Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

San Bernardino Shooter's Apple ID Passcode Changed While in Government Possession, Apple Says
ABC News ^ | 2/19/2016 | Jack Date

Posted on 02/19/2016 5:07:38 PM PST by rpierce

The Apple ID passcode for the San Bernardino shooter's iPhone was changed less than 24 hours after authorities took possession of the device, a senior Apple executive said today.

And Apple could have recovered information from the phone had the Apple ID passcode not been changed, Apple said.

If the phone was taken to a location where it recognized the Wi-Fi network, such as the San Bernardino shooters' home, it could have been backed up to the cloud, Apple suggested. ... The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.

(Excerpt) Read more at abcnews.go.com ...


TOPICS: Business/Economy; Crime/Corruption; Government; News/Current Events; US: California; War on Terror
KEYWORDS: apple; california; farook; fbiappleiphone; sanbernadino; sanbernardino; security; waronterror
Navigation: use the links below to view more comments.
first previous 1-20 ... 181-200201-220221-240 ... 361-376 next last
To: jessduntno
I have no idea about what they have and don’t have.

I didn't ask what Apple has. My question is, do you agree with Apple's contention that they cannot build software to unlock this i-phone without it being able to unlock the others running this OS? Yes or no?

201 posted on 02/19/2016 8:56:49 PM PST by Ken H
[ Post Reply | Private Reply | To 200 | View Replies]

To: Ken H

I have no idea about what tech they have and dont have. I thought I made that clear. Nothing that they have said so far in writing indicates they can’t do it, they are saying they won’t. If they want, they can go to court and try to prove they can’t or dont have a soluion for that specific phone. This as a 50 BILLION dollar a year business. They can afford to do whatever the fuck they want. Except ignore a court order. I have no idea what you are tying to argue. I am on the side of the 4th Amendment. That should really be all you need to know.

Don’t go into law.


202 posted on 02/19/2016 9:05:42 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 201 | View Replies]

To: Protect the Bill of Rights
What page is that on?
http://www.wired.com/wp-content/uploads/2016/02/SB-shooter-MOTION-seeking-asst-iPhone.pdf
203 posted on 02/19/2016 9:14:09 PM PST by philman_36 (Pride breakfasted with plenty, dined with poverty and supped with infamy. Benjamiin Franklin)
[ Post Reply | Private Reply | To 125 | View Replies]

To: jessduntno
Nothing that they have said so far in writing indicates they can’t do it, they are saying they won’t.

I agree! Actually, I think Apple flat out said they do have that capability.

Now please answer this. Apple says that if they were to create such a system, that system would also be able to unlock all i-phones running that OS. Do you agree with Apple's assertion - yes or no?

204 posted on 02/19/2016 9:27:15 PM PST by Ken H
[ Post Reply | Private Reply | To 202 | View Replies]

To: Ken H

Now please answer this. Apple says that if they were to create such a system, that system would also be able to unlock all i-phones running that OS. Do you agree with Apple’s assertion - yes or no?

Not if they maintain control over it, obviously. But, once again, that is irrelevant. The court will decide that. I believe in the rule of law. If the two of them work out a way to catch these killers, I’m all for it. If not, then the Constituion has failed. I would not be happy to see a new court presented with a way to circumvent the Constitution, but it is up to the Aplle guys to figure it out. If you read the wording in the order, the judge says they do not need to have control over the program. If they don’t have it, the only way I can see it abused if it is done by who ever has it. The person in control over it would decide that. This is probably good marketing for Apple after the down Q4, but I don’t think they fight it. We’ll see. This is the beauty of the Constitution, don’t you think? How people respond to it?

Apple’s reasonable technical assistance may include, but is.
not limited to: providing the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (”SIF”) that can be loaded onto the SUBJECT DEVICE. The SIF will load and run from Random Access Memory (”RAM”) and will not modify the iOS on the actual phone, the user data partition or system partition on the device’s flash memory. The SIF will be coded by Apple with a unique identifier of the phone so that the SIF would only load and execute on the SUBJECT DEVICE. The SIF will be loaded via Device Firmware
Upgrade (”DFU”) mode, recovery mode, or other applicable mode
available to the FBI. Once active on the SUBJECT DEVICE, the SIF will accomplish the three functions specified in paragraph 2. The SIF will be loaded on the SUBJECT DEVICE at either a government facility, or alternatively, at an Apple facility; if the latter, Apple shall provide the government with remote access to the SUBJECT DEVICE through a computer allowing the government to conduct passcode recovery analysis.

That’s what they want!

Hahahaha. Good night.


205 posted on 02/19/2016 9:38:43 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 204 | View Replies]

To: rpierce
It is if it has a world-class encryption system built in it and any attempt to brute force attack it results in it being disabled (which is what the fibbers are wanting Apple modify on the phone so they can attack it, or anyone else's iPhone with their sophisticated techniques and technologies).

Good to see one of the designers responsible for the "What Would George Washington Do" ad that we ran many years ago. One of the reasons I use Apple products is the perception that I have that the apps and other content that I download are free of malware and that my communications are relatively secure. If the FBI (or other parties) have access to my phone, iPad, iMac) I have no doubt that the security of those communications will, at some point, be compromised.

206 posted on 02/19/2016 9:40:46 PM PST by Ben Hecks
[ Post Reply | Private Reply | To 110 | View Replies]

To: Grampa Dave

And another thing to consider...what about any iTunes back-ups of the iPhone the terrorist might have made on a computer at home?? Is his computer drive encrypted? Did the San Bernardino County IT Dept. make any back-ups? (It is their iPhone).
Also, the “iCloud” Apple ID password can be changed by someone who knew the terrorist’s ID & password...we might have another collaborator? Getting more interesting as time goes by.


207 posted on 02/19/2016 10:04:29 PM PST by Drago
[ Post Reply | Private Reply | To 77 | View Replies]

To: jessduntno
Not if they maintain control over it, obviously.

But if they were to lose control over it, millions of the latest iphones would be compromised.

I'll take that as a tacit admission that you agree with Apple's contention that a system created to unlock this particular i-phone, would be a system that would unlock the others.

208 posted on 02/19/2016 10:11:55 PM PST by Ken H
[ Post Reply | Private Reply | To 205 | View Replies]

To: Grampa Dave
Thanks. I’m so confused. Didn’t Apple say that they could have gotten the data off the cloud if the password had not been changed?

Apple said that, if the iCloud password had not been changed, the phone might have backed itself up to the iCloud account upon being brought within range of a familiar WiFi network, such as Farook's house or office.

Apple has already turned over the contents of the iCloud account. But the problem is, the phone stopped backing up to iCloud on October 19, weeks before the terrorist attack. Why was that? Probably because Farook changed some setting on the phone. If that's true, then Apple's statement is wrong: you would need to log into the phone and undo Farook's configuration change to get the phone to back up. But, of course, logging into the phone has been the issue all along.

Maybe if Apple could change the iCloud password back to what it was before the SB County guy reset it, we could see if Apple is right that it would back up. But I doubt it.

So since the pw was changed, no one can access the cloud to get the data.

Accessing the cloud data was the reason the SB County guy reset the cloud password. Problem was, the data stopped on 19 October.

209 posted on 02/19/2016 10:13:47 PM PST by cynwoody
[ Post Reply | Private Reply | To 132 | View Replies]

To: doug from upland
"How do you know the phone had nothing to do with the crime?"

I know Apple had nothing to do with the crime and they don't own the phone. The court can compel them to do exactly nothing, unless of course we have morphed into some form of the Soviet Union. I'm beginning to wonder about that one.

210 posted on 02/19/2016 10:15:20 PM PST by precisionshootist
[ Post Reply | Private Reply | To 78 | View Replies]

To: gaijin

Loretta Lynch needs to make the FBI Director wear a house dress with no underwear while meeting with Apple.


211 posted on 02/19/2016 10:17:05 PM PST by Paladin2
[ Post Reply | Private Reply | To 24 | View Replies]

To: Talisker
"...take a few minutes to fix the FR text scrambling problem. ..."

Computers can't do repetitive, simple text parsing....

No, wait.....

212 posted on 02/19/2016 10:20:58 PM PST by Paladin2
[ Post Reply | Private Reply | To 151 | View Replies]

To: Ken H

“I’ll take that as a tacit admission that you agree with Apple’s contention that a system created to unlock this particular i-phone, would be a system that would unlock the others.”

Well, you can twist it anyway you want to, but that is not what I said. The fact that it was obvious what would happen if they had it in their possession says nothing about what would happen if they didn’t. Not too good on comprehension, or do you just see what you want to see? My answer is my answer. It is not open to interpretation.


213 posted on 02/19/2016 10:49:30 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 208 | View Replies]

To: jessduntno
If you thought Apple had the ability to design a system that would unlock this one phone only, you would say so since it would expose Tim Cook as a liar.

So you refuse to say one way or the other.

214 posted on 02/19/2016 11:29:57 PM PST by Ken H
[ Post Reply | Private Reply | To 213 | View Replies]

To: zedee

He did this remotely. It was never in his possession.


215 posted on 02/19/2016 11:45:20 PM PST by wiggen (#JeSuisCharlie)
[ Post Reply | Private Reply | To 23 | View Replies]

To: RetiredTexasVet

I don’t understand why Apple can’t write the software to disable this one phone then hand the disabled phone back to the FBI? That solves everyones problem and nobody but Apple retains the know how. I understand the concerns going forward but at some point there has to be some trust in the system. I trust pretty much nothing where the government is concerned but but what Apple has done is create another weapon for crime here. A device like this or more accurately software, can be used to plot criminal acts with impunity.


216 posted on 02/19/2016 11:58:12 PM PST by wiggen (#JeSuisCharlie)
[ Post Reply | Private Reply | To 60 | View Replies]

To: Grampa Dave

Thanks Grampa Dave!


217 posted on 02/20/2016 12:46:33 AM PST by SunkenCiv (Here's to the day the forensics people scrape what's left of Putin off the ceiling of his limo.)
[ Post Reply | Private Reply | To 57 | View Replies]

To: philman_36

http://abcnews.go.com/US/san-bernardino-shooters-apple-id-passcode-changed-government/story?id=37066070

Sorry. I should have referred to original link.


218 posted on 02/20/2016 4:55:47 AM PST by Protect the Bill of Rights
[ Post Reply | Private Reply | To 203 | View Replies]

To: SunkenCiv

Thanks to you, for your excellent insight and input on this incredible story.


219 posted on 02/20/2016 5:38:18 AM PST by Grampa Dave (Trump the lying RNC/GOPe Open Borders elite thugs! Say hell no to their candidates! Go TRUMP!)
[ Post Reply | Private Reply | To 217 | View Replies]

To: Drago
Another thing to consider...what about any iTunes back-ups of the iPhone the terrorist might have made on a computer at home?? Is his computer drive encrypted? Did the San Bernardino County IT Dept. make any back-ups? (It is their iPhone).

Also, the iCloud Apple ID password can be changed by someone who knew the terrorist ID & password...we might have another collaborator? Getting more interesting as time goes by.

Thanks again for your incredible input on this amazing issue. This could be a several part CSI Cyber show.

Please ping me whenever, you have more input or good questions.

220 posted on 02/20/2016 5:44:04 AM PST by Grampa Dave (Trump the lying RNC/GOPe Open Borders elite thugs! Say hell no to their candidates! Go TRUMP!)
[ Post Reply | Private Reply | To 207 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 181-200201-220221-240 ... 361-376 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson