Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI agrees to unlock iPhone, iPod in Arkansas homicide case
fox news ^ | 03/31/2016

Posted on 03/31/2016 10:20:28 AM PDT by BenLurkin

The FBI agreed Wednesday to help an Arkansas prosecutor unlock an iPhone and iPod belonging to two teenagers accused of killing a couple, just days after the federal agency announced it had gained access to an iPhone linked to the gunman in a mass shooting in California.

Faulkner County Prosecuting Attorney Cody Hiland said the FBI agreed to the request from his office and the Conway Police Department Wednesday afternoon. A judge on Tuesday agreed to postpone the trial of 18-year-old Hunter Drexler so prosecutors could ask the FBI for help. Drexler's trial was moved from next week to June 27.

Drexler and 15-year-old Justin Staton are accused of killing Robert and Patricia Cogdell at their home in Conway, 30 miles north of Little Rock, in July. The Cogdells had raised Staton as their grandson.

The FBI announced Monday that it had gained access to an iPhone belonging to Syed Farook, who died with his wife in a gun battle with police after they killed 14 people in San Bernardino in December. The FBI hasn't revealed how it cracked Farook's iPhone. Authorities also haven't said whether the iPhone and iPod in the Arkansas case are the same models or whether the FBI will use the same method to try to get into the devices.

Hiland said he could not discuss details of the murder case in Arkansas, but confirmed the FBI had agreed less than a day after the initial request

(Excerpt) Read more at foxnews.com ...


TOPICS: US: Arkansas
KEYWORDS: fbi; iphone; ipod
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 161-169 next last
To: proust
Ok. Thank you for the reasonable response.

You're welcome. I wish reasonable debate was more common on Free Republic.

61 posted on 03/31/2016 12:20:21 PM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 59 | View Replies]

To: jessduntno

I was responding to your reply. I am well aware of the topic of this thread.


62 posted on 03/31/2016 12:21:06 PM PDT by NoKoolAidforMe (I'm clinging to my God and my guns. You can keep the change.)
[ Post Reply | Private Reply | To 55 | View Replies]

To: rarestia

If Apple is too stupid to provide security AND permit the rule of law then don’t invest in their stock.
Other companies will.
Encryption solely for the ability to evade the law will be provided more cheaply by hackers.

So there’ll be no market for Apple encryption.


63 posted on 03/31/2016 12:29:35 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: NoKoolAidforMe

“I am well aware of the topic of this thread.”

Oh. OK. Never mind. I thought you were ignoring the case in front of us and the little dears who killed the old folks.


64 posted on 03/31/2016 1:14:21 PM PDT by jessduntno (The mind of a liberal...deceit, desire for control, greed, contradiction and fueled by hate.)
[ Post Reply | Private Reply | To 62 | View Replies]

To: Mark17

Fire up the bat symbol into the sky!!!


65 posted on 03/31/2016 1:48:11 PM PDT by SgtHooper (If you remember the 60's, YOU WEREN'T THERE!)
[ Post Reply | Private Reply | To 29 | View Replies]

Comment #66 Removed by Moderator

To: GOPe Means Bend Over Spell Run
This is exactly what the idiot running apple deserves for protecting a dead terrorist’s phone. Now watch Apple sales tank.

Yikes! They'll have to cut back on the foam parties in Cupertino.

67 posted on 03/31/2016 3:07:47 PM PDT by dennisw
[ Post Reply | Private Reply | To 2 | View Replies]

To: BenLurkin; dayglored; ShadowAce; ThunderSleeps; ~Kim4VRWC's~; 1234; Abundy; Action-America; ...
The FBI agrees to unlock an iPhone and iPod owned by two teenagers claimed to hold evidence in an Arkansas double homicide. So much for the FBI's claims they were not interested in opening other iPhones in the previous court case trying to force Apple into opening the security of the iOS ecosystem. No word in the article on which iPhone/iPod as to the models being covered. — PING!

Pinging dayglored, Shadow Ace, and ThunderSleeps for their ping lists.


FBI opening other Apple devices for non-FBI cases
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

68 posted on 03/31/2016 3:29:36 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GOPe Means Bend Over Spell Run
This is exactly what the idiot running apple deserves for protecting a dead terrorist’s phone. Now watch Apple sales tank.

Why? Apple's stock is up over $8 per share since the FBI announcement on Monday. How do you account for that?

The fact is that Apple stood on the FEDERAL LAW as written that PROHIBITED the FBI from doing what they were attempting to force Apple to do what they were trying to force them to do. Look up the Communications Assistance for Law Enforcement Act and read it. It directly addresses what the FBI was trying to use the court to force Apple to do and PROHIBITS them from doing it. That means they cannot get a court to do it for them. A New York Federal Magistrate Judge found he had erred in making a similar order for Apple to open another iPhone and vacated his order when the CALEA law was pointed out to him. The judge also found that the order that had been prepared for him to sign by the FBI, just as the one in the Terrorist case had been, required the court to LEGISLATE new LAW, because it required an amendment in the CALEA law for it to be legal. The courts cannot legislate law. His order to Apple was therefore unconstitutional.

If you supported the FBI in the previous case, you were supporting the rule of men over the rule of LAW.

69 posted on 03/31/2016 3:39:46 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 2 | View Replies]

To: proust
Yes they must submit to the continued steamrolling tyranny of the feds!

This is still FR, right?

I'm not sure. The panty-waists are celebrating that big brother is winning. However, I have no problem with the FBI exercising and searching an iPhone on their own. . . if they can, through their own ingenuity, hack into it, fine. My problem was their demand that Apple be forced to undermine their own product.

Federal Law also requires that the FBI must inform Apple of the vulnerability they are using so that Apple may close the vulnerability. I wonder if they will follow Federal Law or will they ignore it? My thought is this administration and its lackeys, being lawless, will ignore it. What do you think?

70 posted on 03/31/2016 3:44:18 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 10 | View Replies]

To: rarestia
Protecting a phone? Are you hearing yourself? They were protecting their intellectual property! You can’t expect any security in your digital transactions if there are backdoors present, even if the backdoor was put there for a “benevolent” entity such as the government. SOMEONE will eventually find it and exploit it.

You people wishing ill on Apple are incredible. They’re trying to protect the fidelity of ALL of our digital transactions, not just their own. The FBI “figured out a way around” the protections, great. Good for them. They hacked their way in. They call that “white hat” in my industry, and it happens all the time. Strong arming a company into giving up its keys is tantamount to extortion.

Pound sand, the lot of you!

HEAR! HEAR!

The fact is that this is not going to end well. Being a forensic technique, the defense will be entitled to have a copy/access to the software/technique used to access the data in the iPhone if it is introduced in the trial of these two murderers. That has meant in the past that as soon as their IT specialists get their hands on it, it's out in the wild. No secret survives discovery. None, even if it is under seal.

Apple has learned this to their detriment multiple times in lawsuits. Judges have ordered them to reveal company secrets to the opposition under seal, guaranteeing them it will go no further than the opposition's legal counsel, only to have these secrets being used against Apple by the opposition company who was never supposed to see those data. The fines are always less than $10,000 and frequently only $100 for breaking seal in a court case for data that may be worth billions of dollars! You tell me what choice some money grubbing intern or IT specialist might make, especially when it won't be him who pays the fine.

I heard on Radio KFBK in Sacramento today that the Sacramento County Sheriff's Office has 88 Apple iPhones they intend to request the FBI open using this technique.

The saving grace of this technique is that it requires expensive equipment that not every John Doe hacker will have access to or the skill to use. It also requires physical access to the target iOS device, and most likely only works on the specific model of iPhone/iOS devices that uses the A6 processor with the Encryption Engine design that the Terrorist's iPhone 5C had.

71 posted on 03/31/2016 4:03:38 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 12 | View Replies]

To: DiogenesLamp

Wow. So much facepalm in your post. Seriously, don’t post when you are even remotely unsure, because you’re talking to people who do this for a living.

A “backdoor” is exactly what they wanted. They attempted to open the phone 10 times, and after the 10th, the data was removed from device. This is done by scrambling the EEPROM on the mainboard. The only way to unscramble that would be to reverse engineer the encryption algorithm or to provide the hash and salt used to generate the algorithm, thereby providing a way to recover the data. This isn’t a lie, this is cold hard fact.

The FBI was explicitly asking for Apple to provide the keys to their algorithm. Why is this pertinent? Apple doesn’t have a KEY to open your phone, they have the algorithm used to generate that key. That means that they could generate a key very similar to the one your phone uses, but the chances of duplicating the key to the bit is a quantum-level impossibility.

Unlike Google and Microsoft, Apple does not retain ownership rights of your data (read your EULA) on the phone itself. If the data is stored in their cloud (i.e. iTunes/iCloud), free game. Otherwise, your device is as secure as you want to make it, which is EXACTLY how it should be.


72 posted on 03/31/2016 4:04:57 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: GOPe Means Bend Over Spell Run
You people are not reading anything we're posting...

Apple does not have the ability to recover data from a phone that's been scrambled due to excessive access attempts!

The use a private algorithm to generate a security token/certificate for your device which is unique to your device. The FBI fucked up by trying to access the phone, and when the phone was digitally scrambled (read: "erased"), there's no recovering that data. We're not talking about data in the cloud. This is hard data on the mainboard EEPROM.

The ONLY way they could've helped was to provide their own intellectually property in the form of their algorithm which would allow the FBI/CIA/NSA to generate tokens in an attempt to unscramble the data on the EEPROM, and doing that means that they've now given away the keys to the kingdom by allow the government to unlock any phone they damn well please.

73 posted on 03/31/2016 4:09:50 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 66 | View Replies]

To: rarestia; jessduntno
Feel free to browse my VERY PUBLIC and VERY LOUD support for Microsoft on FR and elsewhere. I’m a Microsoft certified engineer and have been working on Windows platforms for 20 years. I am NOT an Apple fanboy, but I am also an IT security professional; and this entire thing was a BAD IDEA.

If you have no understanding of cryptography or digital encryption, I suggest you do some research. There are no security experts anywhere in the world who thought the bullying of Apple was good for business.

Facts don't matter to "just don't wanna know." Only his ignorant opinion counts. I've gone around and around with him about the binary nature of effective encryption, and what Apple was actually protecting here, but he refuses to listen. He ignores any article that says anything different from his opinion, claiming it's a lie published by Apple fanboys. . . so don't even bother to respond to his blathering. Also you won't get anything substantive as a way of proof from him. You'll find it more rewarding trying to nail jello to a wall.

74 posted on 03/31/2016 4:12:53 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 26 | View Replies]

To: mrsmith
Encryption solely for the ability to evade the law will be provided more cheaply by hackers.

I don't know what to say. This is one of the most bewildering things I've read all day. You do understand that encryption in its current form is all thanks to the government's creation of digital cryptography through ARPANET projects going back 50 years? For instance, the TOR network was created by the Navy to provide secure transmission channels for submarine communications. Now it's used by hackers and pederasts alike, but you bet your ass the Navy still uses the technology!

Cryptography has been around for millenia. It's ALWAYS been used to evade, the law or otherwise! In your world, would everyone would be issued a secret decoder ring that they'd have to turn over to the police when they're arrested? Clearly you have no idea what you're talking about or you were drinking when you posted.

75 posted on 03/31/2016 4:14:05 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 63 | View Replies]

To: Swordmaker

Sword, you and I have had VERY heated discussions, and you know damn well that I’m a blue-blood Microsoft boy all the way through. This transcends platform. This is 1984-level shit here. If the government could bully any private entity into giving up the keys to their intellectual property, Katie bar the door!


76 posted on 03/31/2016 4:15:36 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 74 | View Replies]

To: Dr. Sivana

This is as it should be.


77 posted on 03/31/2016 4:16:22 PM PDT by Coronal
[ Post Reply | Private Reply | To 11 | View Replies]

To: DiogenesLamp

If this case goes to court, the defense will have the right to subpoena the FBI for an expert witness to explain how they did it. If not this case, then some other somewhere else. Once this is disclosed in a courtroom, Apple will have what they want.


78 posted on 03/31/2016 4:18:43 PM PDT by Coronal
[ Post Reply | Private Reply | To 22 | View Replies]

To: rarestia
Here's an article from 2014 that clearly states that Apple can't crack its own encryption BY DESIGN!

Is Apple Picking a Fight With the U.S. Government?

All of the carnival barkers were crowing then about how this is going to make it hard on law enforcement. Apple NEVER said that their encryption is uncrackable, as is clearly evidenced by the FBI's efforts. They just wanted out of the business of violating their customers' trust!

79 posted on 03/31/2016 4:29:35 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 76 | View Replies]

To: rarestia

These rants that everyone’s always been able to easily evade the law are bemusing.


80 posted on 03/31/2016 4:49:34 PM PDT by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 75 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 161-169 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson