Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

[Vanity] Apple vs FBi
self | 2016-02-17 | Self

Posted on 02/17/2016 6:13:36 PM PST by AlienCrossfirePlayer

An Open Memo To Lou Dobbs

As CEO, Tim Cooks obligation is to execute the corporate mission. Briefly stated, a corporation must deliver product to customers and return on investment to shareholders. It is not his job to make the nation secure from geo-political terrorism. Your suggestion that Mr. Cook will be culpable when another attack occurs was a stinking cheap shot. Obama has the job of making us secure and is failing us. Today on the sister network Fox News Channel, Obama was heard calling for improved cyber security. Do you see an irony?

By resisting encroachment by the courts, Mr. Cook is executing the corporate mission. Apples customers dont want their data to be made less secure. Apples investors dont want their research dollars to be wasted. In short courts are demanding that Apple degrade its very excellent product. Leave Apple alone. American citizens want their private data to remain secure.

Ben Franklin: He who would trade liberty for some temporary security, deserves neither liberty nor security.


TOPICS: Government; US: California; War on Terror; Your Opinion/Questions
KEYWORDS: 4thamendment; apple; california; fbi; loudobbs; privacy; sanbernadino; sanbernardino
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160161-166 next last
To: SuzyQue
So, I’ve heard two different stories: 1) the Feds just want some help cracking this particular phone and 2) the Feds want a generic back-door to Apple phones. Which is it?

A question ain't really a question if you know the answer too...(John Prine in Far From Me

The Feds always want unfettered aspect to all out lives and "secrets" - no matter how they phrase their own questions.

141 posted on 02/18/2016 3:47:54 AM PST by trebb (Where in the the hell has my country gone?)
[ Post Reply | Private Reply | To 7 | View Replies]

To: hanamizu

4 digits is the default ... they could have used a 6 digit if they so chose.


142 posted on 02/18/2016 3:48:43 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 32 | View Replies]

To: minnesota_bound

The 70 times were prior to iOS 8 and 9. The security in them was strengthened so there is no “precedent”.
To: All

Lots of shaky “facts” in this article...first off all 70 times were prior to iOS ver. 8...Apple improved customer’s security with ver. 8 & 9. All data is now encrypted with 256 bit AES and Apple has lost the ability to read the data. The FBI is now looking for a crack for the “anti-brute force” protections (10 password tries then phone erases itself & the “timer functions” that require more & more time between password tries) so they can attempt to “brute-force “ the terrorist’s password. Secondly, in the “New York Case” that the article is based on, the government used the “All Writs Act” (not a search warrant as the article states), and the judge in that case clearly indicated that the All Writs Act probably doesn’t compel Apple to attempt to crack it’s own security:

“In October 2015, Magistrate Judge James Orenstein of the U.S. District Court for the Eastern District of New York, expressed strong doubts that he had legal authority to order Apple to unlock an iPhone in government possession.”

He said:

“[Apple] is a private-sector company that is free to choose to promote its customers’ interests in privacy over the competing interest of law enforcement,” wrote Orenstein in his memorandum and court order.”

http://www.cnbc.com/2016/02/17/the-esoteric-law-being-used-to-fight-apple.html

So the current judge is on shaky ground when using the “All Writs Act”.

New York Case:
https://ia801501.us.archive.org/27/items/gov.uscourts.nyed.376325/gov.uscourts.nyed.376325.2.0.pdf

San Bernardino case judge order:
https://www.documentcloud.org/documents/2714001-SB-Shooter-Order-Compelling-Apple-Asst-iPhone.html

40 posted on ‎2‎/‎17‎/‎2016‎ ‎21‎:‎48‎:‎32 by Drago

[ Post Reply | Private Reply | To 25 | View Replies | Report Abuse]


143 posted on 02/18/2016 3:54:27 AM PST by mad_as_he$$
[ Post Reply | Private Reply | To 17 | View Replies]

To: jessduntno

Listen fool. I understand the constitution just fine! You however, have no clue about technology or encryption.

Encryption, ciphers, have been around a long time. The concept and desire to secure comminucations is ancient.

Did you know that at one time, the US government classified encryption technology as a munition. Why? Export control. We had the best stuff at the time and we didn’t want other guys to get their hands on it.

That all changed some years back. It went offshore. Encryption is math and algorithms. You can’t control that and you can’t control the other guys, so that particular issue became moot.

And while your average joe with his desktop PC didn’t really see the need for encryption back in the day, that too has changed since we began carrying around full blown computers with gigabytes of data in our pockets. And when criminals, hackers and thieves began breaking into systems to steal our credit card numbers and identities so other people can rob us and illegals have a clean identity.

You want to get rid of the issue? Fine. Outlaw computers.

Want to educate yourself on the subject, go over to Wiki and type in encryption. You can spend a great deal of time reading up on the issue.


144 posted on 02/18/2016 4:05:45 AM PST by AFreeBird
[ Post Reply | Private Reply | To 132 | View Replies]

To: Paladin2

Not sure, just a guess from a flip phone user, but to clone it, you would have to gain access, to gain access you have to know the password ...


145 posted on 02/18/2016 4:08:16 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 87 | View Replies]

To: GOPJ

And after AAPL cracks the phone in question in their super secret underwater Marianas Trench lab, the FBI subpoenas the tools AAPL used and then use those same tools to crack other iPhones.

See how that works ... even you agree that AAPL should not give them the info (tools).

Which is why this issue will be decided by SCOTUS.


146 posted on 02/18/2016 4:15:07 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 109 | View Replies]

To: GOPJ
They should NOT give the FBI information on how to crack the codes themselves... Get the wrong person in there and they'll be like the IRS - spying on Conservative groups.

Nice notion but all the government has to do is take that militia conservative's phone to Apple and order them to bypass the key wipe. BTW, it isn't a crack, it is a key wipe bypass that the govt wants and that's a worse security flaw.

147 posted on 02/18/2016 4:17:00 AM PST by palmer (Net "neutrality" = Obama turning the internet over to foreign enemies)
[ Post Reply | Private Reply | To 109 | View Replies]

To: Outlaw76

Refusing something that is close to impossible is not obstruction, refusing to create a ‘nuclear weapon’ and give it to someone else to use at will is not obstruction.


148 posted on 02/18/2016 4:17:05 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 113 | View Replies]

To: mad_as_he$$

And this whole exercise is predicated on the supposition that:

The 10 try’s and wipe is turned on (it probably is, but there’s no way to know)

The data is still there. Supposedly the Feds know that right before the attack, a backup to the cloud was done, and then backups were turned off. Who’s to say the guy didn’t wipe his phone. Reset it to factory condition and then re key it. The old data would still be on the flash (encrypted with the old key) but the act of rekeying would prep the drive for new encryption. And the data, even if you could get at it before it’s overwritten, would still be encrypted, but the keys are gone.

I don’t think this is about the data anymore. This is about creating a wedge issue. This is about using well meaning people by giving them a reasonable argument that it’s just about this one phone.

It’s not. The endgame is a backdoor.


149 posted on 02/18/2016 4:53:30 AM PST by AFreeBird
[ Post Reply | Private Reply | To 143 | View Replies]

To: AFreeBird

We are in complete agreement.


150 posted on 02/18/2016 5:18:28 AM PST by mad_as_he$$
[ Post Reply | Private Reply | To 149 | View Replies]

To: mrsmith

As I understand it, and I acknowledge I could well be wrong, the 4th amendment, like the other Bill of Rights, was not written to protect a government power, but to restrict a government power. The people benefit from it by what the government can’t do, rather than by what it allows the government to do. That being said, the current situation would likely not be too understandable to the authors of the fourth.

But what if I, a master criminal, write my journal in an unbreakable code, like say the Voynich manuscript. In the midst of my crime spree I am killed. Could a court order a person or company, say the company that produced the blank journal, to decode my writings. And what if they couldn’t?

The fact is, that the ability of people to be able possess data beyond the reach of government—even a court order—has riled governments for quite a while. Twenty some years ago, they wanted ‘back door’ provided to them to them built into all computer operating systems. That effort failed. It is my opinion that they are just using the San Bernardino case to finally get what they wanted—using a judge’s writ rather than to go to the trouble of acrtually passing a law.

Remember the house the FBI briefly searched and then let the landlord open up to the press? I imagine there was more useful terrorist data left there than in the guy’s county-provided cell phone. Did any data come from the smashed cell phones that actually belonged to the terrorists?


151 posted on 02/18/2016 6:56:12 AM PST by hanamizu
[ Post Reply | Private Reply | To 126 | View Replies]

To: AFreeBird

“Want to educate yourself on the subject, go over to Wiki and type in encryption. You can spend a great deal of time reading up on the issue.”

Riiiiight. Wiki. The fountain of all knowledge. No, now that ypu have enlightened me, I see your point. Let Apple simply say sorry, that can’t be done and we ignore the Warrant. Because THAT won’t create any problems. Please.


152 posted on 02/18/2016 8:40:56 AM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 144 | View Replies]

To: palmer

Yeah, true... but that takes more effort than the FBI is willing to expend on running after the political enemies of liberal elites.

Give the terrorist’s phone to Apple and TELL them to crack it and hand over the information. Twenty-four hours should be more than enough...


153 posted on 02/18/2016 9:31:58 AM PST by GOPJ (Hillary has 416 'superdelegates'... Bernie has 14...Democrats don't trust the people - it's rigged.)
[ Post Reply | Private Reply | To 147 | View Replies]

To: SuzyQue

In order to crack this particular phone, they want Apple to create a back-door that can be applied to any iPhone with the “offensive” encryption.

The government focuses their argument on the one phone because to admit that they would gain access to al such phones would harm their case.


154 posted on 02/18/2016 9:34:35 AM PST by MortMan (Let's call the push for amnesty what it is: Pedrophilia.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Georgia Girl 2

Apple does not possess or have access to the password and encryption keys. The only way for the government to gain access is for Apple to create a “back door” operating system.

The government appears to be deliberately creating a false sense of limit in the effects of this case, much like when seat belts were “never going to be a primary offense” that could cause one to be stopped.


155 posted on 02/18/2016 9:36:51 AM PST by MortMan (Let's call the push for amnesty what it is: Pedrophilia.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: PIF

Life doesn’t have to be all or nothing.

The FBI should have the information on the phone ‘of the terrorists’ - - like YESTERDAY.

As far as apple handing over the keys to the phone? NO WAY. Apple should keep the keys and NEVER hand them over...

This is the compromise that allows APPLE to do business, the FBI to get info on ESTABLISHED KILLERS, and Conservative Americans to be safe from rouge FBI agents who think it’s their job to protect liberal elites... (Which by the way should be a crime)...

Apple should hand over the information on the phone within the next 24 hours.


156 posted on 02/18/2016 9:37:13 AM PST by GOPJ (Hillary has 416 'superdelegates'... Bernie has 14...Democrats don't trust the people - it's rigged.)
[ Post Reply | Private Reply | To 146 | View Replies]

To: GOPJ

Best you stick to politics - what you want cannot happen, despite your apparent belief in magic ...


157 posted on 02/18/2016 10:22:33 AM PST by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 156 | View Replies]

To: jessduntno

Wiki was a readily available starting point for an overview. You want something else? Fine, just google: encryption, cryptography, RSA, PGP AES and code breaking for starters.

You won’t of course. You want to continue to be ignorant on the subject and spout off about things you don’t understand.

If jessduntno is just a clever way of saying: Jessie doesn’t know. Then you chose it well.


158 posted on 02/18/2016 1:58:40 PM PST by AFreeBird
[ Post Reply | Private Reply | To 152 | View Replies]

To: PIF

Though laws were carved in marble
They could not shelter men
Though altars built in parliaments
They could not order men
Police arrested magic and magic went with them
Mmmmm.... for magic loves the hungry
But magic would not tarry
It moves from arm to arm
It would not stay with them
Magic is afoot
It cannot come to harm
It rests in an empty palm
It spawns in an empty mind
But magic is no instrument
Magic is the end

- L. Cohen


159 posted on 02/18/2016 1:59:12 PM PST by GOPJ (Hillary has 416 'superdelegates'... Bernie has 14...Democrats don't trust the people - it's rigged.)
[ Post Reply | Private Reply | To 157 | View Replies]

To: AFreeBird

I don’t care about the overview. I care that we catch Jihadists and Cartel members that are killing us and that any method that we can use that is legally spelled out be employed in that tactic. To say that someone you know nothing of does not have something BECAUSE THEY SAY SO flouts that. That was my stance when i began. Side with the Constitution and the defense of Americ.

I don’t know what you are defending, but it seems to be pretty stident defense of something other than my concerns.


160 posted on 02/18/2016 2:07:50 PM PST by jessduntno (Steady, Reliable, and (for now) Republican - Donald Trump, (D, R, I, D, R, I, R - NY) /s)
[ Post Reply | Private Reply | To 158 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160161-166 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson