Posted on 03/28/2016 3:36:30 PM PDT by McGruff
I’m betting one of them had a buddy at NSA who said, “Give me the phone and go get us coffee at the corner cafe. I’ll have the phone cracked by the time you get back.”
You get better results showing up with a contract than you do with a court order and threats. Who wouldn't lawyer up and start discussing legal options? Put some thought into this. Would you like people showing up on your doorstep, out-of-the-blue, with legal paperwork and threats? I'm not saying that the entire premise was wrong. I'm saying that the way the FBI went about was total garbage here.
A majority of people on an FR thread preaching the virtue of government subservience. Take me now, Lord, I've seen it all.
Edward Snowden said all along the FBI could get into that phone anytime they wanted to. He said they just wanted a court to rule in their favor so they could use it in the future.
I TOLD you so -- they would claim they were successful whether or not they actually were.
You are right on. In the overarching “ethical” question, or “privacy issue” if you will, Apple was in the right and unfortunately that is the FBI’s tough luck.
But you know, so many feel that is a pro-terrorist view. I think this points to a larger issue of how intelligence has become too tech-oriented. Stopping terrorism is not just a matter of CIA/FBI/cops “sitting in chat rooms” as we used to say.
Watching online activity, emptying phones, etc, is part of the game, but not as big a part as most people believe. Look at Sept. 11, 2001: the plots were pretty much spelled out in total detail on one PC confiscated from a terrorist, yet that did nothing to prevent them.
That has been the case repeatedly. “Increased activity,” “online hints” are admitted AFTER people are dead.
So these guys cannot just sit in offices and troll all day and consider that high-level intelligence gathering. A real pro will tell you it ultimately comes down to talking to people!
Intelligence comes from relationships. I’ve heard they don’t like to admit that anymore because it is very hard to infiltrate islam?
First you would have to believe they actually did break into the phone. If they actually did it doesn't mean they will be able to get past the newest version of iOS.
There is no proof either way in any case there was about as much info in it as Geraldo's found in Al Capone's safe.
or...barney frank and al franken worked together to open it.
If (and I stress IF) the process is dependent upon having physical possession of the phone, this is a big win for our privacy rights.
IMHO, a reasonable search and seizure involves presenting the owner with an encrypted device and taking possession of the device. If the owner does not cooperate with authorities they are free to have at it.
An unreasonable search and seizure would be through a 'backdoor' or any other process in which any/all of our devices can be accessed and searched without our knowledge.
The burden will forever have shifted from the government to citizens if a process in which notification after the fact becomes the norm.
Israeli company Cellebrite, a subsidiary of Sun Corp. of Japan.
http://www.bbc.com/news/technology-35883441
Yes, I believe they did break into that phone, and no, I don't think the same technique will work on the newer phones. The newer Encryption scheme is hardware based and cannot be cracked with software emulation.
There is no proof either way in any case there was about as much info in it as Geraldo's found in Al Capone's safe.
I am not cynical enough to believe that the FBI would lie to the court. Not yet anyway.
I know what you meant, but thought I'd clarify for lurkers. My first thought when I read the above sentence was that you meant to advise turning the fingerprint recognition off prior to handing the phone over, when what you actually said was to turn the phone off since that will force it to the password rather than fingerprint when it is powered back on.
Of course there's nothing on this phone. The shooters no doubt used their personal phones (which they carefully destroyed), not a work phone. The Feds are just claiming to have gotten in to cover their own ineptitude and flip the bird to Apple for blocking their attempt to set a Big Brother precedent.
“IF the FBI cracked the phone AND there is actionable intelligence on it, they would be fools and idiots to tell everyone that it has been cracked, at least till they had tracked down every possible lead.”
Please see my earlier reply below:
http://www.freerepublic.com/focus/chat/3414875/posts?page=20#12
Comey himself said the community deserves to know what is on that phone. Expect a briefing any moment know.......not.
“Dear Apple owners....If youre a terrorist...get a damn throw away.”
It was posted that the #1 phone for the jihadist terrorist was the I Phone 5.
Might be time to upgrade or buying burners.
Jack is back!?
“GMTA, Jack Bauer post then Chloe OBrien post right after!”
Isn’t Free republic great, when we aren’t bashing each other for our presidential choices!?
We learn a lot, have fun conjecturing and get humor thrown in for free while on serious subjects like this one.
This has been an incredible learning experience going back to the first post on this subject, and we are not past the learning process.
If the guy who owned the iPhone was a Serial Killer who murdered 14 Gay People, Apple would have paid the Government to let them unlock the Phone.
All this end of Privacy Armageddon stuff would never have been mentioned.
Edward Snowden fled the country months before this technology was ever released. Sorry, there is no way that Snowden could possibly know what security implementation was in the iPhone 5C before it was released when it did not exist prior to his leaving the country.
No, it has not been posted that factually. The facts are that the Terrorists have websites with APPS to download which are available for installation. These are ANDROID apps, not apps that would have to be uploaded to the Apple App Store. The preferred phones recommended on the Terrorist network websites are BURNER phones they can buy at any convenience store for under $60, buy the provisioning minutes on a card, and do not have to subscribe to any particular carrier to be assigned a phone number, but can instead be assigned a phone number anonymously. . . and finally can destroy the phone and the authorities cannot trace a damn thing back to the terrorist!
Such anonymous burner phones are always ANDROID phones and, if sophisticated enough, can run Android apps.
An iPhone will ALWAYS be registered to a specific carrier which will REQUIRE a credit or debit card (not a burner card), and assign a traceable phone number which authorities can trace calls on.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.