Jihadists will be celebrating
They won't have to kill a bunch of innocents to get their 72 virgins. Judging by the pics provided, they just have to rock up to the local iStore.
After Tim Cook gave the FBI the finger when asked to help unlock a mass murderer's iPhone, fanbois are planning to hold rallies outside Apple stores to support the iGiant. The string of demonstrations will kick off on February 23 across the US, it's hoped. This comes after the Feds won a court order demanding Apple assist …
Jihadists will have to go to no such trouble, as hiding their phones under a rock, as they are all mercenaries hired by the CIA, they can execute their false flag attacks with impunity.
Jihadists are a figment of the media, strategically placed in your mind as a constant fear generator to make you easier to control and willing to give up your civil rights.
"Instead, it's being asked to infect Farook's iPhone 5C with a custom firmware that will allow the Feds to guess his passcode using a brute-force process without the device wiping itself after too many wrong login attempts."
Forcing someone to perform work without compensation is slavery, slave.
>> Forcing someone to perform work without compensation is slavery, slave.
Nowhere does it say that Apple will be forced to do this for free. Perhaps if you had perused the links in the various articles El Reg have written about this situation, you would have learnt that the Judge's order mentions that Apple will be compensated for their work.
per se.
But it is asking for a back door to a back door. The court order seems to be about having Apple do certain things it would not otherwise do, or even have reason to do. That such a request would be made (and I know it isn't a polite request) is disturbing. Apple's compliance--if, ultimately, any--with the specifics of the court order would set a precedent of compulsion of manufacturers, such as Apple, that is no less odious that compelling them to install a back door, per se. And end-run around the rules, as it were.
Screaming 'notional security' red-faced is poor justification for compelling a company to do your bidding, especially when their doing such a) may demonstrate the practical application of those acts in circumventing built-in security (and, also, yielding the sought-after data), but also b) will likely demonstrate that the power of compulsion can be brought to bear on even the most powerful/successful/visible corporate entity* ('pour encourager les autres'), regardless of what principles may be ground into dust in the process.
Apple does have some room to manoeuvre, though. What, ultimately, is being sought is the information on the phone. Unfortunately, the difference between the information sought after (and, remember, not demonstrably extant) and access to the device presumed to contain it is being concealed in the smoke-and-mirrors of this order for Apple to reveal as much as the court order demands.
* or, by extension, any person.
So if I read your rant correctly, if any old mass murderer was killed in their activity and the police turned up with a search warrant at his shed, the landlord would be quite right to say, "I cannot help you enter his gaff even though he might have all sorts of crap held there"?
What the rabid throngs do not appear to understand is that it is one specific phone from a known-to-be terrorist.
So, as some sentient people thought, the iPhone is the terrorist's choice and Apple are the jihadist's friends.
Unless of course it is all a giant game of bluff and counter bluff where publicly they say no, while secretly handing over the goods and thus protecting their terrorist market share and appearing to be the darling of Walter Mitty fantasists everywhere. 'Oh my data is so important I have to keep it on a pocket computer and take it everywhere.'
If it is so darned important why put it on a fragile bit of battery sucking shiny anyway?
" if any old mass murderer was killed in their activity and the police turned up with a search warrant at his shed, the landlord would be quite right to say, "I cannot help you enter his gaff even though he might have all sorts of crap held there"?"
That is a very poor analogy - The landlord has a key for the shed in question (presumably), he's not being asked to make a skeleton key that could open any (everyone's) shed. In the analogy, even if the landlord didn't have key and precluding breaking in by force then just about any locksmith ('skilled in the art') would be able to unlock the shed for them (manufacturer assistance not required). Let's go one step further and assume this shed is secured with the most secure locke from acme locks. The police ask Acme locks to open it for them, they do so, it take 3 days - they haven't made any of their other locks of the same model any less secure than they were before.
In the case of the court ordering Apple to come up with a software hack 'that will only assist in the unlocking of the phone in question' isn't possible. As soon as a solution is created in source code then changing it to open any phone is only a very small step away; opening the doors to further requests/orders from law enforcement/the courts - and the increased potential to leak that hack into the public domain.
J Bourne - Unfortunately, you do not seem to understand the request or the technology.
The request is for an old iPhone 5C model that does not have a hardware encryption, nor was it designed to be encrypted... rather that was added to the IOS of the iPhone by apple later. Second, the phone BELONGS to the Municipal government and was used by the dead killer..... there is no "privacy" issue here at all... none.
Lastly - what Apple has been asked is provide a custom image for this single device that will disable the self-destruct and a couple of other features.... and these features will not be able to be used on other phones... simply put. The idea of this making Apple phones less secure is absolutely false, and untrue. Apple will be in 100% control of how able this new software will be to be used on other devices.... you see, the code simply has to have a startup check of the specific hardware... they can code the UUID, the SIM card data, and/or anything else they want in their custom software to ensure it can ONLY work on this single iPhone 5C and no other phone. The reason it works is the same reason that the FBI cannot simply do this work themselves... the FBI cannot digitally sign the new code to allow it to load on the hardware. (and Apple will be able to better write and more easily the code, of course, given their access to the actual source code and experienced program architecture, developers, etc.).
The entire "it will let government spy on people" is just a straw argument used by Apple and is based on the ignorance of the public as part of a seeming PR campaign.
Also remember, that Apple operates its head office in the USA for a reason... the US government is (relatively) non-corrupt, and law enforcement operates based on the rule of law. If Apple does not want to abide by US laws, they should leave.
it would be a different story if one of auntie tim's beloved chihuahuas (or whatever ipooch she keeps in her handbag) went 'missing' and the location was in an encrypted mirrorball ...
so queen apple has no qualms about turning the deaths of 14 of her fellow americans into a global PR stunt
what a disgusting place this poor planet has been turned into
no wonder our neighbours don't talk to us anymore
can we just hurry up with WW3 and get it over with
"the human race has performed an illegal operation and will be shut down - please restart your civilisation" put that on a fucking t-shirt
"so queen apple has no qualms about turning the deaths of 14 of her fellow americans into a global PR stunt"
That's just part of the picture. Another part is that the FBI has no qualms about using this sad, terrible crime to further their own agenda.
To put it in perspective, the guy had three phones and he destroyed the other two. If there weren't any hidden FBI agendas, they would consider a certainty that the surviving phone -his work phone- survived because it was empty of any evidence.
Right so its fine if the NSA do it illegally, but if a legal request comes in then its a problem and "Fuck Da Police"?
I am not so sure why people are so against (viewing all the downvotes above) a company allowing police to bypass the encryption especially when they have a court order specifically to do so. This isn't a remote backdoor to access your phone any time they like, this would be a forensic tool to recover evidence that requires a warrant to access.
hell I couldn't care less if they left the tool with apple, actually would be preferable imo.
The judge has required "reasonable" efforts for this ONE SPECIFIC phone.
So the Feds won't get code that fits all phones, the feds won't ever see the code, they just get an unlocked phone.
Which means that if Apple really don't want to open it they need to argue that the effort is unreasonable. Which boils down to cost. Which the FBI should pay.
If I could be sure that this was the case, I'd be comfortable - high degrees of access for law and order are reasonable so long as it's difficult limited to specific low numbers of important cases. Not big hoovers that treat us all as suspects.
But is it? Both sides talk too much shit to trust either of them at face value.
The problem isn't so much that the request is obviously unreasonable in terms of the scope of the provided software, or the effort required on Apple's part to produce it. The problem was actually rather neatly summed up by representative Ted Lieu
"This FBI court order, by compelling a private sector company to write new software, is essentially making that company an arm of law-enforcement, [] This court order also begs the question: Where does this kind of coercion stop? Can the government force Facebook to create software that provides analytic data on who is likely to be a criminal? Can the government force Google to provide the names of all people who searched for the term ISIL? Can the government force Amazon to write software that identifies who might be suspicious based on the books they ordered?"*
Firstly: If the court has the authority to order Apple to create software, where does that authority stop? Without clearly defined bounds it looks remarkably like indentured servitude, and that's definitely not on.
Secondly: If the court can give such an order on no stronger grounds than that Apple manufactured the device in the first place, that's tantamount to saying that Apple are legally responsible for providing access to the content of the device.
The second one in particular is a very dangerous proposition. Is Google legally responsible for handing over the content of your gmail account? Should Microsoft be responsible for handing over the content of your sharepoint? It would seem that this court believes that they are, and that has very dangerous implications for both all future business operations that ever handle user data, and of course the privacy of end users.
*Shamelessly stolen from this article.
Simply put - that is not true. Based on ignorance and fear mongering, and forgetting that the US courts DO HAVE JURISDICTION simple put... Apple is a US company, the phone belongs to a US Municipality, and the crime was carried out by a US citizen in a US city, and killed 14 US citizens.
If Apple doesn't want to be under the jurisdiction of the US court system... maybe they should close up shop and move. Period.
(For the record, I am Canadian - not American)
@AC:
> Protesters lined the windows of the Apple store at 5pm while two police officers stood nearby
>don't these people have lives? Or jobs? Or... school to go to on this finy, wet, by the looks of it, morning?
Obviously you didn't go to school either, or you'd have been able to read the article.
Equally obviously, by your own standard, you also don't have anything currently worthwhile to do, as, at 10 am, you have no better occupation than to post on an internet news site.
Alternatively, does it really stretch you so much to imagine that a handful of people who care deeply about an issue might be able to make themselves free at 5pm on week day?
Today Apple should make a backdoor, tomorrow it'll be an Android phone, next week it'll be a Lenovo Laptop with HD Password, then maybe some Truecrypt encryption. What are they going to do? Keep askng companies to make backdoors? It will never happen because third party tools will become available to protect privacy.
In today's day and age, things are going to be harder to uncover, just like in the days before we had fingerprints. If terrorists want their data encrypted, its going to be encrypted, nobody can stop that.
Who is to say Farook's phone is not jailbroken and encrypted with some third party tools that even Apple cannot fix. Its endless.
First - this phone does not (and never did) belong to the dead killer.
Second - this request is very reasonable and in line with the laws of the land in the country where Apple has CHOSEN to operate and benefit. This is the cost of that. I am all for Apple being heavily fined for refusal... or even have the assets seized by the state... Apple is successful in many ways BECAUSE of the US government creating a fertile and business friendly environment... and it is Apples responsibility to be a good "citizen" regardless of if it hurts their image or not.
The most prominent one happens to be DiFi, who never met a privacy violation she didn't like.
Might as well send Putin a tasteful scented card politely requesting that he stop his invasion of Ukraine. and the sanctioned murder of opposition leaders. Or maybe tweet ISIL to please stop being such jerks.
And also overlooked, the owner reset the password on their on volition without consulting with either the FBI (supposedly) or Apple.
Also, there are several problems with this scenario with first being the call and text logs should be readily available. Simple cross referencing the phone numbers should determine most of the contacts. Then get off their collective lard asses and go talk to these people (or at least the ones who looking interesting) without stopping at every donut shop in San Bernardino county. The only numbers that would difficult to trace would be to burner phones. I suspect there very of those. The ferals should learn to do old-fashioned, talk to witnesses type police work that they had to do before cellphones ever existed.
Secondly the ferals aka keystone kops should know who changed the password. Lean on that person with a strong suggestion the password should be coughed up or the booby prize is an all expense paid, multi-year vacation at Club Fed complete with a stylish orange jump suit. Someone should know the password in the county IT department. Changing passwords often requires knowing both the old and duplicate entry of the new. Or politely inform them if they can do without knowing the password they can reset it to a known password, say 1234.