Stoking the rumors was a new contract, posted in the government database on Wednesday but dated March 21 — the day when the FBI announced it may have found a new solution — for services from Cellebrite USA. Forensics experts quickly sought to dispel this particular contract's relevance, attributing it to software licensing renewal and pointing to the meager $15,278 price tag and given "principal place of performance" of Chicago, not San Bernardino.
At this time, no concrete evidence is pointing at Cellebrite. And we don't know for sure what method the FBI is testing either. Apple lawyers have indicated that they would like the government to disclose the method it would use to get inside Farook's iPhone. But it's also entirely possible the FBI will ask to keep both the vendor and the method classified.
What The Method Might Be
What we do know is that there have been several alternative ideas floating in the security community about how the FBI could overcome the iPhone security features preventing the agency from hooking the phone up to a computer and trying unlimited passcodes to find the right one without triggering a content wipeout.
In fact, FBI Director James Comey faced several questions about one technique in a congressional hearing. At the time, Comey testified that he was confident that government experts had considered all options before seeking a court order for Apple to write special software. Later, the FBI said the worldwide attention to the case had brought new alternatives to its attention, and one of them it decided to test.
Computer forensics researcher Jonathan Zdziarski argues that because the FBI has asked courts for only two weeks to test the viability of the new method, it's likely not highly experimental. It's also likely not something destructive, like the "decapping" method that relies on physically shaving off tiny layers of the microprocessor inside the phone to reveal a special code that would let investigators move the data and crack the passcode.
The idea that's garnering the most focus is something called chip cloning, or mirroring or transplantation. The method entails de-soldering the so-called NAND flash chip (the phone's version of hard drive) from the phone's board and sticking it into a chip reader that saves all the data from the memory chip and about the chip (including things like its serial number) into a file that gets copied onto another similar chip.
Then, it works sort of like saving your place in a video game: Investigators could try some passcodes without the fear of the self-wipe function because they can reload, or re-image, the chip again and again.
"We don't know yet that this is 100 percent doable, but we do know it's feasible," Zdziarski told NPR about the method in an interview last week, before the news of a third-party alternative broke.
He said the technology wasn't tremendously expensive and, in fact, has been showcased in a video of a techie in a Chinese mall performing this procedure to help people get a memory upgrade for their iPhones.
NPR's Aarti Shahani contributed to this report.
Copyright 2016 NPR. To see more, visit http://www.npr.org/.