Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apple unlocked at least 70 iPhones before refusing to hack into terrorist’s device
ny daily news ^ | 18 Feb 2016 | MEG WAGNER

Posted on 02/18/2016 11:59:30 AM PST by DUMBGRUNT

The California-based tech giant unlocked dozens of iPhones at federal investigators’ requests between 2008 and 2015, a prosecutor argued last year.

(Excerpt) Read more at nydailynews.com ...


TOPICS: Business/Economy; Crime/Corruption; Government; News/Current Events; US: California; War on Terror
KEYWORDS: 70equalszero; apple; bettercallchloe; california; chloe; doyoubelieveinmagic; iwanttobelieve; notnewphones; oldphones; sanbernadino; sanbernardino; xfiles
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 261-269 next last
To: Cyman

Most of the good lines have already been used, only 26 letters and hundreds of years?

Everybody knows it is good to recycle!
So I did.


101 posted on 02/18/2016 1:30:58 PM PST by DUMBGRUNT (Looks like it's pretty hairy.)
[ Post Reply | Private Reply | To 57 | View Replies]

To: DiogenesLamp

Any software installed on an iPhone has to have an Apple key on it. The FBI can’t do what it wants to do here on their own.


102 posted on 02/18/2016 1:31:24 PM PST by Coronal
[ Post Reply | Private Reply | To 77 | View Replies]

To: Coronal
Unless you can point to a case in which Apple did the exact same thing that the FBI is requesting now, you can't draw a valid parallel.

Unless you can demonstrate that the 70 other phones they unlocked were all unlocked with the EXACT SAME PROCESS, then *YOU* can't demonstrate a parallel.

"The exact same thing" is not a requirement. The salient point is the fact that Apple achieved the legally requested result through whatever process they deemed viable to accomplish it.

103 posted on 02/18/2016 1:33:51 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 83 | View Replies]

To: DiogenesLamp

I look at this a completely different way. When you are looking for a rats nest, you follow the rat home. I think its very possible, that they already have all the information from the phone, know how to get it from all active users, and all they have to do, is get close to an open phone, not turned off, and they can clone the contents by just getting close to the turned on phone.

I think that APPLE is helping create a false flag. The bad guys think that Apple will not help the govt, so go on their way, fat dumb and happy, all the while we are gathering intel.

Apple gets a good name for defending the small guy, the bad guys are giving up info without knowing it, and everybody wins.

The last thing the govt wants the bad guys to know is that they figured out how and are actively accumulating data. I think everybody forgets that when your IPhone is open and in use, your data can be captured by another phone, and duplicated. Its only when the phone is turned off, that you cannot remotely access data.

Phones can be turned on remotely as well. Law enforcement does this regularly to locate people with cell phones.

I hesitated to write this and read all the posts in this thread to see if anyone had thought of this, and did not see anything like it.


104 posted on 02/18/2016 1:34:31 PM PST by Rustybucket
[ Post Reply | Private Reply | To 90 | View Replies]

To: DiogenesLamp

“Or the government is trying to bully Apple in the Court of Public Opinion to allow them a backdoor into all Apple phones, although they already have all the information they need.”

Horse puckey.

In an unusually detailed directive, Magistrate Judge Sheri Pym of the Federal District Court for the District of Central California ordered Apple to provide reasonable technical assistance to the F.B.I. in unlocking the phone. That assistance should allow investigators to bypass or erase the auto-erase function on the phone, among other steps, she wrote.

This is as specific a request as you could probably ask for and completely in line with the 4th amendment.

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

If it is Apples position that they will not comply, the law then pursues whatever course they see as necessary. This isn’t about what Apple can or won’t do, anymore than if I am home and don’t want them to come into my house. I can fight or comply. That’s MY choice, but to say Apple has a right not to comply is just wrong. Saying “I don’t have it” does not costitute proof that you do not. And even if you do not, as a coporate citizen and member of society, asked to help track down mass murderers, why would you NOT do it?

Something seriously wrong with that. Unless it’s an ad to guarantee big sale in the Jihadi and Cartel business. Which Apple may want o capture. Cartels alone have more people than some countires.


105 posted on 02/18/2016 1:35:07 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 99 | View Replies]

To: BeauBo
We have the precedent of the FISA Court issuing blanket search warrants, which covered the entire population, one 90 day period after another.

Then your argument is that our legal system has broken down, not that Apple should refuse to comply with it.

If you are making the argument that our legal system has broken down, then you will find me to be a receptive listener.

If you are making the argument that Apple should be above the law, then you will find me uninterested in your assertion.

106 posted on 02/18/2016 1:37:10 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 93 | View Replies]

To: DiogenesLamp

I don’t believe my other words are misleading.

In order to comply, Apple must expend its effort in creating something that does not currently exist (per their statements), and which does not alter the actual encryption. Further, if estimates of the time required to break the encryption that I have seen are correct, they must invest significant effort in brute forcing the phone if they wish to not make the stripped down OS directly available to the government.

If, perchance, the patched OS fails and the phone gets wiped, who would be held liable? If Apple is trying to decrypt, and something breaks, and the phone becomes useless, will Apple be blamed and perhaps even prosecuted?

This is not the same as simply applying an existing key, it is the commanded deconstruction of the engineering Apple built in, and commandeering Apple resources for a long-term battle to decrypt.

We disagree, Friend, but I appreciate your arguing in a forthright manner. I hope I have achieved the same.


107 posted on 02/18/2016 1:39:14 PM PST by MortMan (Let's call the push for amnesty what it is: Pedrophilia.)
[ Post Reply | Private Reply | To 78 | View Replies]

To: Ha Ha Thats Very Logical
Apple says it does.

Apple is technically correct if you call changing a couple of lines of code "Creating a New Operating system."

It is a deceitful method of concealing just how easy it is. Saying "create a new operating system" implies horrific levels of difficulty, but the truth is, every time they compile their latest code, they create a "new" operating system.

Once again, Technically correct, but grossly misleading.

What is your assessment of how easy it would be based on?

The fact that the development of software which is capable of counting to number "10" does not normally incorporate complex issues of coding.

108 posted on 02/18/2016 1:41:29 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 94 | View Replies]

C'mon tv shows seem to have some computer whiz kid hacker capable of doing this before the third commercial break. Better call Chloe.
109 posted on 02/18/2016 1:42:34 PM PST by csvset ( Illegitimi non carborundum)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DiogenesLamp
Wrong.

From the article, a link to this article

Apple unlock ruling explained: What you need to know about the court order requiring the tech giant to unlock a terrorist's iPhone - and how it could affect your device

WILL MY IPHONE BE AFFECTED?

While the only iPhone directly impacted by the order is the one that belonged to the terrorist, security and tech experts worry it could create a slippery slope and weaken security for all smartphone users.

The order mandated the software would be used only once - but there's no way to ensure it couldn't be duplicated, possibly by hackers, cybersecurity expert Vanita Pandey told the Daily News Wednesday.

The difference between you and me is that you trust the Government.

110 posted on 02/18/2016 1:43:37 PM PST by IncPen (There is not one single patriot in Washington, DC.)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Coronal
Any software installed on an iPhone has to have an Apple key on it. The FBI can't do what it wants to do here on their own.

Exactly. Apple's assistance is necessary. It cannot reasonably be done any other way.

If Apple wants to be the gate keeper, let them be the gate keeper, but when a Judge tells them to "open the gate" they better D@mn well open the gate!

111 posted on 02/18/2016 1:45:00 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 102 | View Replies]

To: csvset

"We do it the hard way."

112 posted on 02/18/2016 1:45:06 PM PST by dfwgator
[ Post Reply | Private Reply | To 109 | View Replies]

To: The Iceman Cometh
The extra wrinkle is that the phone belonged to the county and was not the perps personal phone.

So why can't the county simply give Apple their permission to open it? Has anyone bothered to ask them?

113 posted on 02/18/2016 1:46:15 PM PST by Cementjungle
[ Post Reply | Private Reply | To 15 | View Replies]

To: Rustybucket
and all they have to do, is get close to an open phone, not turned off, and they can clone the contents by just getting close to the turned on phone.

I do not believe this is true.

I think that APPLE is helping create a false flag.

I DO believe this is true.

114 posted on 02/18/2016 1:47:30 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 104 | View Replies]

To: jessduntno

Yup.


115 posted on 02/18/2016 1:48:38 PM PST by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 105 | View Replies]

To: jessduntno
Ahhh. The ultimate defense for law breakers. What MIGHT happen. Isn't that why black guys run from cops?

Call a Wahhhhbulance. It just isn't fair. They are disobeying a lawful order. The courts will decide. Don't like the Constitution? Get it changed.

You have a condescending stance for someone who doesn't understand the technology.

The FBI is seeking a key that will open not just the phone in question, but all iPhone 5Cs.

You should read up on the NSA snooping, and the things that Edward Snowden had to say about what these assclowns are up to.

116 posted on 02/18/2016 1:48:39 PM PST by IncPen (There is not one single patriot in Washington, DC.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: jessduntno
Oh, well Danny says so, screw the Constitution and the Governments abillity to chase down a mass murderer.

Danny's addressing a technical problem, not a question of Constitutional law. And the mass murderers were chased down hours after their crime, and not by the FBI.

Now we would like to see what was so important to encrypt, who he was talking to and what other mass murderers may be tracked down by accessing THIS phone.

That information resides with the cell carrier as well as within the phone's own encrypted logs. What's stored in the phone is one question. With whom the phone communicated is a whole other question, unprotected by the phone's encryption.

117 posted on 02/18/2016 1:49:31 PM PST by cynwoody
[ Post Reply | Private Reply | To 96 | View Replies]

To: DiogenesLamp
Apple is technically correct if you call changing a couple of lines of code "Creating a New Operating system."

Once again, how do you know that defeating a much-touted, built-in security system requires merely "changing a couple of lines of code"? You seem to have convinced yourself that it only involves the part that counts how many attempts are made, but what's that based on? Have you written any commercial-grade security software?

118 posted on 02/18/2016 1:51:00 PM PST by Ha Ha Thats Very Logical
[ Post Reply | Private Reply | To 108 | View Replies]

To: IncPen

Playing the devil’s advocate here, what’s to prevent Apple from FUBAR’ing the phone, (purely by accident, dontcha know), and just handing the phone back to the FBI , telling them that they couldn’t crack it?


119 posted on 02/18/2016 1:51:07 PM PST by csvset ( Illegitimi non carborundum)
[ Post Reply | Private Reply | To 110 | View Replies]

To: Boogieman

Exactly right! Im litteraly shocked at the total lack of understanding of limited government principles on this board. I had to check the URL to see if I ended up on MSNBC somehow


120 posted on 02/18/2016 1:52:47 PM PST by precisionshootist
[ Post Reply | Private Reply | To 87 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 261-269 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson