OT: Apple and Privacy vs. National Security
I haven't generated any posts lately, but there's a current hot topic I'm interested in. I'm curious for info on the privacy vs. national security questions raised in recent days, between the FBI and Apple. Here's the synopsis, if you've been living under a rock. Apparently, the San Bernardino terrorist's Apple i-phone wasn't destroyed, and the FBI wants Apple to help unlock the encryption so they can presumably see a record of calls and stored information, contacts, etc.. And (edit) Tim (not Robert) Cook of Apple is refusing, suggesting that to do this would be to create a "backdoor" giving the government access to every single i-phone out there, and all the content.
I've googled this topic, and read several articles on it, but still am unsure about what to think. Here's what I don't understand. Why can't Apple unlock the phone for the FBI and assist them in getting the data off of the phone? Can't they do this without giving the FBI software that would allow for the creation of a universal backdoor the FBI could use on everyone's phone? From what I've read, the encryption is so good that even Apple can't get in . . . it would have to write new software to be able to get in. And Cook doesn't even want that kind of software written, even if it is in-house at Apple. Is that correct?
My interest is really in what Apple can do to preserve privacy, and at the same time allow for the government to do everything it can towards national security. Is it possible, or do we really have to choose between either privacy, or national security concerns? I want to have my cake and eat it too!
February 18th, 2016 at 11:45 PM ^
Not that I'd put it past the government to be nefarious but that's not what they're asking in this case. There is a broader discussion of crypto backdoors as it relates to the federal government and the private sector but this case does not ask for that.
February 18th, 2016 at 5:37 PM ^
February 18th, 2016 at 5:57 PM ^
Sent from MGoBlog HD for iPhone & iPad
February 18th, 2016 at 8:04 PM ^
They've done it 70 times since 2008.
February 18th, 2016 at 10:33 PM ^
Sent from MGoBlog HD for iPhone & iPad
February 18th, 2016 at 6:00 PM ^
Sent from MGoBlog HD for iPhone & iPad
February 18th, 2016 at 6:07 PM ^
And the government can't force a locksmith to open a safe.
February 18th, 2016 at 5:38 PM ^
If Apple gives in I am tossing the iphone ang going back to Android. There is zero chance a backdoor makes it into a Linux-based system while Linus is still living.
February 18th, 2016 at 6:38 PM ^
Almost all Android phones are based on the open-sourced Android project, but are modified by the individual manufacturer/carrier. Just because there's no obvious backdoor in the open-sourced code doesn't mean the Android phones you can buy don't have them. Food for thought.
February 18th, 2016 at 5:38 PM ^
February 18th, 2016 at 5:46 PM ^
So it's not quite as simple as you put it.
Sent from MGoBlog HD for iPhone & iPad
February 18th, 2016 at 7:01 PM ^
February 18th, 2016 at 6:13 PM ^
Your analogy doesn't work. the iPhone would be the notebook. The FBI knows where the phone is. They aren't asking for the location of the phone. The FBI is forcing Apple to create a way to hack the phone.
February 18th, 2016 at 6:41 PM ^
February 18th, 2016 at 8:35 PM ^
February 18th, 2016 at 5:39 PM ^
February 18th, 2016 at 5:40 PM ^
February 18th, 2016 at 6:09 PM ^
February 18th, 2016 at 11:19 PM ^
security enough that they created a 60 page white paper on all they do to secure the device. As a note, this security not only holds the secrets on the phone, it makes sure you aren't messing with various aspects of the kernel/OS or loading apps from some unauthorized location.
February 18th, 2016 at 5:42 PM ^
February 18th, 2016 at 6:11 PM ^
No. Nobody (even Apple) has the ability to hack into an iPhone that has the latest iOS.
February 18th, 2016 at 5:46 PM ^
You don't need Apple to look at phone and text records. The NSA can (legally) get that information from the wireless carrier. It won't reveal all of the phone contacts, but it provides quite a bit of data they can use as leads. Each wireless carrier has a department dedicated to assisting law enforcement with call/text records.
February 18th, 2016 at 5:44 PM ^
That with all the resources the FBI has, that they can't unlock an i-phone. I know it's encrypted and all, but my gawd.... your the FBI........
February 18th, 2016 at 6:12 PM ^
February 18th, 2016 at 5:46 PM ^
February 18th, 2016 at 6:00 PM ^
on the internet.
February 18th, 2016 at 6:06 PM ^
February 18th, 2016 at 6:11 PM ^
February 18th, 2016 at 6:16 PM ^
And no, it's not disturbing at all because we know how the towers fell. People like you see ghosts where there are trees. It's a paranoia borne of ignorance of history,war, economics, and politics.
Conspiracy theories flourish where weak and ignorant minds are dominant.
February 18th, 2016 at 6:22 PM ^
February 18th, 2016 at 6:26 PM ^
February 18th, 2016 at 6:33 PM ^
during traumatic events and the spread of flammable materials can weaken steel beams enough to bring about a buildings collapse.
It doesn't take a poorly thought out conspiracy narrative that oh-so-conveniently fits the worldview of it's author to understand what happened.
False flag operations are largely the fantasies of know nothings. The ones that actually did happen don't involve mass casualties and cause a crushing blow to the economy. No businessman, no matter how nefarious his designs, would sign on to an operation that would place his company in jeopardy of losing huge sums of money. 9-11 is not the type of operation such people would seek.
February 18th, 2016 at 6:44 PM ^
Sent from MGoBlog HD for iPhone & iPad
February 18th, 2016 at 6:52 PM ^
MAKAVELI LIVES
Killuminati
February 18th, 2016 at 7:54 PM ^
February 18th, 2016 at 8:50 PM ^
You clearly have no ability to formulate logica thoughts informed by a firm grasp of the facts.
February 19th, 2016 at 12:39 AM ^
https://www.youtube.com/watch?v=E6s0Gam54mk
Sal, you're a smart guy. Not hard to figure out what happened.
February 18th, 2016 at 5:47 PM ^
It was owned by his employer and the employer has no problem hacking it. Employers can take their devices back and all the information on them - theirs and yours. It's just that the phone can't be opened because of how Apple architected their security. I can see Apple's concern and I certainly want my personal privacy protected, but in this case, I would hope they can find a middle ground. Similar to how encryption keys can be held by a third party (such as for the cloud storage service I use), perhaps one can be found for the eventual solution. Make the government file a petition to access as they should. Search warrant approved, then third party applies the tool.
February 18th, 2016 at 5:47 PM ^
No politics.
This can become nothing but a political discussion.
February 18th, 2016 at 5:48 PM ^
allowing the government to literally force Apple into creating new software in this case sets a dangerous precedent. Historically, the biggest threat to humanity has been an overly powerful and/or irresponsible government. By far. The government should not be given the power to literally enslave a private company, innocent of any wrongdoing, at its whim. And in this case, it would be forcing the company to destroy its security systems. The "backdoor" once created would easily fall into the wrong hands, especially with the incompetent government involved. Then, all of our sensitive data would be at risk of exploitation by anybody, including terrorists.
February 18th, 2016 at 5:50 PM ^
This is a really tough issue, and while this is likely to be unpopular, I think that I lean in favor of the government on this one (something that I rarely do). Here is my reasoning:
As a starting premise, let's all agree that civil liberties and privacy are, in fact, important. Regardless of whether the government is being run by republicans or democrats, there needs to be a limit into the level to which the government can meddle in the private affairs of its citizens, provided that those citizens are not breaking the law or harming others. So, as a general matter, I think that most of us would agree that the government should not have the ability ot right to hack into our cell phones, computers, tablets, etc., or to monitor our day to day activities.
However, there are exceptions. The San Bernadino case involves what is now accepted to be a terrorist incident. One or both of the killers was radicalized, and there is documented evidence of at least one of them visiting known terrorist webpages. The fact that their home was littered with bomb-making materials, unused pipe bombs, etc., indicates the possibility that they - OR OTHERS - were planning further attacks.
So, there is a real possibility that their iphones might contain other valuable information that would lead the FBI and Homeland Security to (1) identify other would be terrorists, or (2) thwart another potential terrorist attack. Is the infringement upon privacy IN THIS CASE worth it, if it accomplishes either of these goals? As someone who was in NY on 9/11, I would say, unquestionably, yes.
While it is not a pretty reality, the reality in which we live is that there are misguided individuals and groups of individuals who seek to do harm to our country and our citizens. While civil liberties and privacy MUST be safeguarded whenever possible, it is my belief that we also MUST protect the lives of our citizens from another terrorist attack.
February 18th, 2016 at 5:59 PM ^
Sent from MGoBlog HD for iPhone & iPad
February 18th, 2016 at 6:00 PM ^
Can Apple get into this phone without damaging the data? Of course.
Do they want to? No. For several reasons:
- If they wrote this separate iOS (iPhone, iPad, iWatch, etc.. operating system) like the government wants them to, this would mean that there exists an iOS that allows anyone in possession of it to forcibly break into any iOS device so as long as they had said iOS and a solid knowledge of brute force algorithms. The problem with this? Software is transmitted incredibly easy. Think about how long it takes you to download and install a new operating system for your laptop. Depending on your machine's limitations, anywhere from 45 minutes to an hour, and remember that an iPhone is significantly less complex device than say even a Macbook Air. Considering that a mobile operating system's file size is many degrees smaller than the average high quality movie file, it could be very easily transferred to anyone, at any time.
- You might say, "Well, just put it on a super-encrypted hard drive that only certain members of the government are ever able to see." See, the problem with this is, information is power, and no system is without corruption. Even if it were given to a select group of people (even 1 person), I have serious doubts that it would remain only within that individual's possession forever (forever is a long time).
- Additionally, all of the above assumes that granting the government access to this kind of software is even something that we as a society want. I believe that this is not what our society wants or needs. As Tim Cook said very shrewdly, "this would set a very dangerous precedent" for future government / technology company interactions. The federal government (not to mention, state, and even local districts) would claim in the future that they "need" this technology to solve certain crimes that might not (and very likely would not) necessarily carry with them the same importance that the San Bernardino attacks did. Remember, if you give a mouse a cookie...
- Furthermore, the Federal government does not realistically even need to break into Syd Farook's iPhone. Why? Well, all of the information that the Fed wants from the phone is available in other places. Phones are only very small computers, and a computer can't establish correspondence with people (read: ISIS terrorist cells) without a bijectional transference of data with another computer, which happens in the form of either cellular data, internet connection, or satellite communication, I suppose. In my opinion, it would be both easier and safer for the Fed to subpoena companies like Verizon, AT&T, or Vodafone for this information they want so much. Actually, now that I think about it, they probably don't even need to subpoena any companies...In the AT&T building in L.A. (I think) the NSA splits (like, clones) the huge optical connection (probably 5 feet in diameter) that processes most of the information that flows in and out of the United States.
February 19th, 2016 at 12:19 AM ^
not sure what you are reading, but so much can be transmitted by fiber that even transoceanic cables are only an inch in diameter.
February 18th, 2016 at 6:51 PM ^
1. Could the government, in theory, require lock or safe manufacturers to use weaker metal in their products if it became too difficult to break through them in cases where they wanted to do a search? Because they're basically asking Apple to weaken everyone's phone, not just one they're interested in.
2. Once Apple writes the new software that creates the backdoor, and 3 hours later the Russian and Chinese govts have the code (because obviously) and start imprisoning/murdering human rights and democracy activists after accessing their encrypted messages, will the FBI/DOJ feel any moral responsibility to those people? Should they?
3. If we all agreed repealing the 4th, 5th, and 6th amendments would objectively be likely to reduce crime and keep everyone safer from everyday crime as well as terrorism, shouldn't we consider that, too? Would make policing 100x easier.
February 18th, 2016 at 6:05 PM ^
February 18th, 2016 at 6:10 PM ^
and the glass case gets in the way, too.
February 18th, 2016 at 6:12 PM ^
from attack or invasion for much of it's history. People can place liberty before security in this country because our security hasn't been seriously challenged since 1812.
February 18th, 2016 at 7:38 PM ^