Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Talisker

“That’s why its so good that they had the pass code IMMEDIATELY. After all, that’s what the county IT guy used to change it - right? So what, exactly, is your point?”

Stop screwing around, disarm the number of password tries lock so they can super computer crunch the passwords and get after the rag headed sock suckers who killed all those people...time is wasting. Is that clear enough?


75 posted on 02/19/2016 5:35:17 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 64 | View Replies ]


To: jessduntno
Stop screwing around, disarm the number of password tries lock so they can super computer crunch the passwords and get after the rag headed sock suckers who killed all those people...time is wasting. Is that clear enough?

What part of "they already had the pass code" don't you understand? And if the FBI already had it, how do you know they didn't use it to get the info off of the phone before they released it to some county IT guy? Don't you see how this blows the government's credibility to shreds in this matter?

86 posted on 02/19/2016 5:40:23 PM PST by Talisker (One who commands, must obey.)
[ Post Reply | Private Reply | To 75 | View Replies ]

To: jessduntno

“get after the rag headed sock suckers who killed all those people...time is wasting.”

https://en.wikipedia.org/wiki/Call_detail_record

They already know every call and text into and out of that phone, since the phone company is required to keep CDR and metadata for several years. They should look into who called and who was called, quickly!
.......................
“The National Security Agency (NSA) commonly records Internet metadata for the whole planet for up to a year in its MARINA database, where it is used for pattern-of-life analysis. U.S. persons are not exempt because metadata are not considered data under US law (section 702 of the FISA Amendments Act).[49] Its equivalent for phone records is MAINWAY.[50] The NSA records SMS and similar text messages worldwide through DISHFIRE.[51]
Leveraging commercial data retention

Various United States agencies leverage the (voluntary) data retention practised by many U.S. commercial organizations through programs such as PRISM and MUSCULAR.

Amazon is known to retain extensive data on customer transactions. Google is also known to retain data on searches, and other transactions. If a company is based in the United States the Federal Bureau of Investigation (FBI) can obtain access to such information by means of a National Security Letter (NSL). The Electronic Frontier Foundation states that “NSLs are secret subpoenas issued directly by the FBI without any judicial oversight. These secret subpoenas allow the FBI to demand that online service providers or ecommerce companies produce records of their customers’ transactions. The FBI can issue NSLs for information about people who haven’t committed any crimes.

NSLs are practically immune to judicial review. They are accompanied by gag orders that allow no exception for talking to lawyers and provide no effective opportunity for the recipients to challenge them in court. This secret subpoena authority, which was expanded by the controversial USA PATRIOT Act, could be applied to nearly any online service provider for practically any type of record, without a court ever knowing”. The Washington Post has published a well researched article on the FBI’s use of National Security Letters.[52]”


96 posted on 02/19/2016 5:47:41 PM PST by DBrow
[ Post Reply | Private Reply | To 75 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson