Apple wont open terrorist cell phone so FBI can see who they had contact with,,,,,,,,,Trump had a good idea to boycott Apple
Printable View
Apple wont open terrorist cell phone so FBI can see who they had contact with,,,,,,,,,Trump had a good idea to boycott Apple
Apple states that doing so could create a back door hack that could jeopardize all Apple products, I don't understand why the FBI couldn't simply visit Apple corporate, have them open the phone for them, they don't have to issue hack info to anyone. Seems like they are drawing a line in the sand like they see a slippery slope here?
I support apple for not compromising their security encryption. A terrorist is worst case scenario but it has been said before, it's a slippery scope.
Why cant apple just do it and print off a transcript of the txts, emails, and contacts?
Im also somewhat shocked that an Iphone has encryption that can defeat the FBI. Either that or the FBI doesnt want to admit they know how to defeat Apples encryption......
I agree, why can't they just open the phone and get the info, copy the info then give the info over to the FBI.... everyone wins....after all we are talking terrorists. I don't see the slippery slope at all.
It's a very misleading post by the OP. Apparently Apple (and I say this as one of the biggest Apple-haters on the planet) has been very helpful in everything the FBI has asked them.
They can crack individual phones no problem. What they refuse to do is develop a cracking program that could potentially be used to ne'er-do-wells to bust into EVERYONE's iphone.
Here is Apple's letter.
Pay special attention to the part that reads:Quote:
February 16, 2016A Message to Our Customers
The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.
This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.
The Need for Encryption
Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.
All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.
Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.
For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.
The San Bernardino Case
We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.
When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.
We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
The Threat to Data Security
Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.
In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.
The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.
The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.
We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.
A Dangerous Precedent
Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.
The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.
The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.
Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.
We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.
While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.
Tim Cook
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
Apple has a very valid point. It is,without doubt,chilling stuff. Using an obscure law from 1789 really defies all logic. Apple could contest the Act and take it to court,taking this case up all the way to SCOTUS which could take many years to resolve. The FBI and the US government need to be very careful that the bad guys don't simply revert to "old school" communications trade craft which can't be traced or tracked without an electronic footprint.
Good post Oddmott. I too detest the Apple cult but it is indeed a very slippery slope.
I prefer samsung products but i am glad that apple isnt helping government agencies spy on all of their customers. Wouldnt be too good for business if they complied with this especially in the us where they are all about their rights and freedoms.
I love America. Apple is the bad guy for wanting to protect everyone who has a smart phone but the fact that people can buy assault rifles and tactical vests and parts online to modify rifles and go on mass shootings is part of their rights and freedom.
Like the letter says....at present even Apple does not have the ability to crack the code on this phone! Building a back door into all future devices would pretty well sink their share of the market as well as the company.
Sounds just like the politicians who condemn a gun maker because someone uses their product to rob a bank so we must limit the mag size....
I don't trust the government - if the government would have done it's job the shooting would not have occurred in the first place - remember this - throughout history it is the government that enslaves its people - they want to see if they can use any info on the iphone that might lead them to more terrorists but at the same time millions of illegal immigrants are streaming across the southern border and people coming into the country on false vistas and nothing is done - its a joke -
https://ca.news.yahoo.com/san-bernar...opstories.html
The password for the San Bernardino shooter's iCloud account associated with his iPhone was reset hours after authorities took possession of the device.
The Justice Department acknowledged in its court filing that the password of Syed Farook's iCloud account had been reset. The filing states, "the owner [San Bernardino County Department of Public Health], in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup."
Apple could have recovered information from the iPhone had the iCloud password not been reset, the company said. If the phone was taken to a location where it recognized the Wi-Fi network, such as the San Bernardino shooters' home, it could have been backed up to the cloud, Apple suggested.
Apple Slams Judge's Order to Unlock Shooter's Phone
The FBI and the IPhone: How Apple's Security Features Have Locked Investigators Out
The auto reset was executed by a county information technology employee, according to a federal official. Federal investigators only found out about the reset after it had occurred and that the county employee acted on his own, not on the orders of federal authorities, the source said.
Apple executives say the iPhone was in the possession of the government when iCloud password was reset. A federal official familiar with the investigation confirmed that federal investigators were indeed in possession of the phone when the reset occurred.
Missing the opportunity for a backup was crucial because some of the information stored on the phone would have been backed up to the iCloud and could have potentially been retrieved. According to court records, the iPhone had not been backed up since Oct. 19, 2015, one-and-a-half months before the attack and that this “indicates to the FBI that Farook may have disabled the automatic iCloud backup function to hide evidence.”
The development comes as the Justice Department is pushing forward with its legal fight against Apple, urging a federal judge to compel the tech giant to help the FBIcrack open an iPhone left behind by Farook.
Farook, who along with his wife, Tashfeen Malik, launched a deadly assault on Dec. 2, 2015, killing 14 of Farook's coworkers at a holiday party.
The Justice Department has asked Apple to turn off the feature that erases an iPhone's data after 10 failed attempts to unlock the device so that investigators can run all possible combinations to break the four-digit passcode on Farook's phone. A federal judge ordered Apple to help the FBI but the company has said it plans to fight the order.
Prosecutors said Farook's device could be encrypted to the point that its content would be "permanently inaccessible," and, "Apple has the exclusive technical means which would assist the government in completing its search."
After the court order, Apple quickly vowed to challenge the decision.
"The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers," Apple CEO Tim Cook said in a statement to customers Tuesday night. "[T]his order ... has implications far beyond the legal case at hand."
"The FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on [the shooter's] iPhone," Cook added. "In the wrong hands, this software -- which does not exist today -- would have the potential to unlock any iPhone in someone’s physical possession."
In addition, all of the personal and sensitive information on customers' phones "needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission," Cook wrote.
If the battle between the FBI and Apple continues, it's a matter that could work its way up to the U.S. Supreme Court.
Apple can take possession of the phone, crack its encryption, give the data to FBI, and destroy the program all in an afternoon.
The problem is, once that is done, you can't expect a team of EEs to not remember how they did it.
You simply can't unring a bell.
FBI should take John Mcafee's offer ( founder of Mcafee anti virus )? He said he will hack it in 3 week's . He understand's and appreciates apple's reluctancy to build a back door into it . I believe he said he would.nt be building software rather hacking.
Haha love this http://uploads.tapatalk-cdn.com/2016...29b114cf06.jpg
Another gem from Twitter http://uploads.tapatalk-cdn.com/2016...840d31e5b6.jpg