Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI breaks into San Bernardino gunman's iPhone without Apple's help, ending court case
Fox News ^ | March 28, 2016

Posted on 03/28/2016 3:36:30 PM PDT by McGruff

The U.S. Justice Department announced Monday it has successfully accessed data stored on the iPhone that belonged to the San Bernardino gunman without Apple's help, ending the court case against the tech company.

The surprise development effectively ends a pitched court battle between Apple and the Obama administration.

The government told a federal court Monday, without any details, that it accessed data on gunman Syed Farook's iPhone and no longer requires Apple's assistance.

(Excerpt) Read more at foxnews.com ...


TOPICS: Breaking News; Crime/Corruption; Government; War on Terror
KEYWORDS: apple; bhodoj; bravosierra; counterterrorism; fbi; fuapple; israel; jihadinamerica; kabuki; sanbernardino
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-147 next last
To: CodeToad

I’m betting one of them had a buddy at NSA who said, “Give me the phone and go get us coffee at the corner cafe. I’ll have the phone cracked by the time you get back.”


121 posted on 03/28/2016 8:12:29 PM PDT by Excuse_My_Bellicosity (Liberalism is a social disease.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: MadMax, the Grinning Reaper
Sure. If some govt. hack showed up at your house, said "You work for me now", and started ordering you around, you wouldn't have a problem with it, right? That's exactly how they treated Apple. Be careful what you wish for, they think a lot less of you than they do Apple.

You get better results showing up with a contract than you do with a court order and threats. Who wouldn't lawyer up and start discussing legal options? Put some thought into this. Would you like people showing up on your doorstep, out-of-the-blue, with legal paperwork and threats? I'm not saying that the entire premise was wrong. I'm saying that the way the FBI went about was total garbage here.

A majority of people on an FR thread preaching the virtue of government subservience. Take me now, Lord, I've seen it all.

122 posted on 03/28/2016 8:24:20 PM PDT by Excuse_My_Bellicosity (Liberalism is a social disease.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: McGruff

Edward Snowden said all along the FBI could get into that phone anytime they wanted to. He said they just wanted a court to rule in their favor so they could use it in the future.


123 posted on 03/28/2016 8:32:18 PM PDT by VerySadAmerican (Cruz voters: Wake up! Trump is our only chance of stopping the gopE. If not now, never!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
And so this episode ends.

I TOLD you so -- they would claim they were successful whether or not they actually were.

124 posted on 03/28/2016 8:42:38 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 61 | View Replies]

To: Excuse_My_Bellicosity

You are right on. In the overarching “ethical” question, or “privacy issue” if you will, Apple was in the right and unfortunately that is the FBI’s tough luck.

But you know, so many feel that is a pro-terrorist view. I think this points to a larger issue of how intelligence has become too tech-oriented. Stopping terrorism is not just a matter of CIA/FBI/cops “sitting in chat rooms” as we used to say.

Watching online activity, emptying phones, etc, is part of the game, but not as big a part as most people believe. Look at Sept. 11, 2001: the plots were pretty much spelled out in total detail on one PC confiscated from a terrorist, yet that did nothing to prevent them.

That has been the case repeatedly. “Increased activity,” “online hints” are admitted AFTER people are dead.

So these guys cannot just sit in offices and troll all day and consider that high-level intelligence gathering. A real pro will tell you it ultimately comes down to talking to people!

Intelligence comes from relationships. I’ve heard they don’t like to admit that anymore because it is very hard to infiltrate islam?


125 posted on 03/28/2016 10:34:25 PM PDT by opus1 (google is not the font of all wisdom)
[ Post Reply | Private Reply | To 120 | View Replies]

To: DiogenesLamp
This result makes Apple look LESS secure. Some unnamed company breaks their vaunted encryption in a week?

First you would have to believe they actually did break into the phone. If they actually did it doesn't mean they will be able to get past the newest version of iOS.

There is no proof either way in any case there was about as much info in it as Geraldo's found in Al Capone's safe.

126 posted on 03/28/2016 11:15:58 PM PDT by itsahoot (Trump is a fumble mouthed blowhard that can't finish a sentence, but he will finish a term.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: itsahoot
there was about as much info in it as Geraldo's found in Al Capone's safe.

or...barney frank and al franken worked together to open it.

127 posted on 03/29/2016 3:23:22 AM PDT by Mr Apple
[ Post Reply | Private Reply | To 126 | View Replies]

To: McGruff
No matter how they try to spin it, this is not a win for the Feds.

If (and I stress IF) the process is dependent upon having physical possession of the phone, this is a big win for our privacy rights.

IMHO, a reasonable search and seizure involves presenting the owner with an encrypted device and taking possession of the device. If the owner does not cooperate with authorities they are free to have at it.

An unreasonable search and seizure would be through a 'backdoor' or any other process in which any/all of our devices can be accessed and searched without our knowledge.

The burden will forever have shifted from the government to citizens if a process in which notification after the fact becomes the norm.

128 posted on 03/29/2016 5:24:52 AM PDT by Protect the Bill of Rights
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sacajaweau

Israeli company Cellebrite, a subsidiary of Sun Corp. of Japan.

http://www.bbc.com/news/technology-35883441


129 posted on 03/29/2016 5:30:09 AM PDT by jjotto ("Ya could look it up!")
[ Post Reply | Private Reply | To 14 | View Replies]

To: itsahoot
First you would have to believe they actually did break into the phone. If they actually did it doesn't mean they will be able to get past the newest version of iOS.

Yes, I believe they did break into that phone, and no, I don't think the same technique will work on the newer phones. The newer Encryption scheme is hardware based and cannot be cracked with software emulation.

There is no proof either way in any case there was about as much info in it as Geraldo's found in Al Capone's safe.

I am not cynical enough to believe that the FBI would lie to the court. Not yet anyway.

130 posted on 03/29/2016 6:41:44 AM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 126 | View Replies]

To: Swordmaker
Keep using the TouchID. However, if you are required to turn over your iPhone under any kind of a search warrant or arrest situation, make sure you turn it off. On restart it will require the passcode before your fingerprint will work again.

I know what you meant, but thought I'd clarify for lurkers. My first thought when I read the above sentence was that you meant to advise turning the fingerprint recognition off prior to handing the phone over, when what you actually said was to turn the phone off since that will force it to the password rather than fingerprint when it is powered back on.

131 posted on 03/29/2016 7:12:54 AM PDT by zeugma (Vote Cruz!)
[ Post Reply | Private Reply | To 106 | View Replies]

To: itsahoot
in any case there was about as much info in it as Geraldo's found in Al Capone's safe

Of course there's nothing on this phone. The shooters no doubt used their personal phones (which they carefully destroyed), not a work phone. The Feds are just claiming to have gotten in to cover their own ineptitude and flip the bird to Apple for blocking their attempt to set a Big Brother precedent.

132 posted on 03/29/2016 8:03:03 AM PDT by Cyberman
[ Post Reply | Private Reply | To 126 | View Replies]

To: dmet

“IF the FBI cracked the phone AND there is actionable intelligence on it, they would be fools and idiots to tell everyone that it has been cracked, at least till they had tracked down every possible lead.”

Please see my earlier reply below:

http://www.freerepublic.com/focus/chat/3414875/posts?page=20#12


133 posted on 03/29/2016 9:12:09 AM PDT by Grampa Dave (I 'm just another low info/stupid & evil/vile/crazy Trump supporter wanting to select my candidate!!)
[ Post Reply | Private Reply | To 56 | View Replies]

To: PhiloBedo

Comey himself said the community deserves to know what is on that phone. Expect a briefing any moment know.......not.


134 posted on 03/29/2016 9:13:42 AM PDT by Protect the Bill of Rights
[ Post Reply | Private Reply | To 75 | View Replies]

To: Sacajaweau

“Dear Apple owners....If you’re a terrorist...get a damn throw away.”

It was posted that the #1 phone for the jihadist terrorist was the I Phone 5.

Might be time to upgrade or buying burners.


135 posted on 03/29/2016 9:16:15 AM PDT by Grampa Dave (I 'm just another low info/stupid & evil/vile/crazy Trump supporter wanting to select my candidate!!)
[ Post Reply | Private Reply | To 54 | View Replies]

To: McGruff

Jack is back!?


136 posted on 03/29/2016 9:21:04 AM PDT by Grampa Dave (I 'm just another low info/stupid & evil/vile/crazy Trump supporter wanting to select my candidate!!)
[ Post Reply | Private Reply | To 82 | View Replies]

To: WildHighlander57; McGruff; DesertRhino; onyx; CodeToad; Jim Robinson

“GMTA, Jack Bauer post then Chloe O’Brien post right after!”

Isn’t Free republic great, when we aren’t bashing each other for our presidential choices!?

We learn a lot, have fun conjecturing and get humor thrown in for free while on serious subjects like this one.

This has been an incredible learning experience going back to the first post on this subject, and we are not past the learning process.


137 posted on 03/29/2016 9:31:00 AM PDT by Grampa Dave (I 'm just another low info/stupid & evil/vile/crazy Trump supporter wanting to select my candidate!!)
[ Post Reply | Private Reply | To 104 | View Replies]

To: McGruff

If the guy who owned the iPhone was a Serial Killer who murdered 14 Gay People, Apple would have paid the Government to let them unlock the Phone.

All this end of Privacy Armageddon stuff would never have been mentioned.


138 posted on 03/29/2016 9:35:32 AM PDT by Kickass Conservative (There is nothing Democratic about the Democrat Party. (Or the GOPe))
[ Post Reply | Private Reply | To 1 | View Replies]

To: VerySadAmerican
Edward Snowden said all along the FBI could get into that phone anytime they wanted to. He said they just wanted a court to rule in their favor so they could use it in the future.

Edward Snowden fled the country months before this technology was ever released. Sorry, there is no way that Snowden could possibly know what security implementation was in the iPhone 5C before it was released when it did not exist prior to his leaving the country.

139 posted on 03/29/2016 9:57:05 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 123 | View Replies]

To: Grampa Dave
It was posted that the #1 phone for the jihadist terrorist was the I Phone 5.

No, it has not been posted that factually. The facts are that the Terrorists have websites with APPS to download which are available for installation. These are ANDROID apps, not apps that would have to be uploaded to the Apple App Store. The preferred phones recommended on the Terrorist network websites are BURNER phones they can buy at any convenience store for under $60, buy the provisioning minutes on a card, and do not have to subscribe to any particular carrier to be assigned a phone number, but can instead be assigned a phone number anonymously. . . and finally can destroy the phone and the authorities cannot trace a damn thing back to the terrorist!

Such anonymous burner phones are always ANDROID phones and, if sophisticated enough, can run Android apps.

An iPhone will ALWAYS be registered to a specific carrier which will REQUIRE a credit or debit card (not a burner card), and assign a traceable phone number which authorities can trace calls on.

140 posted on 03/29/2016 10:11:14 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 135 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-147 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson