Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Forcing Apple to Hack That iPhone Sets a Dangerous Precedent (Link Only due to copyright)
Wired.com (link only) | February 27, 2016 | Congressman Darrell Issa

Posted on 02/27/2016 1:32:08 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last
To: Blue Highway
Darryl Issa is middle eastern? I thought he was Italian.

https://en.wikipedia.org/wiki

Issa, the second of six children, was born in Cleveland, Ohio, to Martha (née Bielfelt) and William Issa, who sold trucks and ground valves.

His father was a Lebanese American of the Maronite Catholic faith and his mother is of German and Bohemian (Czech) descent.

In 2006, he was one of four Arab-American members of Congress.

21 posted on 02/27/2016 2:14:32 PM PST by cloudmountain
[ Post Reply | Private Reply | To 18 | View Replies]

To: dhs12345
How is this different from a judge issued search warrant? The search warrant allows the police to bypass the person’s search and seizure rights.

If the cops think I have evidence of a crime in my possession, they get a warant, they search my home. No problem.

Apple is not involved in a crime.
The criminal is dead.
The cops can search the criminal's home. No problem.

The cops are going to a major corporation and trying to force that corporation to perform an action.

Warrants are not used in that way. Until now.

22 posted on 02/27/2016 2:24:37 PM PST by ClearCase_guy
[ Post Reply | Private Reply | To 20 | View Replies]

To: ClearCase_guy

Might the police hire a locksmith to brake into a residence after the had received a search warrant?


23 posted on 02/27/2016 2:32:50 PM PST by dhs12345
[ Post Reply | Private Reply | To 22 | View Replies]

To: Swordmaker
Btt! This is not about one, random iPhone. It is an intentional ploy to gain access to any phone.

Since San Bernardino County owned the phone, they could have had total control over it. If you are a business right now and you deploy iPhones -- and I'm gonna stick with iPhones in this case 'cause that's what I know, but it's true of any others. If you're a small business, a corporation, and you provide phones for your employees and you own those phones, there is something called Digital Device Management. It is software that allows you to control everything on their phone.

How the Government Bungled the Handling of the San Bernardino iPhone

24 posted on 02/27/2016 2:35:18 PM PST by NYer (Do not store up for yourselves treasures on earth, where moth and rust destroy them. Mt 6:19)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dhs12345
Might the police hire a locksmith to brake into a residence after the had received a search warrant?

Yes.

Should the police have the authority to require the lock manufacturer to produce a master key to their locks when none exists?

25 posted on 02/27/2016 2:55:16 PM PST by Ken H
[ Post Reply | Private Reply | To 23 | View Replies]

To: ClearCase_guy

For some apparently they prefer to give up all of their rights in return for “safety & security”.

We’ll see how it works for them ;)

1 Thessalonians 5:3


26 posted on 02/27/2016 2:58:11 PM PST by Roman_War_Criminal (What to do? Vote for a Dominionist or an Atheist?)
[ Post Reply | Private Reply | To 13 | View Replies]


27 posted on 02/27/2016 3:20:20 PM PST by DoughtyOne (Facing Trump nomination inevitability, folks are now openly trying to help Hillary destroy him.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ken H

No. The solution might be give the phone to Apple and ask them to unlock it.


28 posted on 02/27/2016 3:34:32 PM PST by dhs12345
[ Post Reply | Private Reply | To 25 | View Replies]

To: ClearCase_guy
It’s not hard.

Nope. Not at all.

Posted from my MacBook Pro.

29 posted on 02/27/2016 3:37:05 PM PST by Drew68
[ Post Reply | Private Reply | To 13 | View Replies]

To: dhs12345
Might the police hire a locksmith to brake into a residence after the had received a search warrant?

This analogy fails. Is Apple the criminal? Is Apple being accused of terrorism? Why is your locksmith justified in breaking into Apple, even with a search warrant? Apple has done nothing wrong, so why issue a court order against Apple?

30 posted on 02/27/2016 4:27:45 PM PST by ClearCase_guy
[ Post Reply | Private Reply | To 23 | View Replies]

To: cloudmountain
The post office doesn't give a ticker's damn about letters. Mostly, said letters are just boring.

Never saw the video of postal workers ripping open Christmas cards to take out the money Granny was sending her grandkids huh?

31 posted on 02/27/2016 5:20:41 PM PST by itsahoot (itsahoot)
[ Post Reply | Private Reply | To 14 | View Replies]

To: onedoug
As was code breaking, or similar enterprises during WWII, eh?

In the country against country conflicts it is good to have companies like Apple on our side. People have noted their cooperation with China but that was relatively modest, e.g., http://www.telegraph.co.uk/technology/apple/11364672/Apple-bows-to-Chinese-demand-for-iPhone-security-audit.html There will always be more demands for assurances that there are no remote back doors but there's no way to prevent that when a phone is in use. China will have to accept the risk if they want their citizens to have the best technology.

Some people also bring up the red herring of encrypted comms. Your statement is along those lines. Encrypted end-to-end text is now used by about a billion people worldwide and no country can intercept those. Secure voice is used by 100's of millions with the same result. But there are workarounds even when the channel is encrypted end-to-end, because the end points are never provably secure.

This is a data-at-rest encryption issue. It is also a case of the barn door wide open and the horses long gone. But there are a few fat cows left and phones are one. Here's a horse that left the barn a while ago::

If the dead terrorist had one of these the FBI would have absolutely no recourse. The security used in the product pictured is exactly the same as Apple: constrained passcode input, passcode hash delay, passcode guess counting, AES 256 bulk encryption, protection of the AES key by passcode and HW and deletion of the AES key if guesses exceed some threshold. The only real difference is that the key protection in Apple is tied into the HW UID and the key protection in the device pictured is via epoxy that precludes extracting the memory (can't really fill an iPhone full of epoxy).

