Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Investigators sought to use Michael Cohen’s face and fingerprints to access Apple devices
CNBC ^ | March 19, 2019 | Lauren Feiner

Posted on 03/19/2019 11:28:23 PM PDT by Swordmaker

Investigators asked for court permission to use Michael Cohen’s Face ID and fingerprints to access Apple devices belonging to the president’s former fixer and personal attorney, newly released warrant documents show.

Apple has historically resisted providing a backdoor to law enforcement, including in the investigation of the 2015 shooting massacre in San Bernardino, California, when the FBI asked the company to help it unlock an iPhone belonging to the shooter.

At the time, Apple CEO Tim Cook argued that if it were required to unlock the suspect’s phone, the government “would have the power to reach into anyone’s device to capture their data.”

The request in Cohen’s case differs, however, in that it would not require Apple to step in for authorities to access the contents of his devices. Apple declined to comment on the warrant documents.

(Excerpt) Read more at cnbc.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Government; News/Current Events
KEYWORDS: applepinglist; fbidoj; jamescomey; lisapage; peterstrzok; privacy; robertmueller; trump
Navigation: use the links below to view more comments.
first 1-2021-37 next last
Incidentally, this is proof that the Apple iPhones and iPads are no longer susceptible to the Cellebrite and GrayKey hacking. . . otherwise the FBI wouldn’t need court permission to force Cohen’s participation in unlocking his own Apple devices. Had those means still worked, they’d just have unlocked them using one of those technologies.
1 posted on 03/19/2019 11:28:23 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
FBI rebuffed by court in request to force Michael Cohen to unlock his Apple iPhone and iPad using his fingers or face. —PING!


Apple Device Privacy V. FBI/DOJ Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 03/19/2019 11:33:47 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Not necessarily. The FBI’s internal policies may limit the use of hacking to certain cases like terrorism and national security or only after all other methods have been exhausted.


3 posted on 03/19/2019 11:36:58 PM PDT by Rockingham
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker; AdmSmith; AnonymousConservative; Arthur Wildfire! March; Berosus; Bockscar; ...
Thanks Swordmaker.

4 posted on 03/19/2019 11:37:11 PM PDT by SunkenCiv (this tagline space is now available)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker
Of course, back when Cellebrite and Graykey were unlocking iPhones you were absolutely 100% sure that they were unable to do that. Oh well, I guess you must be right this time, 'cuz you're never wrong!  LOL


5 posted on 03/19/2019 11:39:48 PM PDT by Garth Tater (What's mine is mine.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I still eep minimum data on my iPhones X and 5se and when pulled over by law enforcement I turn them OFF so face ID or thumbprints won’t work on initial restart..... pass phrase or 6 digit numerical pin # is a MUST to the best of my knowledge. I haven’t even configured the prints option on either.


6 posted on 03/19/2019 11:46:10 PM PDT by Squantos (Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

why would they need his face/prints if he’s actively cooperating? or did this date back to 2016-7?


7 posted on 03/19/2019 11:57:39 PM PDT by blueplum ("...this moment is your moment: it belongs to you... " President Donald J. Trump, Jan 20, 2017)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rockingham
Not necessarily. The FBI’s internal policies may limit the use of hacking to certain cases like terrorism and national security or only after all other methods have been exhausted.

Oh BS! The FBI and police departments around the country bought the GrayBox devices from GrayKey by the dozens and were going through the thousands of iPhones they had in evidence. The FBI made an announcement they could now use normal search warrants to unlock iPhones without worrying about erasing the devices or getting around fingerprint and FaceID due to their acquisition of this new technology.

Apple announced they had closed the vulnerability a couple of updates ago. This is proof those $15,000 boxes are only good for the iPhones/iPads already in the evidence lockers.

8 posted on 03/20/2019 12:00:06 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

That sounds about right as to cop world work arounds. Still, I suspect that the FBI has formal policies along the lines indicated and they profess to follow them.


9 posted on 03/20/2019 12:06:27 AM PDT by Rockingham
[ Post Reply | Private Reply | To 8 | View Replies]

To: Squantos

Good tip about turning off the phone to force manual entry on restart!

Now I just need to undo that saved password for www.icloud.com in mac Safari.


10 posted on 03/20/2019 12:46:14 AM PDT by BTerclinger (MAGA)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker; Squantos

Swordmaker:

Can you confirm, does turning off later model iPhones w facial ID indeed require typing password after restart/before reenabling facial ID (like it does for older with fingerprint ID)?


11 posted on 03/20/2019 12:53:56 AM PDT by BTerclinger (MAGA)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Swordmaker

“Apple has previously declined to provide a backdoor into its devices for law enforcement, including in the investigation of the 2015 shooting massacre in San Bernardino, California.”

I recall it being a bit more complex than that. Apple offered to unlock the terrorists’ phones for the FBI and hand over the data but the FBI wanted the technology to unlock ‘all the phones’ and Apple balked.


12 posted on 03/20/2019 1:01:22 AM PDT by ArtDodger
[ Post Reply | Private Reply | To 1 | View Replies]

To: BTerclinger
Can you confirm, does turning off later model iPhones w facial ID indeed require typing password after restart/before reenabling facial ID (like it does for older with fingerprint ID)?

Passcode is required after any restart, whether cold or warm.

I recommend using a complex alphanumeric passcode of at least seven characters including a symbol. Since there are 223 characters including symbols one can utilize on an iPhone that means there are approximately 27,424,200,000,000,000 possible passcodes. Even if GrayKey or Cellebrite were to find another vulnerability to exploit, the physical time limitations built-in to the Apple Devices would require more than 800 million years to try all of them by brute force.

13 posted on 03/20/2019 1:21:03 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: blueplum
why would they need his face/prints if he’s actively cooperating? or did this date back to 2016-7?

They wouldn't.

Apple and their deep state friends put this story out to make folks think the things are actually secure.

14 posted on 03/20/2019 1:30:22 AM PDT by Cementjungle
[ Post Reply | Private Reply | To 7 | View Replies]

To: Garth Tater
Of course, back when Cellebrite and Graykey were unlocking iPhones you were absolutely 100% sure that they were unable to do that. Oh well, I guess you must be right this time, 'cuz you're never wrong! LOL

They were not cheap to use $30,000 for a GrayKey machine and unlimited unlocking license, or $15,000 and a ten device license with more license with ad hoc pricing. . . and the vulnerability the found to exploit lasted less than four months. Apple closed it quite quickly. Cellebrite’s Unlocking only worked on older iPhones.

Used GreyKey devices were being dumped on eBay for under $400 until GrayKey put a stop to it as a violation of the sellers’ licensing agreements because they had agreed they could not be resold.

15 posted on 03/20/2019 1:34:01 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker
the physical time limitations built-in to the Apple Devices would require more than 800 million years to try all of them by brute force.

Does that extraordinary amount of time depend on available computing power?

16 posted on 03/20/2019 2:37:18 AM PDT by wastedyears (The left would kill every single one of us and our families if they knew they could get away with it)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Cementjungle

I don’t think he was cooperating at first?


17 posted on 03/20/2019 3:14:45 AM PDT by PghBaldy (12/14 - 930am -rampage begins... 12/15 - 1030am - Obama's advance team scouts photo-op locations.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Swordmaker

“Incidentally, this is proof that the Apple iPhones and iPads are no longer susceptible to the Cellebrite and GrayKey hacking. . . otherwise the FBI wouldn’t need court permission to force Cohen’s participation in unlocking his own Apple devices.”

Whoa, not so fast there... it does not state that FBI was seeking court permission to force Cohen’s personal participation anywhere. It only states that the FBI sought to use Cohen’s face and fingerprints, which the FBI would have from Cohen during the arrest/arraignment process. This implies (to me anyway) that they would not need to force Cohen’s personal participation to access the iphone data behind the facial recognition and/or fingerprint lock. Personally I think the best way to defeat big brother is to keep as little info on cell phones as possible, allow the phones to lapse into blocked access mode or turn them off whenever possible, and never volunteer any info to police if asked, always politely deferring all questions to one’s lawyer including the all important cell phone unlock code that police always want to know right from the start of a “detention.” For ordinary folks, police can and do regularly lie to them to obtain information, which they can then keep forever if they get it, even without any arrest or formal charges. That’s *your* personal private information, if you are so unfortunate as to attract their attention and get in their path. When the police lie, they will tell you literally anything to get your personal info which they can then use for anything they want, without a warrant...


18 posted on 03/20/2019 4:16:04 AM PDT by SteveH
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
require more than 800 million years to try all of them by brute force.
. . . but of course with any luck at all you’d hit the right combo in half that time. So there’ that . . .

19 posted on 03/20/2019 5:30:42 AM PDT by conservatism_IS_compassion (Socialism is cynicism directed towards society and - correspondingly - naivete towards government.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker

Thank you.


20 posted on 03/20/2019 9:03:15 AM PDT by BTerclinger (MAGA)
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-37 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson