Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI agrees to unlock iPhone, iPod in Arkansas homicide case
fox news ^ | 03/31/2016

Posted on 03/31/2016 10:20:28 AM PDT by BenLurkin

The FBI agreed Wednesday to help an Arkansas prosecutor unlock an iPhone and iPod belonging to two teenagers accused of killing a couple, just days after the federal agency announced it had gained access to an iPhone linked to the gunman in a mass shooting in California.

Faulkner County Prosecuting Attorney Cody Hiland said the FBI agreed to the request from his office and the Conway Police Department Wednesday afternoon. A judge on Tuesday agreed to postpone the trial of 18-year-old Hunter Drexler so prosecutors could ask the FBI for help. Drexler's trial was moved from next week to June 27.

Drexler and 15-year-old Justin Staton are accused of killing Robert and Patricia Cogdell at their home in Conway, 30 miles north of Little Rock, in July. The Cogdells had raised Staton as their grandson.

The FBI announced Monday that it had gained access to an iPhone belonging to Syed Farook, who died with his wife in a gun battle with police after they killed 14 people in San Bernardino in December. The FBI hasn't revealed how it cracked Farook's iPhone. Authorities also haven't said whether the iPhone and iPod in the Arkansas case are the same models or whether the FBI will use the same method to try to get into the devices.

Hiland said he could not discuss details of the murder case in Arkansas, but confirmed the FBI had agreed less than a day after the initial request

(Excerpt) Read more at foxnews.com ...


TOPICS: US: Arkansas
KEYWORDS: fbi; iphone; ipod
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 161-169 next last
To: Swordmaker
This is all in their original affidavit. They indeed asked for a backdoor.

Fine. Post the section that uses the verbiage "Back Door."

If you cannot do so, then shut the f*** up with your stupid Apple propaganda spin.

No, they did not ask for a F***ing "Back Door." They asked Apple to stop the counter that counts to 10, remove the delays for password entry, and allow password entry through electronic means rather than a keyboard.

Only some sort of ignorant twit would call all this a "back door."

Or a deliberate Liar.

101 posted on 03/31/2016 6:36:15 PM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 91 | View Replies]

To: rarestia
Sword, you and I have had VERY heated discussions, and you know damn well that I’m a blue-blood Microsoft boy all the way through. This transcends platform. This is 1984-level shit here. If the government could bully any private entity into giving up the keys to their intellectual property, Katie bar the door!

Absolutely. These know nothings are so convinced of their opinions are facts, there is no moving them. I've actually enjoyed your and my repartee in the past because you are not a know-nothing. You approach things from an educated position. We disagree, but pretty much politely, if heated.

These characters ignore any facts that do not meet their world view. . . and read things through distorted lenses, such as DL's reading of the Court Order as saying that Apple could actually keep the iPhone 5C after they unlock it, even though it is evidence in a major terrorist attack. Nothing I told him about the rules of evidence would sway him that he actually read that in the court order. . . but it simply is not there. He just calls me a liar, and says go read the court order again, it's there. I've asked him to QUOTE the exact words, but he just says "Read it yourself, it's easy to find." They are delusional in their hatred for Apple.

102 posted on 03/31/2016 6:37:08 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 76 | View Replies]

To: Swordmaker
Not going to bother reading this one. I've already seen your song and dance routine.


103 posted on 03/31/2016 6:47:59 PM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 94 | View Replies]

To: DiogenesLamp; jessduntno

I admire your ability to put up with the lies and stupidity of trolls.

More substantive, per your regard for our constitution I’d like to point out the debilitation of the Fifth Amendment, too, inherent in Apple’s business plan.
http://philadelphia.cbslocal.com/2015/10/08/philadelphia-police-sergeant-jailed-for-hiding-computer-files-from-feds/
“...Rawls remains jailed at a federal detention center in Philadelphia. His lawyer didn’t immediately return a message Wednesday.
Investigators say the 17-year police veteran failed to unlock certain files on personal computer devices that were the subject of a federal search warrant.
Court records list the devices as Rawls’ Apple Mac Pro and Mac Mini computers, iPhone 6 Plus ...”

The courts are going to do their job- or perish- no matter Apple’s profits. If Fifth Amendment doctrine has to be adjusted to do so then so it will be.


104 posted on 03/31/2016 7:01:10 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 101 | View Replies]

To: DiogenesLamp

The expert witness testimony will be entered into the case record. Apple would presumably get access to that record and figure out how it was done and fix the hole. I wouldn’t be surprised if they even had someone in the courtroom taking notes.


105 posted on 03/31/2016 7:16:40 PM PDT by Coronal
[ Post Reply | Private Reply | To 97 | View Replies]

To: Gator113
We are ready to upgrade one of our iPhones. How long do you think it might be before Apple comes out with an iPhone thats even more difficult to break? I am thinking I should wait to see what they do.

Your thoughts?

They already have. The iPhones brought out since the iPhone 5C have all been much more secure than that device. They have what is referred to as the Secure Enclave, a multilayer chip which is far more difficult to do what I described above in Reply #81. The multilayer chip which, if I recall correctly, has six layers, which makes it not amenable to being read by electron microscopy, ion stream, even the laser method to learn what data may be stored on it because the EEPROM area is not on the top layer, nor can it be read by the A7, A8, or A9 data processors or the RAM of the system it is installed on. In addition, it is on a separate chip on the SoaC, which resides on the data bus, which along with three other chips are jointly registered with each other. If any of these three ICs are removed, modified, disconnected, or tampered with, or even somehow exchanged with one from another device, that registration will be broken and cause the iPhone to fail to boot at all, requiring a complete restoration from scratch, and if de-registered, require a new re-registration of the ICs which only an Apple Certified Repair station can do.

To protect yourself even more, the newer iPhones and iPads default to a six digit passcode which has one million possible passcodes instead of 10,000. However, you can do even better than that. In settings, you can opt for a complex passcode where you can use more characters and also use Alphanumeric plus symbols as a passcode from the virtual keyboard. That allows you to choose a passcode from all 223 characters available from the keyboard.

Although Apple allows you to have as many as 256 characters in your passcode (ridiculous—somebody on 9 to 5 Mac tried using one with 99 characters and had to try entering it two and three times each time to get it right)—you don't need to go overboard. Just using eight Upper and Lower case intermixed with numbers and symbols results in 2238 possible passcode combinations. That's 6,115.597,639,891,380,481 possible passcodes. In English that's:

Six Quintillion, one hundred fifteen quadrillion, five hundred and ninety-seven trillion, six hundred and thirty-nine billion, eight hundred and ninety-one million, three hundred eighty thousand, four hundred and eighty-one possible passcodes.

That's a lot, but even six characters gets you 2236, or 122,978,496,247,489, or:

One hundred and twenty-two trillion, nine hundred and seventy-eight billion, four hundred and ninety-six million, two hundred and forty-seven thousand, four hundred and eighty-nine possible passcodes for them to try.

Given the more secure nature of the Secure Enclave and a harder passcode, I think they are pretty secure.

Another interesting fact is that it is estimated that only 10% of all Android phones are encrypted while 95% of iPhones are. . .

106 posted on 03/31/2016 7:22:00 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 84 | View Replies]

To: mrsmith

The AAPL pimps are all up in arms. Poor pimps. They’ll be so sorry to find that the Constitution will not be changed to provide them with profits. I hope they get their money’s worth in exchange for all of the lives damaged and souls taken they want to further so badly. Lest they think we are all cynical money grubbing fools like themselves, I wish they get to enjoy the fruits of their wasted lives sooner rather than later.

Did you know that Swordfish thinks you and I are one in the same? One of the other tin foil hat brigade thinks we are super secret double agents. I think it’s true that the fish rots from the head down.

Sláinte mhaith, Mrs. Smith.


107 posted on 03/31/2016 7:25:29 PM PDT by jessduntno (The mind of a liberal...deceit, desire for control, greed, contradiction and fueled by hate.)
[ Post Reply | Private Reply | To 104 | View Replies]

To: jessduntno; NoKoolAidforMe; DesertRhino
You still seem to be trying to litigate your other loser case. Not interested. Do us a favor though, uncork another fine whine..


You must have missed it, Apple WON that case you call a loser, loser.
The FBI cried UNCLE! And the NY Judge took them to the woodshed.

108 posted on 03/31/2016 7:26:36 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 90 | View Replies]

To: Swordmaker

Ohhhhhh...look...in the background, it is Swordfish, after spending the day looking up the dead horse’s arse to see why he died! Have fun Junior? Must have been quite a treat for you and the boys.


109 posted on 03/31/2016 7:30:00 PM PDT by jessduntno (The mind of a liberal...deceit, desire for control, greed, contradiction and fueled by hate.)
[ Post Reply | Private Reply | To 108 | View Replies]

To: jessduntno; rarestia; NoKoolAidforMe; DesertRhino
Why are you sending this crap to me? This has nothing to do with the other thread that you are hung up on. You got your ass kicked. Find someone else to try to impress, will you sweetheart?

Because you never respond to direct challenges. . . and you know it. My ass is in fine condition. Your's isn't. . .

I don't give a damn about impressing you. Your mind, what there is of it, is made of impenetrable neutronium: Densest material in the known and unknown Universe. It seems to be the core of a blackhole. Any fact goes in, but never comes out. Those that get close to your event horizon are distorted beyond all recognition.

110 posted on 03/31/2016 7:32:00 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 93 | View Replies]

To: edh
Thanks for posting that. I wasn’t working on anything that had to be secure when I was playing around with the FIB (I was probing an embedded EEPROM ironically) .... I am familiar with techniques to cover such embedded devices with metal layers as well as introduce traps so that if someone wanted to dig down through the metal with a FIB, they risk cutting power rails and the like. Similar techniques are implemented at the PCB level to prevent sniffing of DRAM busses hidden on inner layers of the PCB (I suspect Apple and other vendors have embedded encryption in front of the DRAM’s physical layer since they develop their own ASICs).

Anyway, I simply got sick of seeing people imply that the iPhone was hacked due to a security issue ... I highly doubted that was the case. Plus there were many people calling you out as if you were wrong about Apple’s security.

Thanks. I knew you knew your stuff. . . I posted the details for the benefit of everyone on here. The Secure Enclave is much more hardened than the Encryption Engine and I sincerely doubt that it will be as easy to get at without destroying/damaging what they are after.

It is difficult being attacked by the know-nothings who are convinced that Apple is doing this purely for PR purposes. . . these short-sighted people cannot see the very serious philosophical underpinnings of what Apple is doing or the long-term consequences of what a loss means for them personally.

111 posted on 03/31/2016 7:37:04 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 95 | View Replies]

To: jessduntno

Oh, I’m sure a more visionary company will produce secure encryption- which is sorely needed so people and companies can use the internet to the fullest- that protects the constitution.
Not to mention the legal systems of other countries

AAPL and it’s investors will suffer horribly from Cook’s dull-witted desire to offer only the simplest, most profitable encryption.


112 posted on 03/31/2016 7:41:10 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 107 | View Replies]

To: mrsmith

We shall see. AAPL as most socialist institutions do, will find a way to self destruct. The AAPL head gang will all get a good heads up and go short in repayment for their bootlicking. Or something.


113 posted on 03/31/2016 7:50:50 PM PDT by jessduntno (The mind of a liberal...deceit, desire for control, greed, contradiction and fueled by hate.)
[ Post Reply | Private Reply | To 112 | View Replies]

To: Swordmaker

Wow....that is what I’d call a very detailed answer! ;>) Thanks.

I have an iPhone 6 and intend to replace my wife’s 4s with with an iPhone 6s.

Frankly, there is never anything in any of our phones or our lives that would embarrass me, but after seeing all of the government abuse of the last 8 years, I want everything private and tough to get.


114 posted on 03/31/2016 8:13:59 PM PDT by Gator113 (~~Go Trump, GO!!~~ Just livin' life my way. Don't worry, everything's gonna be alright. 👍)
[ Post Reply | Private Reply | To 106 | View Replies]

To: DiogenesLamp; rarestia; NoKoolAidforMe; DesertRhino
Not going to play your silly game. What you posted was a suggested method. The filing said that Apple can use any means they want to accomplish the task. It said Apple can keep complete custody of the phone.

No. No. and no. Lies, all of what you said.

The head of the FBI even clarified that Apple does not have to give the government any sort of software at all. I've already posted the link to you before, so you can look back in your history if you want to see it.

If it's not in the Court Order, it doesn't exist. It doesn't have any force. . . nor did you provide any worthwhile links. Lies.

READ THE COURT ORDER. That is all that matters, not what is said as an argument in any filing. Nothing else matters. Haven't you EVER been subject to a court order???? Obviously not.

I've told you before, I have SAT ON A JUDICIAL BENCH and ISSUED SUCH ORDERS. You can't be as stupid as you come across. . . but maybe you are.

Rarestia?

Do you see what I mean? I posted the exact words from the court order and this is what we get. . . complete denial that those words mean what they say. . . and fantasyland whole-cloth creation that APPLE CAN KEEP COMPLETE CUSTODY OF THE EVIDENCE! And also complete refusal to post the actual words! Delusional.

115 posted on 03/31/2016 8:20:54 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 99 | View Replies]

To: DiogenesLamp
I'm sorry, but I just can't seem to read the stuff you write. My eyes glaze over, and I start looking off into the distance.

Perhaps if it was shorter, and more intelligible?

Let's try this: ASSHAT!

116 posted on 03/31/2016 8:23:27 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 100 | View Replies]

To: DiogenesLamp
I'm sorry, but I just can't seem to read the stuff you write. My eyes glaze over, and I start looking off into the distance.

Perhaps if it was shorter, and more intelligible?

Oh, and your claims in reply #32 were completely made up lies.

Is that short enough and intelligible enough for you?

117 posted on 03/31/2016 8:25:35 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 100 | View Replies]

To: BenLurkin

I’m Barack Obama and I approved this message.


118 posted on 03/31/2016 8:33:31 PM PDT by ameribbean expat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Cryptography is covered by United States laws on national security and the import and export of weapons of war. Since Dec 7, 1941 if you violate these laws you've pretty much surrendered your constitutional rights. Read the following:

http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/united-states-cryptography-export-import.htm

and follow the links even deeper if you like. Numerous people have spent a great deal of time in prison for violating these copyright/patent/import and export laws.

All of your numbers of possible combinations and permutations for the AES-256 bit encryption assume a brute force attack. This paper published 22 years ago was "authorized" (ie allowd to be published from worked researched years earlier) and presents mathematical attacks on block ( and stream ) cyphers which significantly reduce the complexity in both time and space of a brute force attack. I am sure that world class mathematicians employeed by numerous .govs around the world have even more tricks up their sleeves. US laws regarding encryption do not protect you from those people who have the brains and resources to attack these cyphers with better methods than brute force only from those who don't have the requisite resources.

This paper is from Canada. I assume the pdf is free of adobe "back doors". (LOL)

Linear differential cryptanalysis

The first casualty of war is truth! Loose lips sink ships! Believe half of what you see and none of what you hear! etc.

119 posted on 03/31/2016 8:33:37 PM PDT by lurked_for_a_decade (Imagination is more important than knowledge! ( e_uid == 0 ) != ( e_uid = 0 ). Read source code!)
[ Post Reply | Private Reply | To 111 | View Replies]

To: Swordmaker
👍
120 posted on 03/31/2016 8:39:14 PM PDT by Gator113 (~~Go Trump, GO!!~~ Just livin' life my way. Don't worry, everything's gonna be alright. 👍)
[ Post Reply | Private Reply | To 110 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 161-169 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson