Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

mitty14u2

(1,015 posts)
Sat Feb 20, 2016, 02:53 PM Feb 2016

Battle Over San Bernardino Shooter's iPhone Escalates

Source: bloomberg.com

February 19, 2016 — 6:42 PM CST

The case centers around whether the government can require Apple to write new software to compromise a key security feature of the company’s iOS mobile operating system. The government argues this is a one-off request that will aid an important terrorist investigation, while Apple Chief Executive Officer Tim Cook has said it could lead to the government, criminals or other parties gaining the ability to “intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.”
Apple Assistance

Apple executives said on Friday that they tried to help law enforcement unlock the phone, including sending engineers to San Bernardino. Apple employees attempted to help investigators reconnect the handset to a Wi-Fi network that Farook had used in the past, a move that would allow the data to be available because the phone would automatically back up and move outside Apple’s encryption barriers. But the effort wasn’t possible because the iPhone’s Apple ID password had been reset by a county official after the shooting.

Had the password not been changed, Apple said the court battle wouldn’t have been necessary. Apple says its engineers could rewrite its software to circumvent its safeguards, but is refusing because executives believe it would weaken all iPhones. Encryption tools are necessary to protect customer data from hackers and data breaches, executives said.


Apple has previously complied with prosecutors when they had a court order under the All Writs Act, a law that compels third parties to take “non-burdensome” steps to help law enforcement carry out search warrants. Apple’s cooperation changed recently when a judge in Brooklyn, in a case involving the iPhone of an accused drug dealer, questioned whether the government can still rely on that law.




Read more: http://www.bloomberg.com/news/articles/2016-02-19/u-s-files-new-request-to-force-apple-to-help-in-iphone-probe



What I can Figure Out is every kind of law enforcement wants easy access to phones any time for any reason, breaking into peoples phones by say the FBI without warrants is the same as walking in your house, going through your mail, dressers and installing cameras when ever they deem maybe necessary.
21 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Battle Over San Bernardino Shooter's iPhone Escalates (Original Post) mitty14u2 Feb 2016 OP
A county official screwed this up? underpants Feb 2016 #1
My jaw is on the floor...... dixiegrrrrl Feb 2016 #4
Grrrr noretreatnosurrender Feb 2016 #2
We don't know that passiveporcupine Feb 2016 #11
Not MS, Apple. Unknown Beatle Feb 2016 #15
All i know angrychair Feb 2016 #3
Other companies would happily do it. christx30 Feb 2016 #7
Not likely Massacure Feb 2016 #19
Yep, you got that figured out. dixiegrrrrl Feb 2016 #5
another phase begins. im looking harder at Apple. Rose77 Feb 2016 #6
They might want access to any phone for any reason. Igel Feb 2016 #8
How did the "county official" reset the password? ucrdem Feb 2016 #9
Maybe the new password will not access the old info? passiveporcupine Feb 2016 #12
As I understand it from reading a number of articles davepdx Feb 2016 #14
once things went digital there went privacy olddots Feb 2016 #10
Maybe if the FBI is pureley interested in gladium et scutum Feb 2016 #13
This is exactly what I've been thinking all along KathieG Feb 2016 #16
Defense can request full access... TipTok Feb 2016 #20
Giving the phone to Apple would result ManiacJoe Feb 2016 #17
I can see that gladium et scutum Feb 2016 #18
I got hacked mid-air while writing an Apple-FBI story mitty14u2 Feb 2016 #21

dixiegrrrrl

(60,010 posts)
4. My jaw is on the floor......
Sat Feb 20, 2016, 03:44 PM
Feb 2016

They want Apple to write new code, thus setting a very dangerous precedent, because some yokel messed up the phone?

passiveporcupine

(8,175 posts)
11. We don't know that
Sat Feb 20, 2016, 07:35 PM
Feb 2016

the problem is that it could end up in the wrong hands, or being misused. If it could only be used with a legit warrant, I'd be OK with it, except for the fact there was a way to get that info without this new software and this request is only needed because someone messed up by resetting a password.

Bet that won't happen again.

I understand their need to get into this guy's phone...but they had their chance and messed it up. Now it's probably time to back MS on this.

Unknown Beatle

(2,672 posts)
15. Not MS, Apple.
Sun Feb 21, 2016, 12:58 AM
Feb 2016

I agree with noretreatnosurrender. TPTB don't want any citizen to have privacy, especially the NSA.

Read post #13.

christx30

(6,241 posts)
7. Other companies would happily do it.
Sat Feb 20, 2016, 04:36 PM
Feb 2016

"Would you like the icon in cornflower blue?"
Apple is trying to prevent the precedent. The last thing we need is more opportunities for the FBI and NSA to snoop on us.

Massacure

(7,525 posts)
19. Not likely
Sun Feb 21, 2016, 11:20 PM
Feb 2016

Even if another company got its hand on the iOS source code and modified it, the iPhone won't load the OS unless it's been signed with Apple's electronic signature.

Igel

(35,350 posts)
8. They might want access to any phone for any reason.
Sat Feb 20, 2016, 04:43 PM
Feb 2016

But in this case, the user's dead, the owner has given permission, and the court says the info should be provided.

It's unclear whose rights would be violated, except for the suspicion and fear that if the code existed it could escape and be used by other people on other phones, or the courts could start arguing that if you hack a phone with the owner's permission it's no different from hacking the phone over the owner's objections.

In this case no warrant is necessary. That means the real issue is whether this would be onerous for Apple to do and weighing the risk that the code could escape.

Of course, if I were on the short-list to produce that code, I'd be annoyed. The most likely suspicion would be that I'd turn the code over for money or ideology to some other group. Of course, there's the alternative--that if people knew I'd hacked the phone with permission I might be kidnapped (and my wife or kid) until I divulge the company secrets. That, of course, would require that they knew it was me and that the software itself hadn't changed over time.

It's a hard case that'll produce, I'm sure, some incredibly bad law.

ucrdem

(15,512 posts)
9. How did the "county official" reset the password?
Sat Feb 20, 2016, 04:49 PM
Feb 2016

Who is this person and how did he or she happen to have the phone in their possession? And if they reset the password why not just use the new password?

I'm privately calling bullshit but publicly saying oh dear oh dear.

davepdx

(224 posts)
14. As I understand it from reading a number of articles
Sat Feb 20, 2016, 11:33 PM
Feb 2016

there are two passwords involved. One to log onto the phone itself (with the 10 failed attempts resulting in a iPhone reset) and one for the Apple account where the iCloud backup is performed. It was this latter password which was reset/changed by the County employee. If the AppleID account's password is changed, say from a web browser on a desktop computer, then to log on again to the iCloud it would require physically accessing the iPhone in question (which can't be done because it is password protected) in order to enter the "new" iCloud password which would be required to do an actual contemporary backup.

As for your question about how the password change was accomplished: I think it was done via a password reset request. See here:

https://support.apple.com/en-us/HT201355

As I understand it the password change to the iCloud backup (AppleID password) essentially decoupled the iPhone in question from iCloud.

gladium et scutum

(808 posts)
13. Maybe if the FBI is pureley interested in
Sat Feb 20, 2016, 10:46 PM
Feb 2016

the information on the phone they should hand the phone over to Apple, telling them "we don't care how you get the information from the memory, we just want the information. Don't care how you do it, don't want an app to do it, we just want the information on that phone.

KathieG

(2,049 posts)
16. This is exactly what I've been thinking all along
Sun Feb 21, 2016, 01:23 AM
Feb 2016

Why can't they just give the phone to Apple to extract the information for them?

 

TipTok

(2,474 posts)
20. Defense can request full access...
Mon Feb 22, 2016, 09:05 AM
Feb 2016

... To challenge the validity of the data.

Puts it all out in the open. Especially a new extraction method...

ManiacJoe

(10,136 posts)
17. Giving the phone to Apple would result
Sun Feb 21, 2016, 04:48 AM
Feb 2016

in the FBI losing control of the data on the phone.
Legally there would be a chain of custody problem.
Outside of the legal stuff, the FBI is not interested in sharing the data with the public.

gladium et scutum

(808 posts)
18. I can see that
Sun Feb 21, 2016, 07:25 AM
Feb 2016

But apple does not want give the FBI at tool that could be used to extract this type of data for any apple cell phones. Also a very strong consideration.

mitty14u2

(1,015 posts)
21. I got hacked mid-air while writing an Apple-FBI story
Fri Feb 26, 2016, 01:15 PM
Feb 2016

“I don’t really need to worry about online privacy,” I used to think. “I’ve got nothing to hide. And who would want to know what I’m up to, anyway?”

Just before midnight last Friday, my plane touched down in Raleigh after a three-hour flight from Dallas. As usual, I’d spent much of the flight working, using American Airlines Gogo in-flight Internet connection to send and answer emails. As I was putting on my jacket, a fellow in the row behind me, someone I hadn’t even noticed before, said: “I need to talk to you.” A bit taken aback, I replied, “It’s late … need to get home.”

“I hacked your email on the plane and read everything you sent and received. I did it to most people on the flight.” He had verbatim detail of a long email that he repeated back to me essentially word for word.

I asked Abdo what we could to do protect our privacy. This is what he told me:

Call your representatives in Congress and on a statewide level and express your support for Apple in this case. Here’s a list of all U.S. members of the House and Senate. https://www.congress.gov/members

Make sure your devices are using their built-in encryption features. That’s FileVault for Apple devices and BitLocker on Windows products.

Use a password manager to help you create and store different — and strong — passwords for all your accounts. Don’t use the same password repeatedly, and don’t ever use passwords like “password” or “123456.” Some popular ones include DashLane, LastPass, and Sticky Password.

Download WhatsApp, Telegram, or Signal, messaging apps that go great distances in encrypting voice and electronic messages. Keep in mind that even they are not 100% secure.


Read more: http://www.usatoday.com/story/tech/columnist/2016/02/24/got-hacked-my-mac-while-writing-story/80844720/

Latest Discussions»Latest Breaking News»Battle Over San Bernardin...