The article frames many of these requests as being requests for the customer's password, but it can't be that simple. It mentions briefly that Microsoft and RIM deny ever having access to customers' passwords and thus aren't involved, but Google and Apple don't likely have access to their customers' device passcodes either. There have been many famous cases of governments pressuring RIM to allow access to normally encrypted data in-transit from BlackBerry devices.
With physical access to the device the Bureau is clearly capable of dumping the data on it and reading it, but that data may be encrypted, and the passcode is required in order to obtain the encryption key. In such cases, without the key the Bureau would be left with "brute force" decryption, which is extremely time- and resource-consuming.
The companies are often hesitant to cooperate, even if the government has a proper search warrant. The customer themselves may decline to provide a password under subpoena under the Fifth Amendment's protection against forcible self-incrimination. Often the FBI requests assistance in remotely breaking into devices still in the customer's possession.
The featured case in the story involves the Samsung Galaxy belonging to Dante Dears, founding member of the "Pimpin' Hoes Daily (PhD)" gang. Mr Dears is on parole.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.