Posted on 11/09/2017 3:47:04 AM PST by Swordmaker
Apple is refuting the FBIs official account
Apple is refuting the Federal Bureau of Investigations account of the aftermath of the Texas gunmans attack this past Sunday, saying it reached out to the bureau immediately to offer assistance in getting into the gunmans iPhone and expedite its response to any legal process. The attack, which left 26 dead and many more injured, was committed by now-deceased Devin P. Kelley, who is confirmed to have been carrying an iPhone that may have crucial information about his activities in the lead up to the shooting.
The FBI originally cast blame on Apple yesterday without mentioning the company by name, with FBI special agent Christopher Combs blaming industry standard encryption from preventing law enforcement from accessing the contents of devices owned by mass shooters. Law enforcement is increasingly not able to get into these phones, Combs said at a press conference. I can assure you that we are working very hard to get into the phone.
However, a Reuters report earlier today revealed that the FBI did not ask Apple for assistance during a critical 48-hour window, in which Kelleys fingerprint could have still unlocked an iPhone equipped with Touch ID. (The model of Kelleys iPhone remains unknown, as does whether he enabled Touch ID.) An Apple spokesperson, in a statement obtained by BuzzFeed, now says it did in fact contact the FBI right away:
(Excerpt) Read more at theverge.com ...
https://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html
The judge asked Apple to provide "reasonable technical assistance" to the U.S. authorities, which would require the technology giant to overhaul the system that disables the phone after 10 unsuccessful password attempts. Once this feature kicks in, all the data on the phone is inaccessible. Apple declined to help the FBI.
At the time, Apple chief executive Tim Cook called the order "chilling" and said that it would require writing new software that would be "a master key, capable of opening hundreds of millions of locks". Cook's argument was that if the FBI could access this iPhone, nothing would stop them from doing it to many others.
Can the FBI just be dissolved and all of its personnel be let go?
The citizens would be better off without these politicized liars.
To what end? Last time this came up, the Applebots assured us that cracking an Apple iPhone is impossible. It's the one feature of the Apple product that actually makes it attractive.
The FBI ALREADY AND ILLEGALLY HAS A UNIVERSAL KEY from Apple...
This is just the FBI and Apple once again trying to sell the idea it’s okay for them to have it.
They tried this a year or more ago and were unsuccessful selling it to the public.
They are betting the public forgot and are attempting to resale it.
Here are the articles from almost 2 years ago and a year and a half ago. When they tried to exploit the last tragedy for gain.
and
https://www.nytimes.com/interactive/2016/03/03/technology/apple-iphone-fbi-fight-explained.html
Of course. That's the government's default setting.
They have a culture that is ingrained into them.
1) They seldom share information with state or local cops or even other feds,
2) Their customer is not the American people, their customer is their source of funding - Congress,
3) They have an ingrained attitude that every solution to every law enforcement problem must be tailored to suggest that the FBI were the heroes in the situation. They will suck the air out of the accomplishments of others just so they look good.
4) They have become more and more a political force, so dangerous to a free republic.
The encryption itself is unbreakable with current technology. They’ll provide whatever legitimate assistance they can, such as providing Icloud data with a proper warrant. They’ve refused to create a tool which would amount to a backdoor into every Iphone in existence.
Your evidence?
;-)
“The encryption itself is unbreakable with current technology”
With technology that YOU know of. It ain’t unbreakable at all. It is very weak compared to what the military uses and the NSA deciphers every day.
Appearing on a video link from Moscow, NSA whistleblower Edward Snowden told an audience gathered at the Common Cause Blueprint for a Great Democracy conference that the FBIs assertion that it cannot unlock the iPhone of one of the San Bernardino shooters is Bullshit.
The FBI says Apple has the exclusive technical means to unlock the phone. Respectfully, thats bullshit. Snowden said.
He added that the FBI has been aware of hardware attacks since the 90s that could allow them to get into the phone.
The full interview can be viewed below, with the iPhone comments at around 30 mins.
https://www.youtube.com/watch?v=cJ6PpX6xg-E
and
The President is not going to be happy.
As The Intercept has pointed out, the NSA and the CIA have worked for over a decade on hacking into Apple products, and it is ridiculous to believe that they do not know how to access the phone.
I guess the FBI is like everything else about DC - lie first, then blame everyone else for your failures...
Regardless of one’s opinion of Apple - and what may appear to be a “change of heart” in cooperating with the FBI (a whole other debate) - the fact is - Apple reached out with an offer to help and the FBI, as their norm, dropped the ball... AGAIN.
See post above - it hasn’t nothing to do with “Muslim” or anything else. Apple’s policy is clearly spelled out in Swordmaker’s post above.
Very insightful.
It's Pavlovian. . . Bell Rings and the Liberals salivate.
True.
And if encryption is involved encryptors defend their profits.
ROTFLMAO!
You are relying on a media outlet to tell you the truth? How naive can you be? This has all been gone through in detail when it was occurring on the threads of Freerepublic. . . too bad you weren't paying attention then.
Think about this misleading statement from CNBC:
"The judge asked Apple to provide "reasonable technical assistance" to the U.S. authorities, which would require the technology giant to overhaul the system that disables the phone after 10 unsuccessful password attempts.
That so-called "system" that disables the iPhone is BUILT-IN to the operating system. It is NOT some stand-alone, removable module as the journalist at CNBC seems to think. To "overhaul the system that disables the phone after 10 unsuccessful attempts," because it is the system that handles the whole system encryption ,WOULD indeed require REWRITING iOS to suit the FBI's demands.
Have YOU read the All Writs Court order, Okie? I have. It orders Apple to do exactly what Tim Cook said it does. . . and then hand the results of that work over to the government. That is NOT "reasonable technical assistance."
The FBI actually specified HOW they wanted the Operating System to be modified in the judge's court order, which THEY wrote:
"Apples reasonable technical assistance shall accomplish the following three important functions: (1) it will bypass or disable the auto-erase function whether or not it has been enabled; (2) it will enable the FBI to submit passcodes to the SUBJECT DEVICE for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available on the SUBJECT DEVICE and (3) it will ensure that when the FBI submits passcodes to the SUBJECT DEVICE, software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware.Apples reasonable technical assistance may include, but is not limited to: (A) providing the FBI with a signed iPhone Software file, recovery bundle, or other Software Image File (SIF) (B) that can be loaded onto the SUBJECT DEVICE. The SIF will load and run from Random Access Memory and (C) will not modify the iOS on the actual phone, the user data partition or system partition on the devices flash memory. The SIF (D) will be coded by Apple with a unique identifier of the phone so that the SIF would only load and execute on the SUBJECT DEVICE. The (E) SIF will be loaded via Device Firmware Upgrade (DFU) mode, recovery mode, or other applicable mode available to the FBI. Once active on the SUBJECT DEVICE, the SIF will accomplish the three functions specified in paragraph 2. The SIF will be loaded on the SUBJECT DEVICE at either a government facility, or (F) alternatively, at an Apple facility; if the latter, Apple shall provide the government with remote access to the SUBJECT DEVICE through a computer allowing the government to conduct passcode recovery analysis.
If Apple determines that it can achieve the three functions stated above in paragraph 2, as well as the functionality set forth in paragraph 3, using an (G) alternate technological means from that recommended by the government, and the government concurs, Apple may comply with this Order in that way.
There are several serious problems with the above All Writ Order's technical requirements which have been pointed out by software engineers who are very familiar with iOS and iPhone architecture, which it is obvious the FBI techs who wrote it are not.
Quit trying to understand technical and legal matters you don't have a clue about by Googling things and finding Journalist's ignorant reports about. it get's you only more ignorance. . . and makes you look like a fool.
But, Okie, the Communications Assistance for Law Enforcement Act (CALEA) a FEDERAL LAW, passed by the 103rd Congress In 1994 actually PROHIBITS the FBI and the Courts from requiring a manufacturer of any telecommunications hardware, software, including firmware<.I> from modifying the user's encryption. The pertinent Section 103 of CALEA:
(Sec. 103) Provides that this Act does not authorize law enforcement agencies or officers to: (1) require any specific design of equipment, facilities, services, features, or system configurations to be adopted by providers of wire or electronic communication service, manufacturers of telecommunications equipment, or providers of telecommunications support services; or (2) prohibit the adoption of any equipment, facility, service, or feature by such entities.Prohibits a carrier (or manufacturer for the purposes of the Act) from being responsible for decrypting or ensuring the Government's ability to decrypt any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and the carrier possesses the information to decrypt the communications.
Apple provided the San Bernardino Terrorist's iCloud encrypted backups under a legally executed search warrant because Apple had the data, it was stored on the iCloud servers using Apple provided encrypted storage and Apple possessed the keys to decrypt it (the communications). For the iPhone 5c, Apple did NOT possess the data on that phone, did not possess the key, did not possess the information to decrypt it (It required actually CREATING that information, i.e rewriting iOS 7 or 8 to be installed on it without damaging the data being sought), and therefore it did NOT MEET THE REQUIREMENTS OF THE LAW.
Good for Apple...
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.