Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI director: We bought 'a tool' to hack terrorist's iPhone (Flash (Ugh) Video)
CNN Money ^ | April 7, 2016 | by Lorenzo Ferrigno and Charles Riley

Posted on 04/07/2016 9:23:59 AM PDT by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 next last
To: Swordmaker

Personal I think they had it hacked all along. The FBI just wanted to make it appear they could not get in while they ran down all the leads in the intel.


21 posted on 04/07/2016 9:51:09 AM PDT by usurper (Liberals GET OFF MY LAWN)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PGR88
They asked the Chinese Government for help.

It was an Israeli company named Cellebrite owned by a Japanese company names Sun Industries.

22 posted on 04/07/2016 9:52:37 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Cementjungle
They'll have to buy all the separate options of the tool (slight modifications needed for each) to handle each version of iOS and phone... for another $10 million per version.

I just watched the instruction videos on the tool that Cellebrite makes to do the unlocking, UDEF Touch, and what you claim is patently false. The tool is universal for all the mobile devices they can open. . . Quit making up "facturds" you pull out of your nether regions, CJ. You don't have a clue what you are talking about and are making it up.

23 posted on 04/07/2016 9:59:41 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker
Did it look anything like this?:

Or did the FBI buy it from these guys?


24 posted on 04/07/2016 9:59:53 AM PDT by DCBryan1 (No realli, moose bytes can be quite nasti!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: usurper

An interesting scenario. Maybe also Apple’s public protestations were also part of the public ruse you posit, and they actually did help to hack the phone, but worked a deal with the FBI to go with this cover story so that they would display a public face of “customer concern”.

We’ll probably never know the answer to that. At least not for 50 years or so when the files may be declassified and available under FOIA.


25 posted on 04/07/2016 10:02:26 AM PDT by FourtySeven (47)
[ Post Reply | Private Reply | To 21 | View Replies]

To: Swordmaker

I’m sure they do a lot of work for Mossad.


26 posted on 04/07/2016 10:02:44 AM PDT by batterycommander
[ Post Reply | Private Reply | To 22 | View Replies]

To: Swordmaker
I love the 'unbiased' wording in this article...

Apple (AAPL, Tech30) declined to assist, saying that to do so would compromise the security of all iPhone users.

I'm pretty sure that both the FBI and Apple have directly said that a team of engineers was working with the FBI to come up with a solution. I'm also pretty sure that both have said that it was Apple who came up with discovery of the hole in the security that would permit loading a signed version of the OS, even on a locked phone, which would not wipe the phone.

What they declined to do was create a new version of the OS and digitally sign it.

So you might say this was a self inflicted wound; here's a way to do it, maybe, and due to the digital signature, we're the only ones in the world who can do it, but good luck getting approval.

I'm pretty sure it took, what, two or three hours before the suggestion was made here on FreeRepublic of the likely method used by the FBI and an outside company to copy off the data and eventually hack it.

Heck, McAfee was rather open in his offer to do it.

So, really, if I was a reporter inclined to characterize months of a dozen or more employees working directly with the FBI as 'declined to assist', why hasn't the obvious question been asked - Did Apple suggest using the method that you eventually paid another party to have done?

If they're going to continue with the narrative of a company which refused to help, I guess asking that question wouldn't further the narrative. It is a near certainty that they explicitly outlined the entire procedure from start to finish for how it could be done with the caveat that there is a chance, if something goes wrong, of corrupting the data. Whereas the software method wouldn't have that chance.

Why do I say that? Because the FBI hasn't arrested those engineers and filed charges against Apple for conspiracy to impede a federal investigation.

27 posted on 04/07/2016 10:05:58 AM PDT by kingu (Everything starts with slashing the size and scope of the federal government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
the government has purchased, from a private party, a way to get into that phone

Capitalism still works.

28 posted on 04/07/2016 10:08:19 AM PDT by libertylover (The problem with Obama is not that his skin is too black, it's that his ideas are too RED.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

And I’m sure terrorists who use their phone are going to continue using iphones, rather than the burners you can get for $5 on the streets of Berlin, for their activities.


29 posted on 04/07/2016 10:09:26 AM PDT by Organic Panic
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ruy Dias de Bivar
Alright, they have been shooting off their mouths about getting in the phone’s backdoor. Now, WHAT DID THEY FIND!

They already knew that every phone number, every message, and every email, sent or received by that iPhone 5C, except for a few calls from Farouk's monster wife, were work related. I maintain that what they found when they got into it is that it contained only work related content. They got these data from the carrier, Verizon, who was required by law to keep a record of every thing that went into and out of that device. They also had a 45 day old iCloud back up that matched the record from Verizon.

Both Farouk and his Monster Wife Malik had obtained inexpensive off-the-shelf burner Android burner phones—which the ISIS and Al Qaida terrorists websites both recommend be purchased for any terrorism activities—which can be provisioned with an anonymous phone number and minutes without a contract merely by purchasing off-the-shelf cards which are untraceable and un-tappable because no law enforcement agency is going to know the terrorist even has them. These burner phones were destroyed by the simple expediency of smashing them with a hammer into unreadable and unrecoverable shards before they left to do their evil deed. They also destroyed both of their laptops by the same means, taking the time to remove the hard drives from the laptops and smashing them separately.

Farouk did not smash his employment provided iPhone 5C because he never used it for any terrorism related activity. Ergo, the FBI found nothing probative or useful on the device.

30 posted on 04/07/2016 10:12:55 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 20 | View Replies]

To: ltc8k6
Cellebrite can likely crack the latest phones, if you pay for them to do so.

Highly doubtful. As late as November, The Hacking Team, a European forensic company, was offering a $1 million bounty for a hack that would break the Secure Enclave of the iPhone 5S and later. It went unclaimed.

(No, before someone asserts I am wrong, the $1 million bounty that WAS claimed in October was for a remote JAILBREAK of an already unlocked iPhone running iOS 9, which is NOT the same bounty for unlocking an LOCKED iPhone. Apple closed that vulnerability three weeks after the bounty was awarded to a team of hackers.)

Were it possible to unlock later iOS devices with such ease, there would NOT be hundreds of iOS devices stored in evidence lockers around the world waiting for such a tool. These Forensic IT companies are in the business of making money by unlocking mobile devices. . . they'd be unlocked.

31 posted on 04/07/2016 10:22:00 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 14 | View Replies]

To: FlingWingFlyer
It looks as though Apple had already been “backdoor”. Probably more than once.

Why do you say that? This article says exactly the opposite.

The vast majority of iPhones, the iPhone 5S, 6, 6 Plus, 6S, and 6S plus which now comprise approximately 450 million iPhones combined are NOT susceptible to the hack that the FBI claimed opened the iPhone 5 and 5C. . . which maybe represent approximately 100 million devices. The other iPhones such as the iPhone 4S and lower, an estimated 200 million still in circulation, were always openable.

32 posted on 04/07/2016 10:26:47 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker

Apple pwned


33 posted on 04/07/2016 10:28:46 AM PDT by bigbob
[ Post Reply | Private Reply | To 1 | View Replies]

To: kingu
Heck, McAfee was rather open in his offer to do it.

McAfee's approach was firmly anchored in the 1980s. . . he did not have a clue of what he was talking about.

34 posted on 04/07/2016 10:30:16 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Vic S
"'Is this even legal? Are we supposed to think that the FBI will only use it for good, now that they have it?"

All your informations belong to us!

Ah, the post 9/11 world. Privacy versus security. Does old Ben's supposed phrase apply?:

"Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety."

35 posted on 04/07/2016 10:34:23 AM PDT by buckalfa (I am feeling much better now.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Swordmaker
I just watched the instruction videos on the tool that Cellebrite makes to do the unlocking, UDEF Touch, and what you claim is patently false. The tool is universal for all the mobile devices they can open. . . Quit making up "facturds" you pull out of your nether regions, CJ. You don't have a clue what you are talking about and are making it up.

What of what I said are you claiming is false? The article says the FBI claims the tool only works on one specific version of the phone. Are you saying they're lying (always possible)?

I was only repeating what the FBI says and adding my own comment that the vendor of the "tool" will likely charge big bucks for the other versions (seeing as its the government and you can change big fees for things).

You saw some video on the Internet so that makes you the expert in the subject?

36 posted on 04/07/2016 10:34:26 AM PDT by Cementjungle
[ Post Reply | Private Reply | To 23 | View Replies]

To: Swordmaker

Everything gets cracked and hacked eventually.

Nothing remains secure.


37 posted on 04/07/2016 11:07:57 AM PDT by ltc8k6
[ Post Reply | Private Reply | To 31 | View Replies]

To: kingu
Why do I say that? Because the FBI hasn't arrested those engineers and filed charges against Apple for conspiracy to impede a federal investigation.

Apple and their engineers have no duty to assist the FBI in their investigation. There is no law that compels them to do so. None. Not the All Writs Act or even a Search Warrant can do that. That was what the hearing was going to be all about. Apple won the hearing on that issue in New York before a Federal Magistrate Judge on that very issue. The Federal Government has no authority to compel anyone third party to comply with such a writ.

38 posted on 04/07/2016 11:10:20 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 27 | View Replies]

To: bigbob
Apple owned

Did you bother to read the article? The Director of the FBI stated that the system they used to unlock the iPhone in question will not work on the latest iPhones which include the iPhone 5S and later. Those all have the Secure Enclave. How does that translate to "Apple pwned?" It means that Apple increased their security three years ago and the hackers can't get in. WAKE UP AND READ THE ARTICLE BEFORE YOU COMMENT!

39 posted on 04/07/2016 11:16:27 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Swordmaker

From what I’ve read, the FBI may not allow the tool to be used in any case which might go to court. If so, it’s going to be even less useful than it seems.


40 posted on 04/07/2016 11:23:53 AM PDT by Coronal
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson