The Pensacola Naval Base Shooter Had Longtime "Significant Ties" To Al-Qaeda
The FBI was able to obtain the information after breaking the encryption on the shooter's two iPhones.
The man who killed three sailors and wounded eight others in a shooting at a naval air station in Pensacola, Florida, in December had "significant ties" to al-Qaeda, officials said Monday.
The FBI discovered the links between the terrorist organization and shooter Mohammed Alshamrani, a second lieutenant in the Royal Saudi Air Force who was training as a pilot on the naval base, after breaking the encryption on his two iPhones.
"The phones contained information previously unknown to us that definitively establishes Alshamrani’s significant ties to al-Qaeda in the Arabian Peninsula (AQAP), not only before the attack, but before he even arrived in the United States," US Attorney General Bill Barr said in a press conference.
In January, Barr called the shooting "an act of terrorism" after FBI officials learned that Alshamrani had posted anti-American and anti-Israeli statements on social media, including just two hours before the Dec. 6 attack.
FBI Director Christopher Wray said Monday that the information obtained from the iPhones — one of which Alshamrani shot during his attack in an attempt to destroy it — proved beyond all doubt that the Saudi Arabian trainee was "a determined AQAP terrorist who spent years preparing to attack us."
In February, AQAP leader Qassim al-Rimi claimed credit for the Pensacola attack in an audio recording released by the terrorist organization. To prove their association with Alshamrani, the group released what they said was a copy of his will. Wray confirmed Monday that they found the same will on the shooter's phone, as well as evidence that his connections with al-Qaeda dated back to 2015.
"He was meticulous in his planning. He made pocket-cam videos as he cased his classroom building. He wrote a final will, purporting to explain himself, and saved it in his phone — the exact same will that AQAP released two months later when they initially claimed responsibility," Wray said. "He wasn’t just coordinating with them about planning and tactics—he was helping the organization make the most it could out of his murders. And he continued to confer with his AQAP associates right until the end, the very night before he started shooting."
Barr told reporters that the information in Alshamrani's phone allowed the US to carry out a counterterrorism operation targeting one of his main AQAP contacts in Yemen, Abdullah al-Maliki.
He also said the government was working closely with Saudi Arabia to improve the vetting process for Saudi soldiers training in the US.
Wray said the FBI received "effectively no help from Apple" during the four months it took the agency's computer scientists and engineers to access the iPhones.
In a statement to BuzzFeed News on Monday, Apple said that they have been assisting and providing information to the FBI since the shooting — they just wouldn't unlock Alshamrani's phones.
"Apple responded to the FBI’s first requests for information just hours after the attack on Dec. 6, 2019 and continued to support law enforcement during their investigation," the company said. "We provided every piece of information available to us, including iCloud backups, account information and transactional data for multiple accounts, and we lent continuous and ongoing technical and investigative support to FBI offices in Jacksonville, Pensacola and New York over the months since.
"As a proud American company, we consider supporting law enforcement’s important work our responsibility. The false claims made about our company are an excuse to weaken encryption and other security measures that protect millions of users and our national security."
The company has been warring with the federal government over these privacy and encryption issues for years. In 2015, Apple defied a court order to assist the FBI by unlocking the iPhone belonging to another mass shooter — one of two terrorists who killed 14 people in San Bernardino. (The FBI was eventually able to access the phone thanks to the work of an outside company.)
Barr on Monday called for legislative action that would force Apple and other tech companies to create a feature in all of their phones that would allow law enforcement officers to bypass security settings if they obtained a court order.
"When combating threats to our homeland, we need American tech leaders to work with us, not against us," he said.
"Privacy and public safety are not mutually exclusive. We are confident that technology companies are capable of building secure products that protect user information and, at the same time, allow for law enforcement access when permitted by a judge," the attorney general added. "The developments in this case demonstrate the need for a legislative solution."
In its statement, Apple said that there was no way to make a secure workaround feature for law enforcement.
"It is because we take our responsibility to national security so seriously that we do not believe in the creation of a backdoor — one which will make every device vulnerable to bad actors who threaten our national security and the data security of our customers. There is no such thing as a backdoor just for the good guys, and the American people do not have to choose between weakening encryption and effective investigations."
Apple also fired back at Barr's claims that the company has provided user data to aid "authoritarian regimes" like Russia and China with citizen surveillance.
"Customers count on Apple to keep their information secure and one of the ways in which we do so is by using strong encryption across our devices and servers. We sell the same iPhone everywhere, we don’t store customers’ passcodes and we don’t have the capacity to unlock passcode-protected devices. In data centers, we deploy strong hardware and software security protections to keep information safe and to ensure there are no backdoors into our systems. All of these practices apply equally to our operations in every country in the world."