Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Trump Says Apple Should Hack San Bernardino Attacker Phone
ABC News ^ | 2/17/2016 | Ryan Struyk

Posted on 02/17/2016 8:49:09 AM PST by pgyanke

Republican presidential front-runner Donald Trump bashed the tech company Apple today for refusing to help investigators access the iPhone of a San Bernardino attacker.

"I agree 100 percent with the courts," he said on "Fox and Friends" this morning. "In that case, we should open it up."

"To think that Apple won't allow us to get into her cell phone -- who do they think they are?" Trump said. "No, we have to open it up."

(Excerpt) Read more at abcnews.go.com ...


TOPICS: Business/Economy; Computers/Internet; Miscellaneous
KEYWORDS: 2016election; apple; california; election2016; newyork; sanbernadino; sanbernardino; trump; waronterror
Navigation: use the links below to view more comments.
first previous 1-20 ... 161-180181-200201-220221-226 next last
To: kabar

Those devices are also used by us. Some who work in government (civilian and military), and for defense contractors, banks, pharmaceutical companies, utility companies etc..

You want them compromised too?

It’s a double edged sword. Kinda like the 2A. Bad people do bad things with guns. Let’s let government control them all.


201 posted on 02/17/2016 2:43:26 PM PST by AFreeBird
[ Post Reply | Private Reply | To 197 | View Replies]

To: pgyanke

http://www.freerepublic.com/focus/news/3386607/posts?page=56#56

Link to the short transcript I posted.


202 posted on 02/17/2016 2:53:34 PM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 1 | View Replies]

To: pgyanke
I do not agree with Mr. Trump on this.

In fact he has disappointed me over the last week on a couple very key points. It gives me cause for concern that he supports restrictions on gun ownership. That he used the language of the left to single out "assault weapons" is not good. My AR does not have a auto selector switch. It is semi auto. I don't appreciate anyone thinking it's ok to outlaw my right to own such.

Now with this Supreme Court nominee concerns I am also concerned. I don't want to guess whether the next president will nominate Constitutional constructionists. With Mr. Cruz I don't have that worry. Trump has not convinced me he will do right by conservatives with SC nominations.

203 posted on 02/17/2016 3:02:10 PM PST by Kudsman (Restore the Republic. Repeal the 17th.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AFreeBird
It is not a zero sum game. I am sure that if Apple really wanted to access the information, they could and still protect their product. We are talking abut the information on one phone--one phone period.

It is clearly a national security issue. We know who the phone belonged to and what they did, i.e., they killed 14 Americans and wounded 30 others. Did they act alone? Were they part of a terror network? Are other attacks planned? This is not about privacy. It is about gathering intelligence data from known terrorists. Again, a sad commentary on how low we have sunk as a nation.

204 posted on 02/17/2016 3:05:27 PM PST by kabar
[ Post Reply | Private Reply | To 201 | View Replies]

To: AFreeBird

It’s extremely impressive. I actually did understand most of it but it’s is impressive none the less. I’d bet confidently that this security is far more than any other company has in their devices.


205 posted on 02/17/2016 3:07:44 PM PST by SWAMP-C1PHER (HOMO, OECONOMIA, ET CIVITAS.)
[ Post Reply | Private Reply | To 182 | View Replies]

To: kabar

No it’s about government creep. One that cat is out of the bag, the FedGov can compromise any cell phone’s security, it opens the door to widespread abuse in the name of accusation. Government gaining access to people’s private communications can not be spun in any positive light IMO.


206 posted on 02/17/2016 3:14:40 PM PST by Kudsman (Restore the Republic. Repeal the 17th.)
[ Post Reply | Private Reply | To 204 | View Replies]

To: pgyanke
The FBI should just bring in a bunch of psychics.
207 posted on 02/17/2016 3:22:38 PM PST by jetson
[ Post Reply | Private Reply | To 1 | View Replies]

To: kabar

That’s just it. Apple has said even they can’t access it, even if they wanted to. That’s the whole point of this kind of security. Apple doesn’t want to know your data.

The whole wide world, companies and governments, criminals alike, want access to your data, it’s become easier to do than ever before, and here’s a company who thought that was a bad idea, doesn’t want your data, and has taken steps to assure you that your data is safe, even if you lose you phone.

How refreshing.


208 posted on 02/17/2016 3:24:33 PM PST by AFreeBird
[ Post Reply | Private Reply | To 204 | View Replies]

To: Sgt_Schultze

It’s sad that no one seems to be paying attention to your post, because it explains why this is such a terrible request by the government (and everyone will tell you I am NOT a fan of Apple... just ask Swordmaker).

First, the government is ordering Apple to create a product. They are not ordering Apple to disclose information (which is what a search warrant is for). They are ordering Apple to create a new version of IOS for them. This is pretty close to involuntary servitude here. The government can order you to disclose your passwords for your safe, but it cannot order you to build a new safe with no lock and then move your papers into them (much less someone else’s papers!).

Secondly, there is no “compromise” that sees Apple do the breaking themselves. That would destroy the chain of custody, and any information gained would never stand up in court. The government wants Apple to create a new IOS that will let the government do the brute-force hacking. The phone with the new IOS will be in their possession by design. The government can no more order Apple to break into the phone than they can order me to break into my neighbor’s house because I installed his front door. That’s completely absurd and illegal.

Third, once they get the phone, the government will have the firmware necessary to hack any phone. No matter what Apple does to try to limit the scope of the firmware, the government will be able to reverse-engineer the methods from this phone. Period.

The fools who are throwing around hyperbole about “American blood, etc.” are more dangerous to American liberty than the terrorists. The terrorists just want to kill us. The idiots who want to give government unconstitutional power because it’s a “WAHHHHR!!!!” are happy to enslave us to unconstrained government. The fact that they are well-meaning in their stupidity doesn’t make them less stupid...


209 posted on 02/17/2016 4:12:10 PM PST by Charles H. (The_r0nin) (Hwaet! Lar bith maest hord, sothlice!)
[ Post Reply | Private Reply | To 33 | View Replies]

To: kabar
It is one thing to disagree about something in theory, it is another to be faced with the reality that we cannot access critical intelligence information on a terrorist’s phone because a corporation refuses to cooperate with the government. Where do you draw the line and who draws it?

I draw the line at the government ordering a person or company to design new software for the government's use. You want passwords, I'll give them to you with a warrant. You want to force my labor, to make me create a piece of software that doesn't exist (a new IOS with no password safeguards) in order to help you get into a phone that ISN'T MINE (because it is the property of the person I sold it to), then you are coming close to government ordered involuntary servitude. And that's not legitimate.

You can't be against Obamacare (the forcing of a person to spend his money on a product/service) and for this (the forcing of a company to create software for the government's use). It's the same principle.

210 posted on 02/17/2016 4:19:03 PM PST by Charles H. (The_r0nin) (Hwaet! Lar bith maest hord, sothlice!)
[ Post Reply | Private Reply | To 199 | View Replies]

To: kabar
So it is reasonable for the American people to expect some reciprocity from these immense corporate entities that were born in the U.S. and rose to their economic prowess on the backs of American workers. The bosses of these companies believe they can have it both ways – getting all the benefits of their native country while shipping whole industries and jobs to communist and fascist regimes abroad that keep their workers in serf-like conditions.

Your Ralph Nader quote above is off topic. Nice try, though.

211 posted on 02/17/2016 4:20:27 PM PST by pgyanke (Republicans get in trouble when not living up to their principles. Democrats... when they do.)
[ Post Reply | Private Reply | To 196 | View Replies]

To: Charles H. (The_r0nin)

Excellent post. Thank you.


212 posted on 02/17/2016 4:23:46 PM PST by pgyanke (Republicans get in trouble when not living up to their principles. Democrats... when they do.)
[ Post Reply | Private Reply | To 209 | View Replies]

To: Wolfie

They’re protecting the privacy of anyone who owns one of their products, the vast majority of whom are doing nothing illegal.


213 posted on 02/17/2016 5:42:58 PM PST by Coronal
[ Post Reply | Private Reply | To 4 | View Replies]

To: heights

Or not.


214 posted on 02/17/2016 5:46:00 PM PST by Coronal
[ Post Reply | Private Reply | To 30 | View Replies]

To: Charles H. (The_r0nin)

Yeah, I’m not really competent to assess the difficulty of complying with the government request. But you’re sure as shoot right they have no business ordering Apple to create a customized version of their operating system to benefit the government.


215 posted on 02/17/2016 7:13:44 PM PST by Sgt_Schultze (If a border fence isn't effective, why is there a border fence around the White House?)
[ Post Reply | Private Reply | To 209 | View Replies]

To: pgyanke

Hasn’t Apple opened phone data dozens of times before to cooperate with law enforcement?


216 posted on 02/17/2016 8:08:05 PM PST by doug from upland (Some of you keep telling yourself -- Romney would have been as bad or worse.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pgyanke

SCENARIO: The location of a chemical attack in a U.S. government building in on a captured I-Phone. The attack is expected tomorrow. What does Apple do?


217 posted on 02/17/2016 8:10:26 PM PST by doug from upland (Some of you keep telling yourself -- Romney would have been as bad or worse.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: doug from upland
Hasn’t Apple opened phone data dozens of times before to cooperate with law enforcement?

Probably... but that was before iOS8 when they held the encryption key. With the last two iOS releases, Apple has opted for customer privacy and security from hackers. They don't have the key and are as locked-out as the rest of us.

218 posted on 02/17/2016 8:14:58 PM PST by pgyanke (Republicans get in trouble when not living up to their principles. Democrats... when they do.)
[ Post Reply | Private Reply | To 216 | View Replies]

To: dirtboy

It doesn’t make sense to put one in, because what one person puts in, someone else can find. You can’t create a weak spot in a security system and be sure that nobody else will exploit it.


219 posted on 02/17/2016 9:08:53 PM PST by Coronal
[ Post Reply | Private Reply | To 54 | View Replies]

To: pgyanke
Sounds like he is talking about Apple.

,,,, getting all the benefits of their native country while shipping whole industries and jobs to communist and fascist regimes abroad that keep their workers in serf-like conditions.

220 posted on 02/17/2016 9:37:51 PM PST by kabar
[ Post Reply | Private Reply | To 211 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 161-180181-200201-220221-226 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson