Apple has refused to comply with the court order. See Apple CEO Tim Cook's letter to customers.
According to this article, which supports Apple's position on the matter:
In the past, Apple was able to use a tool that would physically plug into the phone and let it respond to search warrant requests, but since 2014, the company has encrypted the contents of its iPhones and iPad tablets by default, and only those with the password can access the data on it.According to another article:
...The investigators are trying to determine to what extent married couple Syed Farook and Tashfeen Malik were influenced by radical Islamic terrorist groups, as well as who they had been communicating with before the shootings. Investigators have been unable to access Farook’s iPhone 5C.Read the entire article HERE.
Sheri Pym, the federal judge, has ordered Apple not to turn off its encryption but to make it easier for federal agents to randomly guess the iPhone’s passcode. Apple has built a security feature into iPhones so that a phone slows down anyone trying to “brute force” his way into a phone by guessing passcode after passcode.
The built-in delay is so substantial that Apple said it would take someone 5 1/2 years to guess every possible code for a single device.
The court order requires Apple to circumvent that delay. “[Apple] will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred Apple hardware,” it reads.
The magistrate also wants Apple to turn off any “auto-erase” functions on the phone, if enabled. This will be done with a program Apple is ordered to write and will allow FBI agents to install it on the suspect’s phone at a federal or Apple facility, according to the order....
Some are praising Apple's stand, others are vilifying it.
FEATURED QUESTION:
Should Apple be required to comply with the court order demanding access to the iPhone used by jihadist Syed Farook? Please explain the reasons for your answer.
ADDENDUM
Beamish has posted the following to this thread:
There is more than one way to skin a cat. All cell phone OS's are tied to their phone's IMEI serial number.If that is accurate, then Apple CEO Tim Cook is grandstanding.
Apple would simply have to push an altered OS update to the specific phone, and that altered OS would only work on THAT phone if it were coded specifically for that IMEI.
Otherwise, they force the Feds to code a patch that could affect ALL IPhones.
"They that can give up essential liberties for a little temporary safety deserve neither liberty nor safety."
ReplyDelete~ Franklin (1706-1790)
AN ANCIENT ARABIAN FABLE FURTHER ILLUSTRATES FRANKLIN'S POINT - IF YOU HAVE the WIT to DRAW PARALLELS and UNDERSTAND ANALOGIES:
DeleteThe CAMEL in the TENT
One cold night, as an Arab sat in his tent, a camel thrust the flap of the tent aside, and looked in.
"I pray thee, master," the camel said, "let me put my head within the tent, for it is cold without."
"By all means, and welcome," said the Arab; and the camel stretched his head into the tent.
"If I might but warm my neck, also," he said, presently.
"Put your neck inside," said the Arab.
Soon the camel, who had been turning his head from side to side, said again: —
"It will take but a little more room if I put my fore legs within the tent. It is difficult standing like this without."
"You may also put your fore legs within," said the Arab, moving a little to make room, for the tent was very small.
"May I not stand wholly within?" asked the camel, finally. "I keep the tent open by standing as I do."
"Yes, yes," said the Arab. "I will have pity on you as well as on myself. Come wholly inside."
So the Camel came forward and crowded into the tent. But the tent was too small for both.
"I think," said the Camel, "that there is not room for both of us here. It will be best for you to stand outside, as you are the smaller; and then there will then be room enough for me."
And with that he pushed the Arab a little, who made haste to get outside the tent.
THE MORAL: It is always wise to resist the beginnings of evil.
For those are remain perplexed: The CAMEL represents TECHNOLOGY; the ARAB represents HUMANITY.
If you still don't get it, you richly deserve to be enslaved.
FT,
DeleteI won't disagree with the lesson from that story.
Humanity is far down the path of becoming cyborgs.
In many ways, our use of technology -- and using it required for so many things -- brings a false sense of security. Even a sense of power!
I have never had the expectation of privacy once I started using the web. The web is a public forum -- even with all the passwords, encryption, etc.
Add to the above that our digital data of all types are subject to search warrants.
No, Apple should refuse the Court order. Our Constitutional system is built on the principle of negative liberty. If the government wants to hack the phone, that's THEIR problem, NOT Apple's.
ReplyDeleteThank you! And a resounding, hearty AMEN!
DeleteBut when some lofty thing is done
DeleteI gird at once my harness on.
Up with what’s low, what’s high eschew,
Call crooked straight, and straight askew.
What need I more, for health and worth:
I’d have it so throughout the earth.
-Thersites (Goethe, "Faust")
Do the TSA solution. Everyone with a locked IPhone should be waterboarded until they give up the password.
DeleteThey're obviously exploiting re Boucher...
DeleteIt's a no-no to cause case evidence to be destroyed.
DeleteWaterboard Tim Cook until he cries for mercy, then waterboard him some more for crying without permission.
Housekeeping notice:
ReplyDeleteOff topic comments and replies thereto will be deleted as soon as they are detected by a blog administrator.
If you want to blab about the SCOTUS crisis, please go to the thread just below this blog post.
Thank you.
All right, but I DID want to talk about Mr. Trump's "Town Hall Meeting" last night. It was very revealing to say the least, and greatly reduced whatever respect I may have had for The Donald.
DeleteFT,
DeleteI understand that. But this thread is about a completely different topic.
A bomb is placed in a safe that could substantially damage a large facility, say a hospital threatening patients who cannot readily be evacuated.
ReplyDeleteThe safe builder, knowing the technology of the locking mechanism, is called on to help open the safe by remotely opening the safe, but refuses, even though the safe owner is dead.
What is your opinion of the safe builder?
He builds good safes.
DeleteThat's a given.
DeleteDo you think he would be complicit in the deaths of those exposed to the resulting explosion?
Remember, he is only opening the one safe and not exposing the security of the others.
If he doesn't open it in time, and dies with the others in the explosion, are the police his murderer?
DeleteRemember - Apple doesn't currently "have" a remote break-in device. You'd force them them develop one at their own expense.
DeleteYou might as well demand that auto manufacturers develop cars that runs over accident victims people and bring them back to life....
Delete...or every manufacturer develop the antidote-cure for every product they make.
Want to sell Viagra? First you must also develop "Make-soft-a"... to prevent those agaonizing four hour embarrassments at the hospital.
Thersites,
DeleteMaybe I misunderstood, but I thought that the court order entailed paying Apple.
Does it also involve compensating Apple for all the money they've already spent on developing the encryption technology they have today as well as all lost revenues from future phone sales? If not, then it it's not a "fair" financial transaction, just "proof" that their encryption technology can be beat/hacked.
DeleteOnce Apple hacks their own phone, or establishes a path to a "back-door" nobody is going to buy it anymore.
It's like asking our "safe-builder friend to encode a universal combination into it's locks. Who's going to buy his "safe" if it comes with a Trojan horse built-in?
DeleteThis comment has been removed by the author.
DeleteNo. My analogy was:
DeleteKnowing the technology of the proprietary mechanism that would give them an edge over the authorities in cracking the safe (and the remote was to avoid putting them in the proximity of the explosive for the analogy).
By them doing the cracking, as requested by the authorities, the technology is not compromised.
The security of other devices is not compromised.
Lives are saved (put a loved one of yours in one of those hospital beds).
Not asking for a universal backdoor.
You missed the point. Just knowing that the manufacturer can crack my safe at any time makes me want to buy my safe from someone who can't.
DeletePeople either have an "absolute" right to privacy, or they don't. There is no "terrorist exemption"... or "torture" exemption. That's why it's called "negative" liberty. Either you have it, or you don't have ANY liberty.
DO you believe it should be legal for the government to develop and use "mind reading" technology? Or is THAT a level of personal privacy that no one should be allowed to violate.
DeleteShould a court be able to "order" America's leading neuro scientists to develop mind reading technology? Prevent them from working other projects and focus on mind reading?
Would you like to live in a society where the government CAN do the above?
Delete...cuz if they can force Apple to develop the I-Phone breaker, then any judge in America today can conscript YOU to clean Obama's toilet at 1600 Pennsylvania Ave for the rest of your natural life, too.
DeleteRemember. The safe builder has done NOTHING criminal.
Delete...and YOU are perfectly capable of cleaning Obama's toilet.
DeleteThe analogy was clear, but does not bear on the Apple case. The request is to weaken the security mechanism (the delay between failed password attempts), which is analogous to purposefully hobbling the safe lock. This would definitely compromise all apple devices.
DeleteTim Cook is grandstanding a non-issue, as Apple can and has unlocked,their phones before.
DeleteThey wouldn't be able to push software and app upgrades to their phones if they couldn't bypass the lock. It's bullshit.
One. I don't remember insisting on the safe mfr doing anything.
DeleteI asked: "What is your opinion of the safe builder?" given that he could save lives at no expense to his other customers, but won't.
Two: Assisting in the breaking in to one phone does not compromise any other phone. I will say that if they exposed their technique to the feds, it might compromise other phones to being cracked by the Feds.
The request, as I recall, was to in general assist in the
cracking of the phone. Not to weaken any other phone's security.
My IPad won't download software and updates unless I tell it to. Apple only "pushes" what I allow it to push, when I allow it to.
DeleteBTW, having broken into a safe and posting the results on Youtube I found in comments that their are a myriad ways of breaking into a safe.
DeleteNo safe is safe. Some safes are safer than others.
Anyone who assumes the mfr can't get in is ill-informed.
Anyone who assumes that the mfr CAN get in is also ill-informed.
DeleteData Security is a multi-billion dollar industry. ARe all those people wasting their money?
Apple can do anything they want to your devices, locked or unlocked up to and including the Stephen Wright virus, which deletes your files and replaces them with exact duplicates ;)
DeleteSeriously though, the security lock can be bypassed with a pin number assigned to the phone's IMEI serial. It's what identifies the phone to a network along with its SIM card, and Apple can (and has) sent commands to locked phones via SMS texting.
Again, Tim Cook is trying to sell Swiss cheese and call it a brick wall.
...quantum encryption is just down the street. It is literally "unbreakable".
DeleteAre you going to make it illegal for Apple to use it just because it is?
DeleteHave you heard of Apple Pay? It comes with System 9. Do you think it has any chance as a product, if it's NOT secure?
DeleteClone bait.
DeleteBeamish,
DeleteIt's that simple?
btw - Here is the Court Order.
DeletePresident Obama receives his daily Intelligence Briefing on an IPad.
DeleteHow secure is it?
It's not on Simple Street, but definitely in Possibleville.
DeleteWireless / cellular devices by nature have a security "flaw" in that they have to be able to send and receive signals to their network hub / cell tower in order to function. It's like Nixon in China, lots of ports open.
When I worked for AT&T, we could track a cell phone's location via aGPS tech to within a 50 foot radius. That capacity has been since fine tuned to 3 feet.
DeleteEd,its more akin to ordering the safe builder to design and manufacture a drill that can easily and quickly penetrate the case and cut through the locking pins.
DeleteBut the user could turn GPS off, right? (you can still track which part of the cell network he's connected to).
DeleteYou can turn off GPS, but that doesn't turn off the ping to cell tower(s) via which the signal strength is measured and can pinpoint you during a phone call or where you were when you sent a text.
DeleteAlso, photos you take will be geotagged with EXIF metadata of where the photo was taken unless you turn off GPS or go in and edit that data out of the file. Scary that you could potential give yourself away with a bathroom mirror selfie ;)
From what I have heard and read elsewhere, these cases were two separate cases.The court order for this one phone was read on the radio by a talk show host, and all that was asked was that this particular phone that was owned by the county in fact be accessed. The Judge did not ask for a change in all phones be changed, nor direct access to the code. Just that Apple turn off this phone encyption. I think this is simply an advertisement for Apple but then I am a cynic.
ReplyDeleteBunkerville,
DeleteI think that Apple is maintaining that it is impossible to alter the self-destruct device on only one phone.
Is that true?
I don't know.
But I do know that this case is great free advertising for Apple.
Bunkerville points out something that I neglected to put in the body of the blog post.
ReplyDeleteThis phone did not belong to Syed Farook.
This phone belonged to the county government, which, apparently, has no objections to the phone's being hacked.
Wouldn't all data on this particular iPhone belong to the county by default?
And there's not a company owned device my former employer cannot get into.
DeleteSan Bernadino was lax.
Ed,
DeleteI suspect that many government entities and even private companies are lax in exactly the same manner.
Those iPhones are being handed out like candy. Last summer, I noticed that the plumbing company I use provides iPads and iPhones. So very convenient, you know.
Just check with the NSA Utah Data Base Center. They probably already have it.
DeleteAside from the philosophic argument, as a practical matter, if they put a back door in the code, it's going to eventually be hacked.
ReplyDeleteDuck,
DeleteAgreed about the vulnerability of a back door. But it that what the court order is demanding?
As I understand it, they want help with THIS ONE DEVICE.
DeleteThe government hacked Hitler's ENIGMA. They can hack Apple. Make them waste their OWN resources.
Deletealso... once it is known that Apple can hack the IPhone, consumers no longer possess a 4th Amendment based "reasonable expectation of privacy" for the device, and therefore in the future, the Authorities will NOT require ANY warrant to extract the contents of your IPhone.
DeleteZacharias Mossaoui is known as the 20th hijacker and was arrested on August 16, 2001 and a computer found. The computer was not searched because of a concern about potentially violating his 4th Amendment Rights and three weeks the hijackings and destruction of the World Trade Center known as 9/11 occurred. Had the computer been searched, many believe the 911 tragedy would have been prevented.
DeleteDemocracy Now! featured this issue today and I government agencies are asking for a universal change to the software to allow a back door.
DeleteIn that case you're giving the NSA and the Chinese access.
I believe the agencies are using the notoriety of the case as a wedge to have all phones opened.
I agree with your assessment that the government is using this as a wedge case. If Apple software geeks can write the code so can government software geeks.
DeleteFinntann,
DeleteIf Apple software geeks can write the code so can government software geeks.
Are the government computer geeks as skilled as the Apple geeks? Just askin'.
AOW: No. But they can contract it out.
DeleteSF,
DeleteAre only geeks employed by Apple to solve this problem?
Great discussion. I regret arriving so late.
ReplyDeleteAs usual, Farmer makes an excellent philosophical case, but I agree with Beamish that Apple can do this an the weasel who runs the company is grandstanding.
I also agree with Ducky that this could be a government request for a universal backdoor, which leads me back to Farmer: If the government wants a universal back door, let them make it themselves and not tell anyone. That's how they did it back in the old days.
Encryption schemes exist to the ordinary person that make it extremely difficult to crack your password, and government worldwide have already expressed alarm at this.
I remember years and years ago when government looked like they would go after blowfish.
The next step for the tyrants is to declare legal only certain schemes that they already can crack, and declare anything else the equivalent of burglary tools, possession punishable by fines and imprisonment.
It's the "expectation of privacy" argument that seals it for me. If there is "none," then the 4th Amendment is moot.
DeleteYour cell phone/ PDA becomes the privacy equivalent of "sitting on the front porch in plain sight". ANYONE can "look".
DeleteYour "privacy" ends where the curtilage "begins".
DeleteFJ,
DeleteInteresting point about curtilage!
"The next step for the tyrants is to declare legal only certain schemes that they already can crack"
DeleteIIRC you already can't develop open-source SSH tools in the USA because of bone-headed laws along those lines.
SF,
DeleteYou haven't arrived too late to this discussion. It's still ongoing.
I agree with SF 100%.
DeleteAnd Ducky, God help me. :-)
Here's what will happen:
ReplyDeleteThe FBI will quietly provide Apple with the IMEI serial number from the dead terrorist's cell phone. Apple will quietly provide the FBI with a skeleton key password derived from that phone's IMEI.
Obama will publically lament that he can't force Apple to give up the booty.
Tim Cook will sashay in a feather boa and lisp about how he's saved the universe for homos and other kinds of Apple users.
It'll be their little secret.
There's a HUGE different between "private" knowledge, and "common" knowledge. Either the Emperor is NAKED, or he's NOT.
DeleteAll of your civil rights lie in the "difference".
Not sure how my civil rights are violated by asking the manufacturer of a phone made in China to unlock one of their music playing doorstops that belonged to a now dead terrorist.
DeleteBut, I'm a Windows phone user.
What do you think Tim Cook would do if the phone contained information about a serial killer who was killing gay's?
ReplyDeleteWho knows.
DeleteWhat do you think he'd do if the IPhone brand became known as the go-to platform for ISIS terrorists and those who want to emulate them?
Is the iPhone already the preference of Islamic terrorists, precisely because Apple devices are purported to be so difficult to hack into?
DeleteI think it's rather that IPhones are made for people who don't know or want to know how to use technology.
DeleteThey're the Velcro shoe of the laced-up world.
This one's for the Geeks.
DeleteThere is more than one way to skin a cat. All cell phone OS's are tied to their phone's IMEI serial number.
DeleteApple would simply have to push an altered OS update to the specific phone, and that altered OS would only work on THAT phone if it were coded specifically for that IMEI.
Otherwise, they force the Feds to code a patch that could affect ALL IPhones.
In the end, Apple is only "protecting" a damned terrorist.
Beamish,
DeleteThen why doesn't Apple do that?
Apple isn't protecting anyone. The terrorists are dead. This is just an order to perform forensics to determine how badly the government bungled its' responsibilities to protect the public. And if they have to destroy all of our remaining civil rights to do it, we might as well just drop it. The government will ALWAYS bungle its' responsibilities and look to distract you with forensic cases like this one.
DeleteFJ,
DeleteThe government will ALWAYS bungle its' responsibilities and look to distract you with forensic cases like this one.
Yep.
I am suspicious of both sides: Apple and the federal government.
The NSA already has the contents of all the terrorists phone conversations and who they called. All they want to do now is go back a track their movements of K-Day. Hell, the should just put the JLENS blimp over San Diego/ Los Angeles instead of Baltimore and they wouldn't need the IPhone... they'd have the data.
DeleteAOW,
DeleteApple won't do that because Tim Cook is grandstanding and counting on the general public's ignorance of technology that fuels the sales of his music playing doorstops.
(I'm not a fan of Crapple products, lol)
DeleteBeamish,
DeleteI confess that I have an iPhone5S. I got it because a homeschool parent gave me a mini iPad, which I use a lot.
But here's the thing...I don't worship these devices. Many Apple users do just that. I don't get it!
http://www.nytimes.com/2016/02/18/technology/apples-stance-highlights-a-more-confrontational-tech-industry.html?_r=0
ReplyDeleteBefore the analysis above (excellent arguments) was written, I stood in Apple's corner.
Device access is not the nirvana we seek. Top to bottom shake down of DHS and the inordinate and overly dependent reliance of digital data to do their jobs is a good place to start.
Visa reform is needed.
HumInt is needed on grander scale. *How long has it been since a star was put on that wall at Langley? We lack the foot soldiers compared to Dr. Evil's team.
Before Apple's technology, before locked phones - we had 9/11.
Future intelligence failures may be blamed on Apple, but they are a small slice of that pie.
Prince,
DeleteRead about the author of that NYT article.
I believe an exception should be made for terrorist activities.
ReplyDeleteApple could take the phone in house, unlock it, transfer the data to another medium, give that to the FBI, then destroy the software used to unlock the phone without any possibility of that unlocking software getting loose.
I read today, Apple has previously unlocked 70 phones. Maybe that was prior to their current encryption scheme.
Apple should provide access to that data to the FBI.
Kid,
DeleteI read today, Apple has previously unlocked 70 phones. Maybe that was prior to their current encryption scheme.
It was before the current method of encryption, I think.
I thought the cell phone was found on the road after it had been run over by the vehicle they were driving just before they got into the shoot-out with the gendarmes— shooting out the back window of their SUV in a blatant attack on law enforcement.
ReplyDeleteWaylon,
DeleteAccording to what I've read, Syed Farook had two cell phones -- the one in dispute and a personal one he owned. The one destroyed during the shoot-out was his personal one.
AOW, according to THIS STORY the police already had a cell phone that belonged to Farouk which had photos of schools that were supposedly part of an earlier terrorist attack. Then there was the other one that was run over and destroyed in the final show down on the street that ended in a hail of bullets (upward of 250 to 400 rounds fired)to bring an end to the lunacy.
DeleteAnd whatever happened to his "friend" Enrique who was supposed to have supplied him with the weapons and planned the earlier school attack? Maybe his phone would be more valuable in unraveling the mystery—but he supposedly said that the weapons he provided were provided for him by "law enforcement".
There's way more to the story than what has been dished up by the media, is all I'm saying, since I don't believe you can trust a word coming from the main stream media today.
And we shouldn't forget that "Mrs. Farouk", his beloved bride, was a late import from Saudi Arabia. And, of course, Saudi Arabia, is our great trusted and true ally in this great war against terrorism, which Saudi Arabia is, of course, the main supporter, supplier and financier of terror around the world.
DeleteIs that too deep a conspiracy?
Waylon,
DeleteThere's way more to the story than what has been dished up by the media, is all I'm saying, since I don't believe you can trust a word coming from the main stream media today.
No doubt about that!
I don't think for one minute that Tim Cook or anybody at Apple is concerned about anybody's privacy rights. If the truth were known there is not only a commonly used in-house method for Apple to suck the information out of an iPhone, but other "back-doors" that were created during the assembly and testing phases of the device. Apple just doesn't want anybody to know.
ReplyDeleteI think it is a load of horse-feathers for Apple to refuse to help the Feds in this particular case. I would hate to see legislation forcing manufacturers and dealers to record encryption keys with the Feds for every potentially encrypted device sold.
Magistrate Sheri Pym, in the US District Court of Central California, ordered the tech giant to provide the FBI with software designed to defeat a self-destruct mechanism on the iPhone, according to the Associated Press, which first reported the news. The self-destruct mechanism automatically erases data on a phone after ten failed password attempts, or rather erases a key that could be used to decrypt that data.
ReplyDelete“Apple’s reasonable technical assistance shall accomplish the following three important functions,” the document notes. “It will bypass or disable the auto-erase function whether or not it has been enabled; it will enable the FBI to submit passcodes to the subject device for testing electronically via the physical device port, Bluetooth, Wi-Fi or other protocol available on the subject device and it will ensure that when the FBI submits passcodes to the subject device, software running on the device will not purposefully introduce any additional delay between the passcode attempts beyond what is incurred by Apple hardware.”
Finntann,
DeleteIn a comment above, Kid typed in:
Apple could take the phone in house, unlock it, transfer the data to another medium, give that to the FBI, then destroy the software used to unlock the phone without any possibility of that unlocking software getting loose.
But according to that text you provided, that method is disallowed, right?
And when all is said and done, the FBI is going to give that capability back to Apple and not ever use it again on other 5C phones. Yeah, right. ROFLOL
ReplyDeleteNOTE:
ReplyDeleteI have posted an addendum to the body of the blog post.
Discuss?
This comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by the author.
DeleteThe Federalist's take on this matter:
ReplyDeleteCut The Crap, Apple, And Open Syed Farook’s iPhone by attorney Gabriel Malor.
Yep.
DeleteMuch earlier in this thread, Thersites typed in the following, which is likely important to consider:
ReplyDeleteOnce Apple hacks their own phone, or establishes a path to a "back-door" nobody is going to buy it anymore.
And maybe Apple already has such a back door, but is pretending that the door doesn't exist so as to sell Apple products, which are quite expensive.
Yes, I'm a cynic!
I've noticed that Apple users worship their products because Apple user believe that Apple products are so much superior to other products.
DeleteBut what if they're really not so very superior?
Then, Apple users have been scammer because they've shelled out big bucks.
Thersites, note this:
DeleteApple says complying with the FBI would undermine Apple's brand and hurt its profitability.
$$$!
AOW,
DeleteI believe you are right on two counts:
Apple does have a backdoor, and wants to keep it secret.
Apple phones are $500 more expensive than and do less than a $75 base Nokia 920 running Windows 10.
It's all about the Benjamins. And if Apple can't pursue them, then this isn't our country anymore.
DeleteSo, what is Apple's next move? The link explains the options for both federal law enforcement and Apple.
ReplyDeleteNote the last three paragraphs:
This is a landmark case. It will establish a precedent that asserts new powers for law enforcement.
Kendall Coffey, formerly the top federal prosecutor in Miami, noted that it's rare for a major company to pick such a huge legal battle.
"What's striking about this scenario is the opposition in the face of a court order," Coffey said. "It signals it's going to be a big fight. A lot of companies don't want to be on the wrong side of the FBI. Their jurisdiction is broad, and it can be akin to tugging on Superman's cape."
I just don't trust Tim Cook to be honest or sincere. Not only did he fail to mention that the IPhone 6 is an overpriced useless piece of shit in his letter, he didn't apologize for it either. ;)
ReplyDeleteLotsa upvotes!
DeleteApple could take that phone, crack it, and turn the data over to the FBI, and nobody else would be harmed.
Privacy is a fiction. Afraid of the government spying on you? Apple is spying on you, and so is Google, Yahoo and the rest of them...
This comment has been removed by a blog administrator.
DeleteAnonymous,
DeleteI do occasionally allow mild profanity if the rest of such a comment has importance to the discussion.
My blog. My rules.
Part of this stems from using phones for far more than phones.
ReplyDeleteHow much info resides on servers (the "cloud") that is more damaging than what's on the phone?
You want ultra security in your comms because you are afraid of big brother? Don't depend on any device.
"Make the FBI do it's job."?
Getting intel off that phone falls right in that demand.
Some concern about search and seizure down the road should not impinge on determining the status of a potential ticking bomb, the contacts in a sleeper cell.
The discussion has gone far afield.
Crack one phone that was in the possession of a dead terrorist which may implicate others waiting to do harm.
Leave all the other phones alone.
As for Apple? What better advertising than "Your data is safe with us, the Feds can't crack it, and unless you are a nefarious character, we won't help them."
Using phones for more than phones... I can replicate the :::cough::: "quality" of the IPhone 6's camera by smearing Vaseline on the lens of my Nokia 935 ;)
ReplyDeleteWell, well, well....
ReplyDeletehttps://gma.yahoo.com/san-bernardino-shooters-apple-id-passcode-changed-while-234003785--abc-news-topstories.html
Tammy
And what is the name of that county employee?
DeleteFrom the link that Tammy left above:
ReplyDeleteThe password for the San Bernardino shooter's iCloud account associated with his iPhone was reset hours after authorities took possession of the device.
The Justice Department acknowledged in its court filing that the password of Syed Farook's iCloud account had been reset. The filing states, "the owner [San Bernardino County Department of Public Health], in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup."
Apple could have recovered information from the iPhone had the iCloud password not been reset...
[...]
The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities...
Apple executives say the iPhone was in the possession of the government when iCloud password was reset. A federal official familiar with the investigation confirmed that federal investigators were indeed in possession of the phone when the reset occurred....
And the link offers this, too:
DeleteAccording to court records, the iPhone had not been backed up since Oct. 19, 2015, one-and-a-half months before the attack and that this “indicates to the FBI that Farook may have disabled the automatic iCloud backup function to hide evidence.”
Read the entire link HERE.
I had to read the link twice to let sink in the possible ramifications. We need to now consider an individuals cell phone part of the crime scene package, something which must not be tampered with except in official capacity.
ReplyDeletePrince,
DeleteAnother county employee who was in on the jihad plot?
Hooboy!
ReplyDeleteSyed Farook's brother is a computer technician -- Information System Technician
Is Syed Farook's brother (Syed Raheel Farook) also a county employee? If not, does he know a county employee whom he persuaded to tamper with Syed Farook's phone?
This may be worth recalling:
ReplyDeleteInitial news reports and witness accounts led to a search for up to three shooters, but police eventually determined that there were only two.
This I know for sure: At my place of employment a ticket must be generated to request assistance with an IT problem.
ReplyDeleteFrom how it reads, the county employee stepped outside of normal protocols in place to access the phone of Syed Farook. IT services are a request-driven task when it comes to information retrieval.
Why? Why did the employee remotely access and reset the password?
Prince,
DeleteYes, this situation smells!
Are we sure that this isn't just another FBI Disinformation Campaign to encourage terrorists to use IPhones because it already has an NSA back door built in?
ReplyDeleteSpeedy,
DeleteNo, we are not sure!
Back in 2003 the Pentagon announced to the media that they were shutting down their disinformation department.
DeleteYeah, but that was planting stories in the foreign press. The 'American Press' operation is non-stop.
DeleteAnother wrinkle:
ReplyDeleteIn the chaotic aftermath of the shootings in San Bernardino, California, in December, FBI investigators seeking to recover data from the iPhone of one of the shooters asked a technician in the California county to reset the phone's iCloud password.
That apparent fog-of-war error has foreclosed the possibility of an automatic backup by the phone to the Apple iCloud servers that might have turned up more clues to the origins of the terrorist attack that killed 14 people....