Posted on 02/19/2016 5:07:38 PM PST by rpierce
The Apple ID passcode for the San Bernardino shooter's iPhone was changed less than 24 hours after authorities took possession of the device, a senior Apple executive said today.
And Apple could have recovered information from the phone had the Apple ID passcode not been changed, Apple said.
If the phone was taken to a location where it recognized the Wi-Fi network, such as the San Bernardino shooters' home, it could have been backed up to the cloud, Apple suggested. ... The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.
(Excerpt) Read more at abcnews.go.com ...
Was this a local IT type who thought he/she knew what they were doing a royally screwed the pooch?
Was this someone acting on verbal orders to make sure information on there was unrecoverable - to protect other sleepers?
Was this intentional, so that they could push for even weaker encryption and/or deeper, more comprehensive holes in the security. As in "Look, existing capabilities aren't enough, a simple mistake can deny law enforcement all this critical information..."
I don’t think so. One would still have to log in with the original password
Yes, and that's why I have no sympathy for the county IT guy, whatsoever. On a case like this, that phone should have been placed in a sealed evidence bag until the person in charge of the investigation said otherwise.
Would the entity that did THIS and never got into legal trouble also do THIS..?
Of COURSE they would..!!
Thanks.
#10 yeah but they were trying to hide from public because barky didn’t want to o call it
Islamic terrorism
This is what Rush was talking about today. The one-off exception is an FBI cover story. What they really want is the ability to get into anybody's phone.
You understand that, I understand that ... just trying to understand the post.
Does it?
He's given the feds the perfect excuse to do exactly what they wanted, learn how to tap into every iPhone.
I would be surprised if he gets a BIG bonus and promotion.
"So the county IT guy decided to get creative and set an unfortunate chain of events in motion. Sucks to be him right about now."
Let's not be so quick to judge.
Is there ANYONE in High Places, like, oh, for instance, a certain White Mosque, whose homeys would benefit from having the information slow-walked out - even totally prevented from coming out all together?
“So the county IT guy decided to get creative and set an unfortunate chain of events in motion. Sucks to be him right about now. “
You didn’t read the rest of the article:
“Apple executives say the phone was in the possession of the government when that passcode was reset. A federal official familiar with the investigation confirmed that federal investigators were indeed in possession of the phone when the reset occurred.”
In other words, the FBI blatantly lied in their court filing to try to cover-up their own incompetence by blaming some IT schlub in the San Berdoo Health Department.
Whoa...
What a pickle.
He was the Olympic Park bombing HERO, but Bill Clinton ordered the FBI to make him the perp.
The FBI willingly complied.
I’ll bet that somewhere, on page 192 of a large white binder, it says:
“If someone is no longer employed by the county, but has failed to turn in his iPhone, then the administrator should remotely reset the password to insure that confidential data remains secure.”
The Hillary campaign has asked him to join.
Grab your tin foil hat, folks. A smell a cover-up and the phone Apple looked at MIGHT NOT EVEN BE THE ORIGINAL 'FAROOK' PHONE!
This sounds like there is an administrator or super-user passcode the county had.
Frankly I don’t know how that works. I understand it was a county phone but not sure how the IT guy did this.
From an article I just read it makes it much more difficult for Apple to even get into it even of they wanted to.
They would have to come up with new software to even try. So they don’t have an immediate way to get into that phone themselves.
I still don’t know what is on that phone they can’t get from the cell phone provider. I think this is another excuse to get a back door into anyone’s phone.
So:
1. The original pass code was known, because you need it to change it.
2. The current pass code is known, because the county employee set it.
3. The problem is therefore that the county employee won't tell the FBI what the new passcode is - or did tell them the new pass code, but they're not admitting they have it.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.