Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

FBI HASN’T FOUND ANYTHING USEFUL ON SAN BERNARDINO SHOOTER’S IPHONE YET
Digital Trends ^ | April 14, 2016 | By Julian Chokkattu

Posted on 04/14/2016 2:13:22 PM PDT by Swordmaker

The FBI’s quest to unlock the San Bernardino shooter’s iPhone 5c and subsequent legal battle with Apple may have amounted to very little, as reports say nothing of real significance has been discovered on the now-unlocked device.

But the FBI is still analyzing the information, a law enforcement source told CBS News.

Related: Apple vs. the FBI: A complete timeline of the war over tech encryption

Apple refused a court order demanding it to create a backdoor into the iPhone, which would have allowed the FBI to access suspected terrorist Syed Farook’ personal information stored within. The Cupertino company said it would threaten the privacy and security of its customers, as the special code used to bypass the iPhone’s security could get into the wrong hands.

But the FBI dropped the case as it was able to access the phone after it paid professional “gray hat” hackers a flat fee to unlock the device. Apple still wants to know how the hackers got past its security, but the company won’t sue the government to find out.

Apple was planning to find the technique through legal discovery in a New York drug related case, but it appears that the technique is under the legal ownership of the hackers the FBI paid, according to Reuters.

We reported earlier this month that the method could be revealed through the Vulnerabilities Equities Process — a White House review group decides whether government-discovered security flaws should be disclosed to companies or the public. But Obama administration sources reportedly told Reuters that the process will likely not apply in the San Bernardino case, as it was a third-party group that discovered the flaw.

FBI Director James Comey said recently the bureau is still deciding if it should disclose the method.

“We tell Apple, then they’re going to fix it, then we’re back where we started from,” Comey said. “We may end up there, we just haven’t decided yet.”


TOPICS:
KEYWORDS: applepinglist; fbi; terrorism
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last
To: subterfuge

In my opinion, this is the key point. Any useful after-the-fact information they might gain from the phone is insignificant compared to what they might have learned before-the-fact from publically available sources.


21 posted on 04/14/2016 2:44:31 PM PDT by Tax-chick ("The world is full of wonder, but you see it only if you look." ~NicknamedBob)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

If I was the FBI /// “That’s my story and I’m sticking to it”

SCREW MSM TRAITORS


22 posted on 04/14/2016 2:46:38 PM PDT by TexasTransplant (Idiocracy used to just be a Movie... Live every day as your last...one day you will be right)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CodeToad

Deleting in itself wouldn’t necessarily get rid of the data. If he did use it to plan the attack, why didn’t he destroy it like they did the other phones?


23 posted on 04/14/2016 2:46:43 PM PDT by Coronal
[ Post Reply | Private Reply | To 13 | View Replies]

To: Sacajaweau

".....plus the bath house kneeler gets us 150 billion dallor"

24 posted on 04/14/2016 2:47:38 PM PDT by Doogle (( USAF.68-73..8th TFW Ubon sThailand..never store a threat you should have eliminated))
[ Post Reply | Private Reply | To 7 | View Replies]

To: CodeToad

Apple never claimed cracking that model of phone running that OS with that feature enabled was impossible. They refused to.
Ditto those of us defending Apple. Didn’t say they couldn’t, but that they shouldn’t.
Such physical hacking was long suspected as possible, just difficult and likely only in the capabilities of talented and well equipped professionals.
We DID say other settings and later models may be unbreakable. Different discussion.

How can you manage to engage in this conversation this long without understanding this?


25 posted on 04/14/2016 2:50:51 PM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 13 | View Replies]

To: All

It was his work phone owned by the County of San Bernardino...would be kinda stupid to be doing terrorist business on your employers phone! Their other “burner” phones probably had all the “good stuff”.


26 posted on 04/14/2016 2:51:44 PM PDT by Drago
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

That Apple phone belonged to the County of San Bernardino. The killers probably used other phones, which were later destroyed, to communicate with their terrorist associates.


27 posted on 04/14/2016 2:52:35 PM PDT by forgotten man
[ Post Reply | Private Reply | To 1 | View Replies]

To: humblegunner

Damn. Never thought of that..


28 posted on 04/14/2016 2:57:43 PM PDT by smokingfrog ( sleep with one eye open (<o> ---)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker

What could they get from the phone that they couldn’t get from checking their provider, anyway?


29 posted on 04/14/2016 2:58:56 PM PDT by TwelveOfTwenty (See my home page for some of my answers to the left's talking points.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Given enough time they’ll find proof that the Aryan Brotherhood, NRA and Tea Party gave the barbarians their instructions.


30 posted on 04/14/2016 2:59:35 PM PDT by MrBambaLaMamba (Obama - "I will stand with the Muslims")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

They wouldn’t say anything if they had discovered useful information on the phone. Why give instructions to the fellow terrorists?


31 posted on 04/14/2016 3:02:03 PM PDT by Chaguito
[ Post Reply | Private Reply | To 1 | View Replies]

To: forgotten man
That Apple phone belonged to the County of San Bernardino. The killers probably used other phones, which were later destroyed, to communicate with their terrorist associates.

There's no "probably" about it. The FBI has the shards of what is left of those destroyed phones, along with the remains of the hard drives removed from their laptop computers as well as their smashed laptops, that Farouk and Malik smashed with hammers before they went on their Jihad killing spree.

There is nothing probative they can get off of those shards. . . not even the phone numbers or carrier's name of the phones.

32 posted on 04/14/2016 3:03:53 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Swordmaker

33 posted on 04/14/2016 3:12:45 PM PDT by DJ Taylor (Once again our country is at war, and once again the Democrats have sided with our enemy.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fido969
"What a bunch of clowns."

Famous

But

Incompetent

34 posted on 04/14/2016 3:17:44 PM PDT by DJ Taylor (Once again our country is at war, and once again the Democrats have sided with our enemy.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Sacajaweau

maybe the Obama administration gave orders to say this.

that would not be a shock


35 posted on 04/14/2016 3:18:09 PM PDT by dp0622 (The only thing an upper crust conservative hates more than a liberal is a middle class conservative)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Mastador1
The reason is that they probably deleted everything on it considering the ineptitude they have shown from the start.

First FBI Agent: "OOPS!"

Second FBI Agent: "Uh, let's not tell the Agent in Charge that we tried eleven passcodes. What he doesn't know won't hurt US!"

Third FBI Agent: "Hey! I've got an idea! Let's get the San Bernardino IT guys to change the AppleID and see if that will let us get in!"

First two FBI Agents in unison: "GREAT IDEA!"

Third FBI Agent: "Let's go."

SB County IT Guy: "I don't think that's good idea."

Third FBI Agent: "We heard on the Internet this would do it. Go ahead. We're the FBI, you have to do it."

SB County IT Guy: "Why don't we call Apple and ask them what to do?"

First FBI Agent: "Look at this FBI wallet, that's all the authority you need to do what we tell you! DO IT!"

SB County IT Guy: "Well, OK, but I still think you should ask Apple. . . OK, done. " Third FBI Agent: "Try it. . . "

All three FBI Agents: "OOPS!"

36 posted on 04/14/2016 3:23:22 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

Another tempestuous teapot?


37 posted on 04/14/2016 3:25:54 PM PDT by Don Corleone ("Oil the gun..eat the cannoli. Take it to the Mattress.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: TwelveOfTwenty

Today, “phones” like those made by Apple are pocket computers where people store a whole lot more information than just “phone calls”. That info isn’t available by “checking their provider” any more than the contents of your house are discernible from municipal water supply records. Photos/videos of incriminating evidence, marked-up maps, notes, checklists, etc.


38 posted on 04/14/2016 3:31:11 PM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 29 | View Replies]

To: Dr. Ursus
I guess that’s why he didn’t destroy it? Allah forbid,they don’t lean on the mother and his friends!

I think there are three basic reasons why that iPhone was not destroyed which I have outlined before:

One has to ask why Farouk and Malik did not destroy this iPhone 5C in their preparation for their attack. One answer is they knew there was nothing probative on it, and it was unnecessary to destroy it. Another is one I have proposed: the iPhone was not their property and Islamic Jihadists are required to ritually clean before doing their act of Jihad. That means they bathe, shave off body hair, pray, and must NOT commit any sins prior to killing their victims (not a sin), but THEFT is a sin.

Destroying his employer's property would be such a sin, and therefore not something Farouk or Malik could do as it was not theirs to do with as they pleased. as that would constitute a theft, a sin, meaning they would not be morally clean before committing their act of Jihad. Frankly, even using the employer's phone for personal or Jihad use would be sinful. Ergo, nothing useful is on that iPhone.

Besides, it takes only five minutes to erase an iPhone back to a factory blank status, with all data gone.

So the reasons are:

  1. Farouk or Malik erased it.
  2. The terrorists knew they had never used it for anything incriminatingrelated to their attack.
  3. Religious and moral reasons, relating to the need for jihadal purity.

39 posted on 04/14/2016 3:33:09 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Coronal

Having a phone could be useful during such an attack. So...he kept his “clean”, employer-supplied, never-before-used-for-nefarious-purposes phone handy during the attacks.


40 posted on 04/14/2016 3:33:20 PM PDT by ctdonath2 ("Get the he11 out of my way!" - John Galt)
[ Post Reply | Private Reply | To 23 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson