Posted on 02/19/2016 5:07:38 PM PST by rpierce
The Apple ID passcode for the San Bernardino shooter's iPhone was changed less than 24 hours after authorities took possession of the device, a senior Apple executive said today.
And Apple could have recovered information from the phone had the Apple ID passcode not been changed, Apple said.
If the phone was taken to a location where it recognized the Wi-Fi network, such as the San Bernardino shooters' home, it could have been backed up to the cloud, Apple suggested. ... The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.
(Excerpt) Read more at abcnews.go.com ...
I didn't ask what Apple has. My question is, do you agree with Apple's contention that they cannot build software to unlock this i-phone without it being able to unlock the others running this OS? Yes or no?
I have no idea about what tech they have and dont have. I thought I made that clear. Nothing that they have said so far in writing indicates they can’t do it, they are saying they won’t. If they want, they can go to court and try to prove they can’t or dont have a soluion for that specific phone. This as a 50 BILLION dollar a year business. They can afford to do whatever the fuck they want. Except ignore a court order. I have no idea what you are tying to argue. I am on the side of the 4th Amendment. That should really be all you need to know.
Don’t go into law.
I agree! Actually, I think Apple flat out said they do have that capability.
Now please answer this. Apple says that if they were to create such a system, that system would also be able to unlock all i-phones running that OS. Do you agree with Apple's assertion - yes or no?
Now please answer this. Apple says that if they were to create such a system, that system would also be able to unlock all i-phones running that OS. Do you agree with Apple’s assertion - yes or no?
Not if they maintain control over it, obviously. But, once again, that is irrelevant. The court will decide that. I believe in the rule of law. If the two of them work out a way to catch these killers, I’m all for it. If not, then the Constituion has failed. I would not be happy to see a new court presented with a way to circumvent the Constitution, but it is up to the Aplle guys to figure it out. If you read the wording in the order, the judge says they do not need to have control over the program. If they don’t have it, the only way I can see it abused if it is done by who ever has it. The person in control over it would decide that. This is probably good marketing for Apple after the down Q4, but I don’t think they fight it. We’ll see. This is the beauty of the Constitution, don’t you think? How people respond to it?
Apple’s reasonable technical assistance may include, but is.
not limited to: providing the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (”SIF”) that can be loaded onto the SUBJECT DEVICE. The SIF will load and run from Random Access Memory (”RAM”) and will not modify the iOS on the actual phone, the user data partition or system partition on the device’s flash memory. The SIF will be coded by Apple with a unique identifier of the phone so that the SIF would only load and execute on the SUBJECT DEVICE. The SIF will be loaded via Device Firmware
Upgrade (”DFU”) mode, recovery mode, or other applicable mode
available to the FBI. Once active on the SUBJECT DEVICE, the SIF will accomplish the three functions specified in paragraph 2. The SIF will be loaded on the SUBJECT DEVICE at either a government facility, or alternatively, at an Apple facility; if the latter, Apple shall provide the government with remote access to the SUBJECT DEVICE through a computer allowing the government to conduct passcode recovery analysis.
That’s what they want!
Hahahaha. Good night.
Good to see one of the designers responsible for the "What Would George Washington Do" ad that we ran many years ago. One of the reasons I use Apple products is the perception that I have that the apps and other content that I download are free of malware and that my communications are relatively secure. If the FBI (or other parties) have access to my phone, iPad, iMac) I have no doubt that the security of those communications will, at some point, be compromised.
And another thing to consider...what about any iTunes back-ups of the iPhone the terrorist might have made on a computer at home?? Is his computer drive encrypted? Did the San Bernardino County IT Dept. make any back-ups? (It is their iPhone).
Also, the “iCloud” Apple ID password can be changed by someone who knew the terrorist’s ID & password...we might have another collaborator? Getting more interesting as time goes by.
But if they were to lose control over it, millions of the latest iphones would be compromised.
I'll take that as a tacit admission that you agree with Apple's contention that a system created to unlock this particular i-phone, would be a system that would unlock the others.
Apple said that, if the iCloud password had not been changed, the phone might have backed itself up to the iCloud account upon being brought within range of a familiar WiFi network, such as Farook's house or office.
Apple has already turned over the contents of the iCloud account. But the problem is, the phone stopped backing up to iCloud on October 19, weeks before the terrorist attack. Why was that? Probably because Farook changed some setting on the phone. If that's true, then Apple's statement is wrong: you would need to log into the phone and undo Farook's configuration change to get the phone to back up. But, of course, logging into the phone has been the issue all along.
Maybe if Apple could change the iCloud password back to what it was before the SB County guy reset it, we could see if Apple is right that it would back up. But I doubt it.
So since the pw was changed, no one can access the cloud to get the data.
Accessing the cloud data was the reason the SB County guy reset the cloud password. Problem was, the data stopped on 19 October.
I know Apple had nothing to do with the crime and they don't own the phone. The court can compel them to do exactly nothing, unless of course we have morphed into some form of the Soviet Union. I'm beginning to wonder about that one.
Loretta Lynch needs to make the FBI Director wear a house dress with no underwear while meeting with Apple.
Computers can't do repetitive, simple text parsing....
No, wait.....
“I’ll take that as a tacit admission that you agree with Apple’s contention that a system created to unlock this particular i-phone, would be a system that would unlock the others.”
Well, you can twist it anyway you want to, but that is not what I said. The fact that it was obvious what would happen if they had it in their possession says nothing about what would happen if they didn’t. Not too good on comprehension, or do you just see what you want to see? My answer is my answer. It is not open to interpretation.
So you refuse to say one way or the other.
He did this remotely. It was never in his possession.
I don’t understand why Apple can’t write the software to disable this one phone then hand the disabled phone back to the FBI? That solves everyones problem and nobody but Apple retains the know how. I understand the concerns going forward but at some point there has to be some trust in the system. I trust pretty much nothing where the government is concerned but but what Apple has done is create another weapon for crime here. A device like this or more accurately software, can be used to plot criminal acts with impunity.
Thanks Grampa Dave!
Sorry. I should have referred to original link.
Thanks to you, for your excellent insight and input on this incredible story.
Also, the iCloud Apple ID password can be changed by someone who knew the terrorist ID & password...we might have another collaborator? Getting more interesting as time goes by.
Thanks again for your incredible input on this amazing issue. This could be a several part CSI Cyber show.
Please ping me whenever, you have more input or good questions.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.