Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: RIghtwardHo

I totally agree. I think Rush Limbaugh still has his comments up at his website. Rush wrote a lengthy article about the problem, and what the owner of the phone should have done to program and protect the phone; allowing only the owner of the phone to have that access.

It seems the U.S. GOVERNMENT OFFICE where the terrorists worked .. TA-DA .. issued the terrorists the phone. As the owner of the phone, the U.S. Govt Office was required to use the MDM software and program the phone for the employee. This phone was not a personal phone owned by the terrorists. It was a COMPANY PHONE OWNED BY THE GOVERNMENT DEPT where the terrorists work.

Therefore, Apple is not required to program their phone for them; and Apple should not be required to design a special program to allow them to have access to the phone - which special program could allow the FBI to have access - TO EVERY IPHONE.

Now, do you see the problem ??

The ignorant Obama regime did not do their job, and because of their incompetence, they have now lost access to the phone and they’re trying to make Apple FIX it for them.

I know it probably contains terrorist info. But, if you want to find out about terrorist info - just contact the local Sheriff’s office because they have a lot of contacts regarding terrorists in that area - info involving a death, December 2014, possibly terrorist related.


36 posted on 02/27/2016 8:51:09 PM PST by CyberAnt ("Peace Through Strength")
[ Post Reply | Private Reply | To 2 | View Replies ]


To: CyberAnt
I know it probably contains terrorist info. But, if you want to find out about terrorist info - just contact the local Sheriff’s office because they have a lot of contacts regarding terrorists in that area - info involving a death, December 2014, possibly terrorist related.

Actually, it most likely does NOT contain any terrorist info.

Why do I say that? Simple. It was a work phone. The FBI has already gotten all phone call, email, message, and other meta data from Verizon. They know that all the phone calls made on the iPhone were work related except for a few during work to and from his monster wife's known personal phone. Same with messages and emails. The found the same for the iCloud data they were able to retrieve from 45 days before. All innocuous. These two monsters were well organized and compartmentalized and had BURNER Android phones for which the FBI does not even know the phone numbers, much less the call data. Those were the phones they used for terrorist business. Those phones, along with their computers, with their removed hard drives, were SMASHED to smithereens and tossed in a lake in the hours after the attack before the two were surrounded and shot down. THIS phone was not. Why not?

Two or three possibilities.

In any case, I really doubt there's anything of a probative nature on that phone.

44 posted on 02/27/2016 10:26:51 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 36 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson