Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

A New York judge just ruled that the FBI can't force Apple to unlock iPhones
Business Insider ^ | 02/29/2016 | Kif Leswing

Posted on 02/29/2016 3:48:54 PM PST by Drago

A federal judge in Brooklyn has ruled that the government can't force Apple to help break an iPhone's passcode security. No, it's not the San Bernardino shooting case, a similar situation where the FBI is seeking to compel Apple to provide custom software to help it access data on a criminal's iPhone...

(Excerpt) Read more at businessinsider.com ...


TOPICS: Constitution/Conservatism; Extended News; Government; News/Current Events
KEYWORDS: 4thamendment; privacy
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-98 next last
To: Rashputin
But forcing someone to do the work of baking a cake or making a floral arrangement for a queer wedding and that's just fine, right ?

I don't think I said that. And you're mixing Apples and oranges. ;~)

61 posted on 02/29/2016 5:54:30 PM PST by Hugin (Conservatism without Nationalism is a fraud.)
[ Post Reply | Private Reply | To 50 | View Replies]

To: Thibodeaux; MeganC

Are you aware that the USPS photographs the front and back of every letter you send? That’s a step away from reading your mail. This means they are able to keep track of everyone you correspond with.


62 posted on 02/29/2016 6:56:23 PM PST by generally
[ Post Reply | Private Reply | To 12 | View Replies]

To: wrench

Hate to deal with a technicality, but a declaration of war today, short of being attacked by No. Korea or Red China, just isn’t going to happen.

We have fought the Korean War (a UN Police action), “Vietnam War” (major war in three countries), had forces in Lebanon, Grenada (a clean-out action), Iraq (a real war) and Afghanistan (a real guerrilla war).

Total casualties are roughly 100,000 KIA and over 1-2 million wounded. I call those figures “casualties of war”.
My son got his medals for Operation Iraqi Freedom, etc., not “police action OIF”).

We like to mess up the reality of the situation by trying to parse words that shouldn’t be parsed. With the international implications of “declaring war” on another nation, it is better to have the flexibility to wage a “war” without congressionally declaring it.

This is the 21st Century, not the 1940’s and things have changed, for the worst. We had better adapt or be destroyed.

Also there are the “shadow wars” which you only read about in books but which most people will never know about. There are also the “wars of subversion” (in which I participated) which you can find mainly in a few books and congressional hearings, but they are real psychological and undermining wars.

Many of the laws that applied during WW2 are still in effect regarding the treatment of armed, uniformed opponents, the treatment of civilians, off-limit targets (hospitals, international cities, etc). They have been supplemented by UN resolutions that most nations have signed, but not by all of our enemies. We still play by the rules (most of the time). At other times and situations, we “adapt” and succeed.

Life is complicated but wars are relatively simple things to delineate. An enemy says they are at war with you and act that way. You either ignore them, withdraw from the battlefield, fight them to a status quo as in Korea, or defeat the bastards. No matter what you do, it was still a war.


63 posted on 02/29/2016 7:37:28 PM PST by MadMax, the Grinning Reaper
[ Post Reply | Private Reply | To 55 | View Replies]

To: Drago; GodGunsGuts; Cincinatus' Wife; campaignPete R-CT; BillyBoy; Impy; Reagan Disciple
RE:”A New York judge just ruled that the FBI can't force Apple to unlock iPhones”

Not just Obama but Trump.

Can you imagine either of them with the power as POTUS to use all phones info against tho he disagrees with??

Trump's talk about changing libel laws to make it easier for him to sue those in media for publishing opinions he doesn't like is definitely problematic, except for those who worship him.

Hitler promised to get the trains running on time

The problem isnt too little federal power.

64 posted on 02/29/2016 7:41:30 PM PST by sickoflibs (Trumpetir :"He could go on a shooting spree downtown and I would still worship him"')
[ Post Reply | Private Reply | To 1 | View Replies]

To: sickoflibs
Hitler promised to get the trains running on time

Check yourself for wrongness.

65 posted on 02/29/2016 7:44:22 PM PST by Stentor (Oh Teddy Cruz, Canadian that you be. Oh Teddy Cruz, we stand on guard for thee.)
[ Post Reply | Private Reply | To 64 | View Replies]

To: Drago; dayglored; ThunderSleeps; ShadowAce; ~Kim4VRWC's~; 1234; Abundy; Action-America; ...
The first thread on the NEW YORK Judge's Decision on Apple v. FBI/DOJ ruling on Apple's behalf finding that the All Writs Act does not apply and that the 1994 CALEA act immunizes Apple from having to comply! -- PING!


Apple v. NY FBI/DOJ and Apple WINS!
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

66 posted on 02/29/2016 10:02:00 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Ping!

Got it. Thanks.

67 posted on 02/29/2016 10:03:01 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 7 | View Replies]

To: cloudmountain
I would be willing to guesstimate that there are hundreds of thousands of young male geeks who could hack that phone in a New York minute.
Hah, they'd probably do it while having breakfast, e-mailing 50 friends, watching boobustoobus and scratching their armpits.

They've been trying for about 9 years and failing. So why do you think they'd be able to do it now?

68 posted on 02/29/2016 10:04:16 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 3 | View Replies]

To: cloudmountain
Don’t you think that the encryption can be broken?

It can, if you have enough time to brute force it. . . trying to brute force the data encryption with out the key would take a mere 5.62 Undecillion years. That's 5.62 X 10195 years to try every possible key. I think the dire need to get at the data might be moot by then, don't you?

69 posted on 02/29/2016 10:07:58 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Thud
Apple loses if the government is ever serious. The feds can simply seize the company with its eminent domain power, put a trustee in charge (Jack Ma of China would be a great way to rub this into the eyes of the tech guys), and sell Apple to the highest bidder to pay off its former shareholders. While the trustee has Apple’s staff do what the feds want.

Uh, what law in the United States permits that? I know of none. Do you?

70 posted on 02/29/2016 10:09:34 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 17 | View Replies]

To: cloudmountain; The KG9 Kid
Gee, an unbreakable code. Well, that's amazing. Here I thought that any code COULD be broken...well, unless it was in the Hopi language, written backwards, upside down and in pig latin.

There are quite a few "unbreakable codes."

The simplest is one where two people have agreed in advance between them on a code book. This book is a published book of over a thousand pages of prose and numbers. You and your partner agree in advance to a set of rules based on the calendar. Odd days, you go right and up, even left and down. Sundays. stay where you land . Use a three dice. You are the sender. Roll the dice and multiply the roll times the date then times 5. Thats your starting page. write that number down. If the day is even, using the first dice in your role, go that number of pages left. write that second number down. Second dice, starting at the top line of the page, go down that number of lines. Write that Third number down. Third dice, from the left of the page, count that number of words, write that Fourth number down. Starting at the beginning of that word, count letters until you find the letter you want, upper or lower case, write that count down as your Fifth number. Role the dice again, and do your second letter of your secret message, RINSE and REPEAT until your entire message is coded. Spaces, periods, numbers, all handled the same. Send it.

Perfect unbreakable code.

Never repeats, no pattern develops. Nothing ever decipherable because there is nothing but five sets of numbers that appear totally random, because the dice randomize every code set.

This actually can be done with a computer if both of you have the same base book in your computer. Just don't share the book with anybody.

To further randomize it, on a regular schedule, you and your receiver should change books on specific dates known only to the two of you.

To make it even more obtuse, make all the numbers five digits. Pad them out with random noise. Only you need to know that the real numbers are the inside three or two or one, depending on the order received.

Of course, this is a communications code. Not a storage code like the 256 bit AES used on the iPhone. But, as I said, there are quite a few unbreakable codes. It just depends on your purpose.

71 posted on 02/29/2016 10:36:47 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 19 | View Replies]

To: ALASKA; DiogenesLamp; palmer; SteveH; itsahoot; IncPen; Protect the Bill of Rights; JimSEA; ...
Diogenes, would this set a precedent for Apple to use in resisting the FBI? The FBI in CA may have a stronger case because there was Islamic terrorism involved. Other forms of what I consider terrorism can be just as bad or even worse.

Yes, it does. A court of equal jurisdiction has just ruled on a similar case to the California Court Order, an order which used the same "All Writs Act," and in fact the California case was being used as precedent in the California case as a persuasive case to the Judge, even though undecided at the time of the issuance of the order, so it definitely will have a bearing and a precedential effect in the hearing.

72 posted on 02/29/2016 10:41:44 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 20 | View Replies]

To: cloudmountain; The KG9 Kid
Well, a more powerful one may be "just around the corner." Heck, they may already exist and are delegated to the "top secret" category.

Recall that time it would take to break a 256 bit AES encryption. 5.62 X 10195 years. That was assuming the fastest supercomputer we have time THREE. . . capable of trying 9.5 TRILLION possible keys per year. Google has a quantum computer currently working. it's 100,000,000 times faster than the fastest single core PC. Let's assume they can make a Supercomputer 100,000,000 faster using Quantum tech. How much faster could they try all the possible keys? They'd get it done in 5.62 X 10187 years. That's a bit shorter, but I don't think it's make a difference we'd much care about.

Consider this fact, it's estimated that there are 4.62 X 1084 ATOMS in the observable Universe. That means there aren't enough ATOMS in the Observable Universe to use as counters to count the years it would take to try even HALF of every possible key!

But that's OK, because they estimate that the protons, neutrons, and electrons that make up those atoms will have all decayed into quarks and neutrinos by 3.2 X 1082 years anyway. In other words, the Universe will have died a heat death before we got anywhere close to half-way done.

73 posted on 02/29/2016 10:52:42 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 26 | View Replies]

To: cloudmountain; The KG9 Kid
See post #25.

Quantum computing won't work on an iPhone because the trials have to occur on the iPhone. The potential passcodes have to be compared to a one-way hash that is stored in a read-only secure location in the processor. Remove it, and the system stops working, and the hash is erased. That forces you into actually trying to brute force a much harder key, the actual 256 bit AES key of the data itself which is made up of over 132 characters minimum, composed of the now deleted passcode, the UID of the processor, unreadable outside the processor, and stored random inputs from the first startup taken from the camera, accelerometer, and microphone, then ALSO stored in an unrecoverable one-way storage lockbox in side the encryption engine. That key can be any character from Apple's character set of 233 characters, and therefore be 233132 possible keys to try.

Of course, if you are going after the data itself, you could clone it and try it on multiple computers. But how many can you afford to dedicate to the project?

74 posted on 02/29/2016 11:04:03 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 29 | View Replies]

To: MadMax, the Grinning Reaper
It would be simple for a court to order Apple to help crack the terrorist’s cellphone “in Camera” which would protect any so-called “customer privacy rights” (talk about a RED HERRING by APPLE).

it was NOT Apple that made this public. It was the FBI who got the Court Order without Apple's presence in the Court Room and immediately issued a press release claiming Apple had refused to cooperate with a search warrant, when Apple had been cooperating all along, including providing all data that Apple was in custody of on the iCloud accounts of the terrorists. Apple VOLUNTEERED to assist in any way they could. The FBI demanded something that was NOT within their power to do. . . and then went the way of an illegal court order, in violation of the Communications Assistance for Law Enforcement Act which PROHIBITS what they are demanding Apple do. That is exactly what this New York judge has just ruled. The "All Writs Act" is an inappropriate law to apply and the government's attempt to compel Apple violates a long standing law that the FBI KNOWS ABOUT!

75 posted on 02/29/2016 11:14:36 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mace users continue....)
[ Post Reply | Private Reply | To 36 | View Replies]

To: Swordmaker

IIRC Byte Magazine in an article re secure encryption mentioned using a truly random generated set of bits shared via duplicate codebooks as in your example. Each segment of bits is used once for each messsage. Just exclusive OR the segment of random bits with the message’s bits then send. Receiver uses duplicate segment of bits to decrypt. Very fast since OR function is HW processed. Using low order bits from an ADC reading resistor thermal noise would probably give a random enough codebook set.


76 posted on 02/29/2016 11:24:04 PM PST by DuhYup (The Bill of Rights is a package deal!)
[ Post Reply | Private Reply | To 71 | View Replies]

To: 109ACS; aimhigh; bajabaja; Bikkuri; Bobalu; Bookwoman; Bullish; Carpe Cerevisi; DarthDilbert; ...
A small victory for privacy, but this is only one battle - ANDROID PING!

Android Ping!
If you want on or off the Android Ping List, Freepmail me.

OK, this specific case is about Apple, but the forces behind it could eventually effect all smartphone users.
77 posted on 03/01/2016 5:08:04 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 66 | View Replies]

To: cloudmountain

“REAL spies already have a plan... “

“REAL” spies would also use “REAL” encryption software - some of which is provably unbreakable.

The quest to unlock the iPhone is just more security theater, intended to extend the reach of government power.


78 posted on 03/01/2016 5:20:16 AM PST by PreciousLiberty (Cruz/Rubio/Trump '16! JUST NOT A DEM!!!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker
You could try reading the Constitution. Eminent Domain was an inherent power of every government prior to the Constitution's enactment, and so not mentioned in the Constitution until the Bill of Rights was enacted in 1791. Its Fifth Amendment added some restrictions on eminent domain:

"... nor shall private property be taken for public use, without just compensation."

I did mention this is my day job.

79 posted on 03/01/2016 8:01:00 AM PST by Thud
[ Post Reply | Private Reply | To 70 | View Replies]

To: RightOnTheBorder

Freedom is not free.


80 posted on 03/01/2016 8:02:13 AM PST by Thud
[ Post Reply | Private Reply | To 58 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-98 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson