Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Secret Memo Details U.S.’s Broader Strategy to Crack Phones (Link Only Due to Copyright concerns)
Bloomberg Business | February 19, 2016 — 2:00 AM PST | By Michael Riley

Posted on 02/20/2016 10:09:42 PM PST by Swordmaker

According to Bloomberg News, the White House convened a secret meeting around Thanksgiving, after agreeing not to seek legislation to force companies to install backdoors in mobile devices that encrypt data, to work secretly to do it through other means.

Apparently, "other means" may include what we are seeing with the Apple v. FBI Court Order.

Link only due to copyright concerns:

Secret Memo Details U.S.'s Broader Strategy to Crack Phones.


TOPICS: Constitution/Conservatism; Culture/Society; Government; News/Current Events; US: California; War on Terror
KEYWORDS: apple; applepinglist; california; encryption; sanbernadino; sanbernardino
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 121-135 next last
To: MadMax, the Grinning Reaper

Max, if indeed your bio is real, then I understand. You must be very old and remember how FDR took things from We, the People, such as confiscation of privately owned gold. What you say rings true to me. And, yes, of course, the whole thing stinks from the top. I don’t question the dedication of FBI agents in the field anymore than a soldier on duty. Unfortunately, we are already in a mixed economy welfare state that is taking Rights from us faster than we can possibly reverse in my lifetime. You see the big picture. So do most people fighting with you. I don’t even think it matters what Apple or any one business does. The Rights of the Individual or in this case a business which is a collection of Individuals, has been Infringed by fascist type rules, regulation and now an Executive Branch that grants powers to itself unchecked by the Judicial or Legislative Branch. Thanks for your efforts as a patriot of our once free Republic.


41 posted on 02/21/2016 12:54:48 PM PST by The Westerner
[ Post Reply | Private Reply | To 11 | View Replies]

To: Ray76
The cloud backup is encrypted. A pwd change does not change that fact.

p= Actually it does. It destroyed the possibility of decrypting the data stored on the iCloud. . . without the original passcode, it is impossible to decrypt the data o either the iPhone or on the iCloud in any reasonable length of time for that data to do any living human being any good. By being so damn ignorant about what they were doing, and not calling Apple in at the get-go to talk to the experts about what to do and just going to some average IT grunt at a County IT department, and trying an amateurish idea, they probably destroyed any possibility of accessing those data.

42 posted on 02/21/2016 1:59:16 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Vinnie
All this controversy concerning iPhones and encryption.
What about Android phones? Are they encrypted/ breakable?

Some of the newer Android phones have some pretty good encryption. Samsung was pushing its KNOX security and even got certification from the Federal Government. . . then it was discovered they were keeping their passcodes in an unencrypted clear text file in a Library easily found on the phone. Not safe at all.

I've heard they've improved on that.

Other, older model users running older versions of Android can get apps that will encrypt various portions of the data on their phones to various degrees. However, Android phones have around 4 million malware in the wild, some of which can completely compromise the phones and their security.

43 posted on 02/21/2016 2:15:35 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 32 | View Replies]

To: hoosierham

from here

http://www.usconstitution.net/consttop_drft.html

The only exception the 13th contemplates for slavery or involuntary servitude is as a punishment for a duly convicted crime. However, the courts have ruled that the intent of the 13th was never to abolish the draft, and that serving in the military, even against your will, is not involuntary servitude. These “duties owed to the government” are exempted from 13th Amendment protection. In Butler v Perry (240 US 328 [1916]), the Supreme Court wrote:

[The 13th Amendment] introduced no novel doctrine with respect of services always treated as exceptional, and certainly was not intended to interdict enforcement of those duties which individuals owe to the state, such as services in the army, militia, on the jury, etc. The great purpose in view was liberty under the protection of effective government, not the destruction of the latter by depriving it of essential powers.

But here is the conundrum. Why did the federal government permit Apple to sell their iphones with such difficult-to-break encryption without informing Apple in advance that it incurred an obligation to the government to provide a key? This sounds not so much like a valid purpose of government but more like a government fustercluck trying to bail itself out by abusing its power via indentured servitude. It should be up to the government to justify the exceptional circumstances, which at this point includes throwing away a valid opportunity to read the encrypted messages through LE carelessness. What happens the next time the government screws up a case? And the next? I think it is a slippery slope. Eventually we might find ourselves all conscripted into putting together government humpty dumpty fusterclucks (the so-called “exceptional circumstances”).

But I guess you don’t see any problem with that, right??


44 posted on 02/21/2016 2:32:44 PM PST by SteveH
[ Post Reply | Private Reply | To 28 | View Replies]

To: Swordmaker

Thanks for expanding the details. One assumes that there is or should be a govt procedure for handling electronic evidence. Perhaps you immediately put the device into a RF shielded case and open later when you have a shielded work environment. Remember working in RF sealed rooms that had a two hatch airlock arrangement that allowed you (not RF) to get in or out.

Will the local yokel get a bonus for effort or fired for incompetence?

Apple tried to help but they forgot that “no good deed goes unpunished.”


45 posted on 02/21/2016 2:57:37 PM PST by DuhYup
[ Post Reply | Private Reply | To 42 | View Replies]

To: palmer

Apple is helping terrorists.


46 posted on 02/21/2016 3:05:10 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Swordmaker

> It destroyed the possibility of decrypting the data stored on the iCloud. . .

How so? The data in the cloud - Apple servers - is encrypted.


47 posted on 02/21/2016 3:09:03 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 42 | View Replies]

To: palmer

The encryption keys are stored in the phone on a ROM of some sort as is the boot pgm. Why doesn’t Apple help the FBI retrieve the keys and prevent power-on from starting that boot program?


48 posted on 02/21/2016 3:12:30 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Ray76

You missed the news stories that reported that the data on the Cloud is from October, if IIRC. That was the last time that the bad guy copied the data from the phone to the Cloud.

Newer data (up to terror attack) is only on the phone. The up to date data could have been copied onto the Cloud without the passcode and accessed by Apple.

By tampering with the phone the govt put the phone into a state where the phone will no longer copy the post October data to the Cloud without the passcode.

SwordMaker will probably correct any misinformation here.


49 posted on 02/21/2016 3:29:33 PM PST by DuhYup
[ Post Reply | Private Reply | To 47 | View Replies]

To: Ray76
How so? The data in the cloud - Apple servers - is encrypted.

The KEY is on the iPhone 5C that was linked to that passcode that COULD have been accessed using the AppleID and passcode associated with that iPhone until those FBI BOZOs told the County IT department to change the AppleID on the iPhone's access without knowing what they were doing.

That same passcode is used to build the KEY that is used to encrypt both the data on the iPhone which is eventually uploaded to the iCloud. To extract either, one must be able to re-construct that KEY, either as a normal user would in day-to-day use of the iPhone, or downloading to restore the data from the iCloud. One can also use the AppleID and password to unlock an iPhone, by-passing the lock passcode. . . but the FBI had the IT department CHANGE it. Once it's changed, that option is GONE.

50 posted on 02/21/2016 3:40:58 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Ray76
The encryption keys are stored in the phone on a ROM of some sort as is the boot pgm. Why doesn't Apple help the FBI retrieve the keys and prevent power-on from starting that boot program?

There is one AES key encrypting most of the data on the phone. That key is stored in flash but it is encrypted. Some data from ROM forms part of the KEK (key encryption key, also used to decrypt that AES key). Other data needed for the KEK is the hash of the passcode.

To get the needed AES key someone has to enter the correct passcode, then the SW creates the KEK and uses it to decrypt the AES key. If 10 incorrect passcodes are entered the SW deletes the AES key. The user's data stays intact but cannot be decrypted. The FBI wants that numerical restriction eliminated. Second they want an internet or bluetooth interface for guessing the passcode instead of typing it on the screen. That doesn't exist at all. Third they want the AES key deletion turned in addition to turning off the numerical restriction. These are demanded in the court order, not optional.

They also requested the SW to load on the phone although they did not demand it. They said Apple can tailor the SW to work on that one phone only while giving some hand wave about how that would be done. They even suggested using a unique ID assigned by the carrier (Verizon) which can obviously be assigned to any phone they want to compromise in the future (either they are stupid or think we are).

51 posted on 02/21/2016 3:54:16 PM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 48 | View Replies]

To: SteveH

I see lots of problems because people abuse power, and the people who have the most power tend to abuse it more. Government is a dangerous servant and a fearful foe. G.Washington said it first. Eisenhower warned us again.


52 posted on 02/21/2016 4:04:12 PM PST by hoosierham (Freedom isn't free)
[ Post Reply | Private Reply | To 44 | View Replies]

To: hoosierham

And Spiderman after them. :-)


53 posted on 02/21/2016 4:11:33 PM PST by SteveH
[ Post Reply | Private Reply | To 52 | View Replies]

To: palmer

The hardware has a UID in ROM. I think the UID, the AES key, and the passcode as a salt for the AES, are combined. The passcode length is 6. Having the AES from ROM and the hardware UID from ROM it shouldn’t be too difficult to spin through possible salts and trying each key.

The boot program is in ROM as well. On powering on the boot program begins to execute, checking the integrity of programs prior to executing them. The programs are signed with Apple’s public key. The public key is stored in ROM. If any signature checks fail the boot program halts and goes to “device firmware upgrade” mode, aka “reset mode”. This is when data will be destroyed. (What that destruction method is, I don’t know. Is it set to x00?) Not starting the boot program seems to be a solution.


54 posted on 02/21/2016 4:13:32 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Ray76
Apple is helping terrorists.

That comment is of the exactly same emotional loading as the gun grabbers' comments that Gun and Ammunition manufacturers refusal to pay for the funerals and injuries their guns and Ammo inflict are helping criminals, terrorists, murderers, robbers, child killers, and suicides. . . and makes just as much sense as someone saying that the makers of matches who are not funding fire departments are helping arsonists, forest fire setters, wildfire pyromaniacs, firebugs, etc.

55 posted on 02/21/2016 4:22:12 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 46 | View Replies]

To: DesertRhino; MadMax, the Grinning Reaper
Nice fascist response. But apple hasn't aided and abetted anyone.

OTOH, if the federal government has already illegally acquired the data they crave by other means, such as NSA capturing the actual voice, text and email data, rather than merely the metadata, Apple would be aiding and abetting that felony by providing the NSA with cover to conceal their crime, and enabling them to illicitly use tainted evidence in a trial.

56 posted on 02/21/2016 4:30:35 PM PST by null and void (This is "They live", and most people would rather fight you than put on the glasses...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

They ARE helping terrorists. There is no hypothetical. San Bernadino DID happen. Apple is refusing to comply with a court order.

These are FACTS. Not emotion.

It is not the manufacture of iPhones that helps terrorists, it is the refusal to comply with a court order to assist the FBI in retrieving information from the device.

Your analogy is nonsense.


57 posted on 02/21/2016 4:31:26 PM PST by Ray76 (Judge Roy Moore for Justice of the Supreme Court of the United States)
[ Post Reply | Private Reply | To 55 | View Replies]

To: tbw2
They can't stop a million illegals crossing the border a year or profile Muslims cheerleading ISIS online, but being able to read any electronic medium at any time will make us safer?

Can't should be won't.

They could if they cared.

58 posted on 02/21/2016 4:35:19 PM PST by null and void (This is "They live", and most people would rather fight you than put on the glasses...)
[ Post Reply | Private Reply | To 29 | View Replies]

To: MadMax, the Grinning Reaper
What does Jim Thompson have to say about Tim Scott's behavior? Has he said?

 

59 posted on 02/21/2016 4:36:02 PM PST by Bronzewound (2016 GOP. A Timid Little Division Of The Democrat Party.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: SteveH

But was service in the military involuntary during the first fourscore years under the U.S. Constitution ?


60 posted on 02/21/2016 4:37:13 PM PST by hoosierham (Freedom isn't free)
[ Post Reply | Private Reply | To 44 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 121-135 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson