Posted on 02/17/2016 6:13:36 PM PST by AlienCrossfirePlayer
An Open Memo To Lou Dobbs
As CEO, Tim Cooks obligation is to execute the corporate mission. Briefly stated, a corporation must deliver product to customers and return on investment to shareholders. It is not his job to make the nation secure from geo-political terrorism. Your suggestion that Mr. Cook will be culpable when another attack occurs was a stinking cheap shot. Obama has the job of making us secure and is failing us. Today on the sister network Fox News Channel, Obama was heard calling for improved cyber security. Do you see an irony?
By resisting encroachment by the courts, Mr. Cook is executing the corporate mission. Apples customers dont want their data to be made less secure. Apples investors dont want their research dollars to be wasted. In short courts are demanding that Apple degrade its very excellent product. Leave Apple alone. American citizens want their private data to remain secure.
Ben Franklin: He who would trade liberty for some temporary security, deserves neither liberty nor security.
A question ain't really a question if you know the answer too...(John Prine in Far From Me
The Feds always want unfettered aspect to all out lives and "secrets" - no matter how they phrase their own questions.
4 digits is the default ... they could have used a 6 digit if they so chose.
The 70 times were prior to iOS 8 and 9. The security in them was strengthened so there is no “precedent”.
To: All
Lots of shaky âfactsâ in this article...first off all 70 times were prior to iOS ver. 8...Apple improved customerâs security with ver. 8 & 9. All data is now encrypted with 256 bit AES and Apple has lost the ability to read the data. The FBI is now looking for a crack for the âanti-brute forceâ protections (10 password tries then phone erases itself & the âtimer functionsâ that require more & more time between password tries) so they can attempt to âbrute-force â the terroristâs password. Secondly, in the âNew York Caseâ that the article is based on, the government used the âAll Writs Actâ (not a search warrant as the article states), and the judge in that case clearly indicated that the All Writs Act probably doesnât compel Apple to attempt to crack itâs own security:
âIn October 2015, Magistrate Judge James Orenstein of the U.S. District Court for the Eastern District of New York, expressed strong doubts that he had legal authority to order Apple to unlock an iPhone in government possession.â
He said:
â[Apple] is a private-sector company that is free to choose to promote its customersâ interests in privacy over the competing interest of law enforcement,â wrote Orenstein in his memorandum and court order.â
http://www.cnbc.com/2016/02/17/the-esoteric-law-being-used-to-fight-apple.html
So the current judge is on shaky ground when using the âAll Writs Actâ.
New York Case:
https://ia801501.us.archive.org/27/items/gov.uscourts.nyed.376325/gov.uscourts.nyed.376325.2.0.pdf
San Bernardino case judge order:
https://www.documentcloud.org/documents/2714001-SB-Shooter-Order-Compelling-Apple-Asst-iPhone.html
40 posted on â2â/â17â/â2016â â21â:â48â:â32 by Drago
[ Post Reply | Private Reply | To 25 | View Replies | Report Abuse]
Listen fool. I understand the constitution just fine! You however, have no clue about technology or encryption.
Encryption, ciphers, have been around a long time. The concept and desire to secure comminucations is ancient.
Did you know that at one time, the US government classified encryption technology as a munition. Why? Export control. We had the best stuff at the time and we didn’t want other guys to get their hands on it.
That all changed some years back. It went offshore. Encryption is math and algorithms. You can’t control that and you can’t control the other guys, so that particular issue became moot.
And while your average joe with his desktop PC didn’t really see the need for encryption back in the day, that too has changed since we began carrying around full blown computers with gigabytes of data in our pockets. And when criminals, hackers and thieves began breaking into systems to steal our credit card numbers and identities so other people can rob us and illegals have a clean identity.
You want to get rid of the issue? Fine. Outlaw computers.
Want to educate yourself on the subject, go over to Wiki and type in encryption. You can spend a great deal of time reading up on the issue.
Not sure, just a guess from a flip phone user, but to clone it, you would have to gain access, to gain access you have to know the password ...
And after AAPL cracks the phone in question in their super secret underwater Marianas Trench lab, the FBI subpoenas the tools AAPL used and then use those same tools to crack other iPhones.
See how that works ... even you agree that AAPL should not give them the info (tools).
Which is why this issue will be decided by SCOTUS.
Nice notion but all the government has to do is take that militia conservative's phone to Apple and order them to bypass the key wipe. BTW, it isn't a crack, it is a key wipe bypass that the govt wants and that's a worse security flaw.
Refusing something that is close to impossible is not obstruction, refusing to create a ‘nuclear weapon’ and give it to someone else to use at will is not obstruction.
And this whole exercise is predicated on the supposition that:
The 10 try’s and wipe is turned on (it probably is, but there’s no way to know)
The data is still there. Supposedly the Feds know that right before the attack, a backup to the cloud was done, and then backups were turned off. Who’s to say the guy didn’t wipe his phone. Reset it to factory condition and then re key it. The old data would still be on the flash (encrypted with the old key) but the act of rekeying would prep the drive for new encryption. And the data, even if you could get at it before it’s overwritten, would still be encrypted, but the keys are gone.
I don’t think this is about the data anymore. This is about creating a wedge issue. This is about using well meaning people by giving them a reasonable argument that it’s just about this one phone.
It’s not. The endgame is a backdoor.
We are in complete agreement.
As I understand it, and I acknowledge I could well be wrong, the 4th amendment, like the other Bill of Rights, was not written to protect a government power, but to restrict a government power. The people benefit from it by what the government can’t do, rather than by what it allows the government to do. That being said, the current situation would likely not be too understandable to the authors of the fourth.
But what if I, a master criminal, write my journal in an unbreakable code, like say the Voynich manuscript. In the midst of my crime spree I am killed. Could a court order a person or company, say the company that produced the blank journal, to decode my writings. And what if they couldn’t?
The fact is, that the ability of people to be able possess data beyond the reach of government—even a court order—has riled governments for quite a while. Twenty some years ago, they wanted ‘back door’ provided to them to them built into all computer operating systems. That effort failed. It is my opinion that they are just using the San Bernardino case to finally get what they wanted—using a judge’s writ rather than to go to the trouble of acrtually passing a law.
Remember the house the FBI briefly searched and then let the landlord open up to the press? I imagine there was more useful terrorist data left there than in the guy’s county-provided cell phone. Did any data come from the smashed cell phones that actually belonged to the terrorists?
“Want to educate yourself on the subject, go over to Wiki and type in encryption. You can spend a great deal of time reading up on the issue.”
Riiiiight. Wiki. The fountain of all knowledge. No, now that ypu have enlightened me, I see your point. Let Apple simply say sorry, that can’t be done and we ignore the Warrant. Because THAT won’t create any problems. Please.
Yeah, true... but that takes more effort than the FBI is willing to expend on running after the political enemies of liberal elites.
Give the terrorist’s phone to Apple and TELL them to crack it and hand over the information. Twenty-four hours should be more than enough...
In order to crack this particular phone, they want Apple to create a back-door that can be applied to any iPhone with the “offensive” encryption.
The government focuses their argument on the one phone because to admit that they would gain access to al such phones would harm their case.
Apple does not possess or have access to the password and encryption keys. The only way for the government to gain access is for Apple to create a “back door” operating system.
The government appears to be deliberately creating a false sense of limit in the effects of this case, much like when seat belts were “never going to be a primary offense” that could cause one to be stopped.
Life doesn’t have to be all or nothing.
The FBI should have the information on the phone ‘of the terrorists’ - - like YESTERDAY.
As far as apple handing over the keys to the phone? NO WAY. Apple should keep the keys and NEVER hand them over...
This is the compromise that allows APPLE to do business, the FBI to get info on ESTABLISHED KILLERS, and Conservative Americans to be safe from rouge FBI agents who think it’s their job to protect liberal elites... (Which by the way should be a crime)...
Apple should hand over the information on the phone within the next 24 hours.
Best you stick to politics - what you want cannot happen, despite your apparent belief in magic ...
Wiki was a readily available starting point for an overview. You want something else? Fine, just google: encryption, cryptography, RSA, PGP AES and code breaking for starters.
You won’t of course. You want to continue to be ignorant on the subject and spout off about things you don’t understand.
If jessduntno is just a clever way of saying: Jessie doesn’t know. Then you chose it well.
Though laws were carved in marble
They could not shelter men
Though altars built in parliaments
They could not order men
Police arrested magic and magic went with them
Mmmmm.... for magic loves the hungry
But magic would not tarry
It moves from arm to arm
It would not stay with them
Magic is afoot
It cannot come to harm
It rests in an empty palm
It spawns in an empty mind
But magic is no instrument
Magic is the end
- L. Cohen
I don’t care about the overview. I care that we catch Jihadists and Cartel members that are killing us and that any method that we can use that is legally spelled out be employed in that tactic. To say that someone you know nothing of does not have something BECAUSE THEY SAY SO flouts that. That was my stance when i began. Side with the Constitution and the defense of Americ.
I don’t know what you are defending, but it seems to be pretty stident defense of something other than my concerns.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.