Warning: Constant ABSPATH already defined in /home/public/wp-config.php on line 27
You Knew They Were Lying — Why Now?
On-line Opinion Magazine…OK, it's a blog
Random header image... Refresh for more!

You Knew They Were Lying

The Feds said: It was a one off request; only Apple could do it; it was a terrorism case; it was for the victims; … Except: US pushes Apple for access to iPhones in criminal cases.

This phone is using an older version of IOS, but is a different phone. Oh, yes, the case is over – the suspect pleaded guilty to drug charges and if they wanted the phone unlocked they could have made it part of the plea deal. It isn’t Apple’s problem if the DoJ can’t do a decent job of plea bargaining.

Call the Israelis and pay the price. If it’s as important a case as claimed $90K is cheap. Maybe DoJ should find a lawyer to negotiate a volume discount.

8 comments

1 Shirt { 04.10.16 at 11:08 am }

The Stupid Authoritarians demand we all genuflect upon command and pretend not to understand our reluctance. Who is master here?

2 Bryan { 04.10.16 at 9:28 pm }

Shirt, these clowns long ago forgot who they were working for and what their real job was. In local law enforcement you don”t/can’t continue an investigation after the court case is over – you don’t have the money. The only reason the Feds can do this is that no one is actually responsible for their budget. Who is investigating this waste of tax dollars.

3 Shirt { 04.11.16 at 9:54 am }

Brian, I think that’s to simplistic. Why is it that these bullshit investigations always seem to chip away at civil liberties? It’s no accident that the 3 remaining republican candidates are fascistic (Kasich jocularity is just a front). Even Hillary shows an unnatural interest between business and Government. (or perhaps it’s the other way round). Remember Ferguson where the local police were targeting minorities to finance the white political structure. The execrable mess that is Michigan, the voting lines in Arizona, not to mention the voter suppression across the nation.

Shirt

4 Bryan { 04.11.16 at 7:53 pm }

Money talks and democracy walks – the people with money are helped to make even more money, while the lower classes have to pick up the tab. How come multimillionaires have the same effective tax rate as McDonald managers?

Fascism is one of the many forms of oligarchy that exist on the basic that the rich should get richer and the poor have to pay for it.

5 Kryten42 { 04.19.16 at 12:52 pm }

Here’s the latest on phone security. It SUX! But it isn’t the phone’s fault.

’60 Minutes’ asked a security firm to hack an iPhone and we’re all basically screwed

Apple’s battle with the FBI may have whipped the tech world into a frenzy of establishment-hating wannabe anarchists, but it’s this ’60 minutes’ segment that should really piss you off.

Wanting to find out just how safe our phones are from hackers, the 60 minutes team sought professionals from Security Research Labs to break into Congressman Ted Lieu’s iPhone. Lieu, a member of the House Oversight and Reform Subcommittee on Information Technology (an acronym that’s dangerously close to spelling h-o-r-s-e-s-h-i-t) agreed to be the team’s guinea pig.

It’s not apples-to-apples; the researchers weren’t accessing encrypted files or attempting to gain access to the physical device, but what they were able to accomplish with just a phone number is still incredible.

With those digits alone, the team was able to hear and record Lieu’s phone calls, track his movement, view his contacts and create a log of all incoming and outgoing calls.

For the Apple haters out there, hold on to your hats… the hack perpetrated on Lieu will work on any phone, using any carrier, running any operating system, and it’s all thanks to a security flaw in a piece of technology you’ve probably never heard of.

Signaling System 7 (SS7) is a global network that connects all phone carriers around the world into a singular hub, of sorts. The hack exploits a known security flaw in SS7, but one that’s proven relatively difficult to fix due to the way SS7 is governed, or not governed, in this case.

6 Bryan { 04.19.16 at 6:09 pm }

Control the hubs, you control the network. The people who created the foundation for the Internet and most large data network were looking for connectivity, not security and it shows. You don’t expect that you need to protect yourself from your government, but if you don’t don’t expect to have any privacy.

‘Innocent until proven guilty’ is a victim of the War on Terror™

7 Badtux { 04.20.16 at 10:15 am }

Anybody who says that SS7 wasn’t designed that way on purpose to make it easier for the NSA to spy on international phone calls is lying. There were a lot of NSA types hanging around Bell Labs back in the days of the old AT&T when they were designing SS7.

The problem with SS7 though shows the problem with the FBI’s approach in general: there is no such thing as an unlocked door that only allows law enforcement officers to go through it. You have an unlocked door, criminals will go through it. And frankly, at this point in my life criminals scare me a lot more than the sort of terrorism that the FBI keeps whining about, especially the kind who can reduce you to poverty via identity theft and plain old financial pilfering. I must admit that I have a comfortable life now, but that wasn’t always true, and I have no desire to go back there.

So someone arguing that I must have an unlocked door on my life’s possessions because the FBI needs in… uhm, no. I have locks on my door for a *reason* — because the idiots in the FBI have been completely ineffectual in tackling cybercrime. If they had any record at all of effectively tracking down and prosecuting cybercriminals, maybe I’d feel safer with an unlocked door. But all they ever do is take a report and then nothing ever happens. And they expect me to feel safe with an unlocked door? BULLSH*T!

8 Bryan { 04.20.16 at 9:41 pm }

Bored people will find backdoors, and then post them so malicious pricks will exploit them and screw with people’s lives. NSA was supposed to be building US defenses and well as probing foreign systems. The defense mission has obviously been cast aside.

The rest of the world is exploiting the weaknesses intentionally left in US systems.