015.

This week it emerged that hackers linked to the same group had also targeted the Christian Democratic Union party of Chancellor Angela Merkel.

Russia has yet to respond publicly to the accusations made by the BfV.

Sabotage threat

BfV head Hans-Georg Maassen said Germany was a perennial target of a hacker gang known as Sofacy/APT 28 that some other experts also believe has close links with the Russian state. This group is believed by security experts to be affiliated with the Pawn Storm group that has been accused of targeting the CDU party.

The Russian Cyber Threat: Views from Estonia

Tensions between Russia and its adversaries in the West are escalating. In recent years, Russia has undermined the security of its neighbors by violating their land borders, crossing into their airspace unannounced and harassing them above and below sea level. Less noticed or understood, however, are Moscow’s aggressive actions in cyberspace. The small Baltic country of Estonia—a global leader in digital affairs—is well-placed to shed light on the tactical and strategic aspects of Russia’s offensive computer network operations.

In fact, three civilian and intelligence agencies responsible for cyber security—the Estonian Information System Authority, Internal Security Service and Information Board—recently issued reports that help put together different pieces of the puzzle. The conclusion is that “in cyberspace, Russia is the source of the greatest threat to Estonia, the European Union and NATO.” Now policymakers on both sides of the Atlantic must decide what to do about it.

Russia has been developing and employing offensive cyber capabilities for years. Russian cyber threat groups consist of professional, highly skilled practitioners whose daily jobs are to prepare and carry out attacks. And they don’t go after low-hanging fruit; instead, they receive specific orders on which institutions to target and what kind of information is needed. Criminals, hacktivists, spies and others linked to Russian strategic interests are usually well-financed, persistent and technologically advanced. They have a wide range of tools and resources, including the ability to carry out denial-of-service attacks, develop sophisticated malware and exploit previously unknown software vulnerabilities. Russian threat actors cloak their identities by using remote servers and anonymizing services. They target everything from the mobile devices of individuals to the IT infrastructure of entire government agencies.

Often, Russian threat actors map target networks for vulnerabilities and conduct test attacks on those systems. After carrying out reconnaissance, they conduct denial-of-service attacks or try to gain user access. Common techniques include sending emails with malicious attachments, modifying websites to infect visitors with malware and spreading malware via removable media devices like USB drives. Once inside, they continue to remotely map networks, attempt to gain administrator-level access to the entire network and extract as much sensitive data as possible. Such access also lets them change or delete data if that’s what the mission requires. They’ll often go after the same targets for years to get what they need. They have the confidence that comes from perceived anonymity and impunity; if they make a mistake or fail, they’ll simply try again.

These tactical activities are carried out in pursuit of strategic objectives. In the long term, this includes undermining and, if possible, helping to dissolve the EU and NATO. Moscow also aims to foster politically divided, strategically vulnerable and economically weak societies on its periphery in order to boost its own ability to project power and influence on those countries’ decisions. Russian cyber threat actors help by stealing military, political or economic data that gives Russia advantages in what it sees as the zero-sum game of foreign relations. The exfiltrated data can be used to recruit intelligence agents or provide economic benefits to its companies. Cyber capabilities can also be used to carry out influence operations that undermine trust between the citizens and the state. Telling examples of that strategy include its multi-week distributed-denial-of-service (DDoS) attacks against Estonia in 2007, its coordinated attacks against Ukraine’s 2014 presidential elections and the false-flag operation against a French telecommunication provider in 2015.

Most worryingly, today’s intelligence operations can enable tomorrow’s military actions. Influence operations, including the use of propaganda and social media, can create confusion and dissatisfaction among the population. Denial-of-service attacks can inhibit domestic and international communication. Coordinated, plausibly deniable attacks on multiple critical national infrastructure sectors can disrupt the provision of vital services such as energy, water, or transportation. This can provide a context for the emergence of “little green men”. Malicious code can be weaponized to hinder military and law enforcement responses. Clearly, cyber capabilities have the potential to be a powerful new tool in the Kremlin’s not-so-new “hybrid warfare” toolbox. With enough resources and preparation, they can be used in attempts to cause physical destruction, loss of life and even to destabilize entire countries and alliances. Such operations could be but a decision or two away in terms of planning, and perhaps several months or years before implementation. What can be done about it?

Preventive and countermeasures exist at the personal, organizational, national and international levels. Individuals should take “cyber hygiene” seriously, since Russian threat actors target both personal and work devices. This includes employing basic security technologies, backing up data, not visiting dubious websites and not opening suspicious emails. Organizations that handle sensitive information should adopt stricter security policies, including for handling of work-related data on personal devices. Information systems managers must be especially vigilant since they are primary targets, and weak personal security on their part may compromise national security. For their part, governments must enact the basics: computer security laws, national cyber strategies, a police focus on cybercrime, national CERTs, public-private partnerships and capable intelligence agencies. They also need continuous training and exercises to keep relevant agencies prepared for their missions. Finally, global cooperation and expeditious exchange of information among cyber security firms, national computer security incident response teams (CSIRTs) and security services are key to identifying Russian attack campaigns and taking defensive countermeasures.

All such countermeasures comprise elements of a deterrence-by-denial strategy that aims to raise the cost of carrying out malicious operations. States have also undertaken diplomatic initiatives to manage the potential instability that could result from the use of weaponized code—namely confidence-building measures, norms of responsible state behavior and attempts to agree on international law. While laudable, none of these have curbed Russian cyber aggression in the short term. For example, Russia’s coordinated December 2015 attack on the Ukrainian electrical grid—highlighted in all three agencies’ reports—was clearly an attack on critical national infrastructure that violated tentative international norms signed by Russia, possibly even while the campaign was being prepared. Defensive and diplomatic countermeasures must be complemented by a cohesive strategy of deterrence-by-punishment by individual countries as well as like-minded allies.

Cyber threat actors with links to Russia (APT28/Sofacy/Pawn Storm, the Dukes/APT29, Red October/Cloud Atlas, Snake/Turla/Uroburos, Energetic Bear/DragonFly, Sandworm Team and others) target NATO members on a daily basis—mainly for espionage and influence operations. But a recent SCMagazineUK article claims that the FSB plans to spend up to $250 million per year on offensive cyber capabilities. “Particular attention is to be paid to the development and delivery of malicious programs which have the ability to destroy the command and control systems of enemy armed forces, as well as elements of critical infrastructure, including the banking system, power supply and airports of an opponent.” Clearly, we had better be prepared.

ODNI Clapper: We Can’t Leave Town

We can’t fix this. A couple of additional points to add:

  1. Iran was pretty much controlled until the Obama regime decided to formal a rogue country to be accepted around the globe and terminate sanctions giving Iran more money to behave with wild abandon. Now John Kerry is working personally to help the entire economy of Iran.
  2. We have arrived at a malfunction junction where the intersection between intelligence and politics crash and politics wins over the defeat of global jihad.

And then there is Russia.

‘The U.S. can’t fix it’: James Clapper on America’s role in the Middle East

WaPo: Early in his tenure as director of national intelligence, James Clapper could sometimes be heard complaining, “I’m too old for this [expletive]!” He has now served almost six years as America’s top intelligence official, and when I asked him this week how much longer he would be in harness, he consulted his calendar and answered with relief, “Two hundred sixty-five days!”

Clapper, 75, has worked in intelligence for 53 years, starting when he joined the Air Force in 1963. He’s a crusty, sometimes cranky veteran of the ingrown spy world, and he has a perspective that’s probably unmatched in Washington. He offered some surprisingly candid comments — starting with a frank endorsement of President Obama’s view that the United States can’t unilaterally fix the Middle East.

Given Clapper’s view that intelligence services must cooperate against terrorism, a small breakthrough seems to have taken place in mid-April when Clapper met with some European intelligence chiefs near Ramstein Air Base in Germany to discuss better sharing of intelligence. The meeting was requested by the White House, but it hasn’t been publicized.

“We are on the same page, and we should do everything we can to improve intelligence coordination and information sharing, within the limits of our legal framework,” said Peter Wittig, German ambassador to Washington, confirming the meeting.

The terrorist threat has shadowed Clapper’s tenure. He admitted in a September 2014 interview that the United States had “underestimated” the Islamic State. He isn’t making that mistake now. He says the United States is slowly “degrading” the extremists but probably won’t capture the Islamic State’s key Iraqi stronghold this year and faces a long-term struggle that will last “decades.”

“They’ve lost a lot of territory,” he told me Monday. “We’re killing a lot of their fighters. We will retake Mosul, but it will take a long time and be very messy. I don’t see that happening in this administration.”

Even after the extremists are defeated in Iraq and Syria, the problem will persist. “We’ll be in a perpetual state of suppression for a long time,” he warned.

“I don’t have an answer,” Clapper said frankly. “The U.S. can’t fix it. The fundamental issues they have — the large population bulge of disaffected young males, ungoverned spaces, economic challenges and the availability of weapons — won’t go away for a long time.” He said at another point: “Somehow the expectation is that we can find the silver needle, and we’ll create ‘the city on a hill.’” That’s not realistic, he cautioned, because the problem is so complex.

I asked Clapper whether he shared Obama’s view, as expressed in Jeffrey Goldberg’s article in the Atlantic, that America doesn’t need the Middle East economically as it once did, that it can’t solve the region’s problems and that, in trying, the United States would harm its interests elsewhere. “I’m there,” said Clapper, endorsing Obama’s basic pessimism. But he explained: “I don’t think the U.S. can just leave town. Things happen around the world when U.S. leadership is absent. We have to be present — to facilitate, broker and sometimes provide the force.”

Clapper said the United States still can’t be certain how much harm was done to intelligence collection by the revelations of disaffected National Security Agency contractor Edward Snowden. “We’ve been very conservative in the damage assessment. Overall, there’s a lot,” Clapper said, noting that the Snowden disclosures made terrorist groups “very security-conscious” and speeded the move to unbreakable encryption of data. And he said the Snowden revelations may not have ended: “The assumption is that there are a lot more documents out there in escrow [to be revealed] at a time of his choosing.”

Clapper had just returned from a trip to Asia, where he said he’s had “tense exchanges” with Chinese officials about their militarization of the South China Sea. He predicted that China would declare an “air defense identification zone” soon in that area, and said “they’re already moving in that direction.”

 

Asked what he had achieved in his nearly six years as director of national intelligence, Clapper cited his basic mission of coordinating the 17 agencies that work under him. “The reason this position was created was to provide integration in the intelligence community. We’re better than we were.”

After a career in the spy world, Clapper argues that intelligence issues are basically simple; it’s the politics surrounding them that are complicated. “I can’t wait to get back to simplicity,” he said, his eye on that calendar.

**** Sampling of how bad things are:

  1. Al Qaeda issued a call for Muslims to mobilize to fight in al Sham. Al Qaeda leader Ayman al Zawahiri urged Muslims to fight in Syria and for the factions in Syria to unify. Zawahiri described the Syrian uprising as the only one from the Arab Spring to have continued along the right path. He sought for Muslims to defend the gains made in Syria against other actors like Russia, Iran, and the West, and stated the objective of a governing entity establishing itself in the territory. Hamza bin Laden, Osama bin Laden’s son, echoed the call for mobilization. He also called on Muslims to unify in Iraq and Syria and for those who cannot travel to conduct lone-wolf attacks.
  2.  A pro-Islamic State of Iraq and al Sham (ISIS) cell attempted to weaponize anthrax and plan a mass-casualty attack similar to the 2013 Westgate Mall attack, according to Kenyan and Ugandan authorities. The cell’s ringleader may have communicated with ISIS militants in Libya and Syria, indicating an expansion of ISIS’s influence in East Africa.  Governments seeking counterterrorism funding may also exaggerate ISIS’s presence, however.
  3. ISIS resumed a territorial growth strategy in Libya after planned offensives on its stronghold in Sirte stalled. ISIS militants seized strategically located towns from Misratan militias to the west of Sirte as part of efforts to expand its contiguous zone of control in central Libya. ISIS is also bolstered by the support of tribal leaders and elders, representing factions of a large tribal federation that has suffered since the fall of Qaddafi. These tribal leaders are aligning with ISIS against opponents in both the Libyan National Army bloc in the east and the Misratan bloc in the west in order to protect their political and economic interests. [See CTP’s backgrounder on forces in Libya and a forecast of ISIS’s courses of actions in Libya.] (From: The American Enterprise Institute’s Critical Threats Project )  Add in Russia’s building war on NATO….

Justice Dept. $75K to Hillary Campaign

Ah…exactly how does conflict of interest not become part of this discussion? At this point, when evidence and testimony piles up against Hillary, which it has for years going back to Arkansas, she has built her own Teflon wall. It is becoming clear that Hillary has with great effort and favors made an end run around the FBI investigation. Your thoughts? You gotta begin to wonder how come Bernie is not using this ammo on her campaign.

Former Attorney General Eric Holder endorsed Hillary Clinton for the Democratic nomination on Wednesday, praising his former administration colleague’s plans to tackle a wide range of issues, from gun violence to college affordability.

“Our next president can’t shy away from building on the progress of President Obama, which is why Hillary Clinton is the candidate that we need in the White House,” Holder said, according to The Associated Press.More from Politico.

By the way, it has been suggested often that one of the San Antonion, Texas version of the Castro brothers could be on the short list for her VP….imagine if she chose Eric Holder, Tom Perez, Xavier Becerra, Deval Patrick, Corey Booker, Bill Richardson, Kamala Harris or Susan Rice?

Terrifying isn’t it?  Tim Kaine maybe?

 or John Podesta?  George Clooney?

Or maybe  Valerie Jarrett in exchange for Obama’s added protection for her Clinton Foundation and email-gate crimes.

Yikes…..

Hillary Rakes in Nearly $75,000 From Justice Department Employees

Calls continue for appointment of a special counsel

FreeBeacon: Hillary Clinton has received nearly $75,000 in political contributions from employees at the Department of Justice, the agency that would decide whether or not to act if the FBI recommended charges against Clinton or her aides following its investigation into her private email server.

Justice Department employees have given Clinton far more money than her rivals, Sen. Bernie Sanders (I., Vt.) and Donald Trump, according to a  review of federal campaign contributions for the 2016 presidential cycle.

Clinton collected $73,437 from individuals who listed the “Department of Justice” as their employer. Twelve of the 228 contributions were for $2,700, the maximum individual amount allowed by law.

The fundraising haul marks a dramatic increase over Clinton’s unsuccessful presidential run in 2008, when she took in 23 contributions totaling $15,930 from employees at the agency, according to data compiled by the Center for Responsive Politics.

Trump, by comparison, has received little help from Justice Department employees, recording just two contributions for a total of $381.

Sanders has taken 51 donations totaling $8,900 from Justice Department employees.

David Bossie, president of the watchdog group Citizens United, told the Washington Free Beacon he is not surprised by the donations, and renewed his call for Attorney General Loretta Lynch to appoint a special counsel to handle Clinton’s case.

“I’m not surprised in the least to see more evidence that shows the politicization of the Justice Department,” Bossie said in a statement to the Free Beacon. “How can Democrat political appointees fairly investigate someone who is about to become their nominee for president? That’s why last July I called on Attorney General Lynch to appoint an impartial special counsel to investigate the private Clinton email server.”

“Today, I renew my call that Attorney General Lynch must appoint a special counsel to determine if Hillary Clinton or her agents broke the law and compromised our national security,” he continued. “This investigation needs to be conducted free of political influence once and for all.”

Bossie has questioned whether Lynch could remain impartial due to her past political donations. Lynch gave $10,700 in contributions to Democratic candidates between 2004 and 2008.

Howard Krongard, who was inspector general for the State Department from 2005 to 2008, predicted earlier this year that even if the FBI referred Clinton’s case to the Justice Department for prosecution it would “never get to an indictment.”

Krongard said the case would have to go through “four loyal Democratic women,” including Lynch, top White House adviser Valerie Jarrett, Deputy Attorney General Sally Yates, and Assistant Attorney General Leslie Caldwell, who heads the department’s criminal division.

The FBI is expected to interview Clinton in the coming weeks about her email practices. Clinton maintains that she has not been contacted by the FBI about an interview. However, the FBI has interviewed Clinton’s aides, including top adviser Huma Abedin.

The Justice Department did not return a request for comment.

Update 05/10/16After publication, former U.S. Attorney Matthew Whitaker, who directs the watchdog group Foundation for Accountability and Civic Trust, called for a special counsel to investigate Hillary Clinton. 

“The report out today that Hillary Clinton received almost $75,000 in political contributions from Justice Department employees is yet another reason why the Justice Department cannot and should not decide whether to bring a case against Hillary Clinton for her reckless handling of classified information while Secretary of State,” Whitaker said in a statement. “The decision of whether or not to bring a case against Clinton will be a difficult one for Attorney General Loretta Lynch, as I don’t believe she has the fortitude to oppose President Obama, who has publicly said Clinton’s behavior didn’t put our national security at risk.  Since this Administration has shown no ability to be impartial, looking the other way at every turn of this investigation, I’m renewing an urgent call for the appointment of a special counsel in this case.”

 

 

China, Unfettered Espionage Against U.S.

Did China Just Steal $360 Billion From America?

The principal group in question is believed to be the one codenamed APT6. The three letters stand for Advanced Persistent Threat, and this group appears to be among the first tagged as an “APT.”

Kurt Baumgartner of Russian firm Kaspersky Lab suggests APT6 is state-sponsored.That sounds correct because as Craig Williams WMB -4.47% at Talos, a part of Cisco, notes, it is “an advanced, well-funded actor.”

Baumgartner declined to identify APT6’s nationality, but others have. Vice Media’s Motherboard reports that experts think the group is Chinese. As the FireEye security firm notes, APT6 is “likely a nation-state sponsored group based in China.”

In any event, APT6 has caught the attention of the FBI. The group also appears to be the subject of the Bureau’s February 12 alert.

Related reading from the FBI

The February 12 alert says the group in question was attacking U.S. networks “since at least 2011,” but Baumgartner thinks it was active as early as 2008.

In September of last year during Xi Jinping’s state visit, President Obama said the U.S. and China had reached “a common understanding on the way forward” on cybertheft. Washington and Beijing, he said, had affirmed the principle that neither government would use cyber means for commercial purposes.

China indeed affirmed that principle, and the agreement was, as Adam Segal and Tang Lan write, “a significant symbolic step forward.” The pair correctly note that “trust will be built and sustained through implementation.”

As might be expected, there was little implementation on the Chinese side at first. CrowdStrike , the cyber security firm, for instance, in October reported no letup in China’s cyber intrusions into the networks of American corporates.

Related: Economic Terrorism

Beijing, according to the Financial Times, has since reduced its cyber spying against American companies. As Justin Harvey of Fidelis Cybersecurity told the paper, “What we are seeing can only be characterized as a material downtick in what can be considered cyber espionage.”

And FireEye noted that all 22 Chinese hacking units identified by the firm as attacking American networks discontinued operations.

Nonetheless, the Obama administration is not declaring victory quite yet, and for good reason. “The days of widespread Chinese smash-and-grab activity, get in, get out, don’t care if you’re caught, seem to be over,”says Rob Knake, who once directed cyber security policy at the National Security Council and is now at the Council on Foreign Relations. “There’s a consensus that activity is still ongoing, but narrower in scope and with better tradecraft.”

Whether espionage is overt or not, the damage to American business is still large. According to the May 2013 report of the Blair-Huntsman Commission on the Theft of American Intellectual Property, “The scale of international theft of American intellectual property is unprecedented—hundreds of billions of dollars per year, on the order of the size of U.S. exports to Asia.”

William Evanina, America’s chief counterintelligence official, told reporters in November that hacking espionage costs U.S. companies $400 billion each year and that China is responsible for about 90% of the attacks. Beijing’s haul, therefore, looks like something on the order of $360 billion.

And how do we know the Chinese are culprits? For one thing, bold Chinese cyber thieves like to show their victims the information they have stolen.

Moreover, the U.S. government has gotten better at attribution, going from being able to attribute one-third of the attacks to more than two-thirds. The improvement is largely due to the government’s partnership with the private sector. Microsoft, Google, and Twitter, for example, will share information if they detect attacks on their customers.

And their customers are still getting attacked. “We continue to see them engage in activity directed against U.S. companies,” said Admiral Mike Rogers, the head of U.S. Cyber Command, in early April in testimony before the Senate Armed Services Committee. “The questions I think that we still need to ask is, is that activity then, in turn, shared with the Chinese private industry?”

It’s right for Rogers to be cautious, but it would be strange for Chinese hackers not to share as they have done in the past. At the moment, there is little reason for Beijing to stop hacking, because Washington is not willing to impose costs on China for its “21st century burglary.”

There was the May 2014 indictment of five officers of the People’s Liberation Army for cyberattacking American businesses, like Alcoa and U.S. Steel, and the United Steelworkers union. That move, while welcome, was overdue and only symbolic. The Blair-Huntsman Commission suggested an across-the-board tariff on Chinese goods, but the imposition of a penalty of that sort is unlikely without a radical change of thinking in Washington.

Therefore, the FBI, even after all these years, is just playing catch up. The February alert is a tacit admission that the U.S. government is not in control of its own networks said Michael Adams, who served in U.S. Special Operations Command. “It’s just flabbergasting,” Adams told Motherboard. “How many times can this keep happening before we finally realize we’re screwed?”

The People’s Republic of China is still committing monumental thefts in large part because successive American governments cannot get beyond half-measures.

Beijing may be an intruder, but Washington somehow finds it unseemly to lock the door and punish the thief.

 

Twitter Cutting off Intel Agencies

Perhaps we must be reminded that Twitter is the platform of choice for Islamic State. Through Twitter, connections and conversation can be cultivated and used to glean activity, locations, photos, videos, names and organizations. Perhaps it would be important to remember that during the bin Ladin raid in Abbottabad, a local used Twitter to describe what was happening real time. Journalists in areas of hostilities also use Twitter to report live action and terror movement.

Twitter with this decision will also likely affect the work of the FBI when it comes to solving other worldwide criminal activity such as child-trafficking, slavery and exploitation. Shameful. There is a volunteer team that searches Twitter daily for terror accounts and removes them since Twitter refuses to cooperate. There are an estimated 40,000 ISIS Twitter accounts daily. What about hostages and beheadings like James Foley?

Knowing the importance and success of Islamic State on Twitter, the U.S. State Department even launched their own Twitter strategy, now this decision by Twitter is aiding the enemy.

Twitter cuts intel agencies off from analysis service: report

Washington (AFP) – Twitter has barred US intelligence agencies from accessing a service that sorts through posts on the social media platform in real time and has proved useful in the fight against terrorism, the Wall Street Journal reported.

The newspaper, in its report Sunday evening, cited a senior US intelligence official as saying that Twitter seemed worried about appearing too cozy with intelligence services.

Twitter owns about a five percent stake in Dataminr, which uses algorithms and location tools to reveal patterns among tweets. It is a powerful tool for gleaning useful information from the unending stream of chatter on Twitter.

Dataminr is the only company that Twitter authorizes to access its entire real-time stream of public tweets and sell it to clients, the Wall Street Journal said.

The move was not publicly announced and the newspaper cited the intelligence official and people familiar with the matter.

Dataminr executives recently told intelligence agencies that Twitter did not want the company to continue providing services to them, the report said.

Dataminr information alerted US authorities to the November attacks in Paris shortly after the assault began, the Wall Street Journal said.

It has also been useful for real-time information about Islamic State group attacks, Brazil’s political crisis and other fast-changing events.

Twitter told the newspaper in a statement that its “data is largely public and the US government may review public accounts on its own, like any user could.”

The development comes as high-profile tech companies in the US face off against the government on how information should be shared in the fight against terrorism.

Earlier this year, the FBI paid more than $1 million (880,000 euros) to a third party to break into an iPhone used by one of the shooters in a killing spree in San Bernardino, California, after Apple refused to help authorities crack the device.

The tech giant cited concerns over digital security and privacy.