But back to the issue of war, specifically cyber war. The iPhone is already a defensive weapon that can be used for defense by either side. The occasional dead terrorist's phone is a triviality compared to that. We know that live device use (and live terrorist device use) has no provable protection against attack, so that is where law enforcement must work. Specifically the FBI must mend the bridge to Apple.

For their part Apple must continue to improve their data-at-rest to completely preclude the data-at-rest attack, because if they don't someone else will. If someone else is a company in China and Apple is crippled by a court or legal mandate that will be very bad. The only legitimate manmade would be legal but hopefully Congress will have learned from the Clipper chip and the export ban fiascos.

32 posted on 02/27/2016 5:30:43 PM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

Yeah, China will blow up any second now because of this....


33 posted on 02/27/2016 7:28:33 PM PST by ChinaGotTheGoodsOnClinton (Go Egypt on 0bama)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I thought ANYTHING a member of congress wrote while in office was open source - no copyright infringement.


34 posted on 02/27/2016 8:38:25 PM PST by Loud Mime (Honor the Commandments because they're not suggestions; stop gambling on forgiveness.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ClearCase_guy

Apple is the locksmith for the phone.

Like the locksmith, Apple would and should help the feds open the phone as long as the feds have followed due process and got a search warrant. Apple could set the number of password retrys to unlimited which is what I heard that the feds asked for. I don’t think that the feds were asking Apple to put a hidden port in their general software release. That, I would be very worried about.


35 posted on 02/27/2016 8:48:06 PM PST by dhs12345
[ Post Reply | Private Reply | To 30 | View Replies]

To: RIghtwardHo

I totally agree. I think Rush Limbaugh still has his comments up at his website. Rush wrote a lengthy article about the problem, and what the owner of the phone should have done to program and protect the phone; allowing only the owner of the phone to have that access.

It seems the U.S. GOVERNMENT OFFICE where the terrorists worked .. TA-DA .. issued the terrorists the phone. As the owner of the phone, the U.S. Govt Office was required to use the MDM software and program the phone for the employee. This phone was not a personal phone owned by the terrorists. It was a COMPANY PHONE OWNED BY THE GOVERNMENT DEPT where the terrorists work.

Therefore, Apple is not required to program their phone for them; and Apple should not be required to design a special program to allow them to have access to the phone - which special program could allow the FBI to have access - TO EVERY IPHONE.

Now, do you see the problem ??

The ignorant Obama regime did not do their job, and because of their incompetence, they have now lost access to the phone and they’re trying to make Apple FIX it for them.

I know it probably contains terrorist info. But, if you want to find out about terrorist info - just contact the local Sheriff’s office because they have a lot of contacts regarding terrorists in that area - info involving a death, December 2014, possibly terrorist related.


36 posted on 02/27/2016 8:51:09 PM PST by CyberAnt ("Peace Through Strength")
[ Post Reply | Private Reply | To 2 | View Replies]

To: olezip
Darrell Issa needs to get better staff help. His assertion that it would set a dangerous precedent is WRONG!

What part of they are ALREADY using it as a PRECEDENT are you stupidly ignoring? Darrell Issa is only slightly wrong, it's not 12 it's now 15 additional "All Writs Act" Court Orders that have been served on Apple citing the San Bernardino Order. . . and there are dozens of other prosecutors who say they have hundreds of others they want opened too.

You are wrong about the OS. The iPhone they are demanding be unlock is running the latest iOS 9.2, the model of the iPhone is just an older iPhone. Every tech person who has looked at it concurs it would result in putting all iPhones at risk. Your conclusion is ignorant and dangerous. You literally do not know what you are talking about.

37 posted on 02/27/2016 8:53:28 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 8 | View Replies]

To: dhs12345
How is this different from a judge issued search warrant? The search warrant allows the police to bypass the person’s search and seizure rights.

I don’t think that they want to embed the software that overrides the encryption on all phones

Apple does not hold any documents for a search warrant to apply. This "All Writs Act" Court Order as more akin to the police showing up at your door, telling you they suspect YOUR neighbor has the bodies of murdered children in his backyard, but they cannot go through his house to get the backhoe in to dig it up because it's the suspected crime scene and cannot be disturbed, and because YOU once owned the next door property, YOU are going to have to do the digging.

And, oh, by-the-way, the only way to get the backhoe in to the neighbor's yard, is to smash right through YOUR house, the house you just spent five years building with your own sweat and hard work. You say "I don't want to! It's not my responsibility. . . that's gonna destroy my house!"

They say, "Here's a "All Writs Act" court order! We're gonna pay you a 'reasonable' hourly rate for your work. What are you complaining about! There's the backhoe! GET TO WORK!"

38 posted on 02/27/2016 9:14:22 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 20 | View Replies]

To: dhs12345
Might the police hire a locksmith to brake into a residence after the had received a search warrant?

No, they would not use a search warrant. They would break down the door if it was locked against them, or they would serve the warrant on the owner, tell him to open the locked door and if he refused, jail him on a contempt of court charge until he complied with the order. But you are referring to people INVOLVED in the crime. Apple is a third party.

If they bring in a third party, which is some times permissible, it will be their normal business to do what is being asked of them, and it does NOT require them to do something extraordinary which in the course of their business they would NOT NORMALLY DO, especially if that compelled act would damage their business while being forced to act for the government's interests.

39 posted on 02/27/2016 9:20:36 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Ken H; dhs12345
Should the police have the authority to require the lock manufacturer to produce a master key to their locks when none exists?

Actually, it would more as if the police went to the police and demanded they INVENT a whole new system to unlock every lock they ever made to the police's specifications and then give it to them.

40 posted on 02/27/2016 9:24:04 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 25 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson