Posted on Feb 22, 2016
1SG Civil Affairs Specialist
13.8K
154
96
10
10
0
63cb219c
A federal court has ordered Apple to create a "back door" in order to access the San Bernardino terrorist's iPhone. Apparently, iPhones have a feature where 10 unsuccessful password attempts zeroizes the device, and the feds "can't" figure it out. If true, this portends a dangerous weakness in capabilities. If not, the feds are attempting to force cooperation from a private company at their cost.
Avatar feed
Responses: 20
1SG Civil Affairs Specialist
11
11
0
Edited 8 y ago
Maybe Hillary should have used an iPhone for her personal email instead of a Blackberry.
(11)
Comment
(0)
CSM Charles Hayden
CSM Charles Hayden
8 y
After all of this commotion, Hillary may receive an iPhone from Bill at her inauguration!
(0)
Reply
(0)
LTC Self Employed
LTC (Join to see)
>1 y
(1)
Reply
(0)
Avatar small
SN Greg Wright
6
6
0
Modern encryption cannot be brute-forced (cracked by throwing every possible combination at it) by all the computing power on the planet, working in concert. It's not that the NSA or FBI can't brute-force encrypted info -- it's that no one can. The majority of encryption that gets broken these days is done by social engineering -- the pretty girl you whisper to in the bar, the idiotic secretary that writes her pw down, dumb people that use their birthdays for the pw's, etc.

Having said that, if that phone is locked with just a numeric code that's limited to what, 4-6 numbers (I've never used an iphone, so I'm not sure how it works for them), then that severely limits the number of possible iterations, and the NSA or FBI could definitely crack that -- you could with your own computer. BUT...you only get 10 shots and then it wipes. That's the problem. 3.
(6)
Comment
(0)
1SG Civil Affairs Specialist
1SG (Join to see)
8 y
That is like a bomb with a booby trap. One simply needs to disconnect the booby trap first. I can't imagine it is that hard for highly trained experts.
(3)
Reply
(0)
Lt Col Commander
Lt Col (Join to see)
8 y
FBI wants apple to create a custom firmware
and install it using their secret certificate. The firmware will disable the 10 try rule, allow passcode to be input remotely and circumvent the 80ms delay after inputting the passcode incorrectly. The question will be who will control it? What will prevent authoritarian governments from compelling Apple to give them the code? This will not be limited to Apple, next will be Google. It's always more complicated
(1)
Reply
(0)
Avatar small
CSM David Heidke
6
6
0
Edited 8 y ago
government employees are not necessarily the "best and the brightest."

They are the ones who can navigate USAjobs.

And that doesn't mean that they possess the technical expertise to crack an iPhone.
(6)
Comment
(0)
1SG Civil Affairs Specialist
1SG (Join to see)
8 y
This is the FBI we are talking about here. G-men have been using technical means to find child predators and internet thieves for decades. I suspect this is more about setting a precedent than it is about technical capability.
(5)
Reply
(0)
MAJ Contracting Officer
MAJ (Join to see)
8 y
CSM David Heidke That's funny you think the Government is capable enough to be incapable. Almost all of the individuals are contractors not GS employees, due to the incompetency issues.
(2)
Reply
(0)
Avatar small
Avatar feed
How is it possible that the federal government, NSA, and FBI can't crack an iPhone, but they think Apple can?
Sgt Aaron Kennedy, MS
6
6
0
This is a "technical" issue. Here's a quick rundown.

The way the CURRENT Operating System (OS) is designed is that after X (10) failed login attempts, the device (phone) wipes all of its on-board memory. This protects your data.

The "Proposal" is that Apple "develop" the ability to UPGRADE/REVERT the OS on a devise to a state where an "unlimited number of attempts" is allowed, which would bypass the protection of the data.

This requirement would require a "backdoor" (misnomer, but let's use it for simplicity) that allows the upgrading or reversion to a specific OS version without using the pass-code. Apple is capable of making this. This is actually fairly "simple" for them, however it violates the purpose of their encryption (locks), and creates larger concerns in the future.

As an example, let's use TSA approved Luggage Locks. Only you have the key! Except the TSA has "master keys" which they have promised to safeguard. You can't buy that key. Except when someone at the TSA allowed their key to be photographed, and someone with a 3d printer made a set, and distributed the plans for them.

http://www.wired.com/2015/09/lockpickers-3-d-print-tsa-luggage-keys-leaked-photos/

This is a parallel for why this is a "bad deal." The government cannot be Trusted with "backdoors" because they are frankly "Incompetent" and have a track-record for abuse of Power.
(6)
Comment
(0)
Sgt Aaron Kennedy, MS
Sgt Aaron Kennedy, MS
8 y
MSgt Kurt Woodward - I have no problem with Individuals. I have issue with Organizations. "There are no good or bad Organizations. Only those with Strong or Weak Oversight [sic]." I think most PEOPLE (Individuals) are inherently good, however I also think they will follow "policy" without thinking of the ramifications (nth order effects). As such, we must rely on the BAD examples (abuses of Power) when making a determination as to whether to trust an organization with more Power.

In the case of the Government (et al), and Civil Rights, the number of violations is "too many" to give them an "inch of rope" (to hang us with).

In 2014 Mr.Comey publicly stated that the level of Encryption available to the Citizen would potential hinder DoJ efforts. In 2015-2016 he is asking for the exact thing he proposed in 2014... Call me a cynic, but when someone says they don't want the Private Citizen to have phone Encryption in 2014, and then ORDERS Apple to create a backdoor into said phone Encryption in 2016... I'm going to assume they don't have my best interests at heart but are working on a "2 year campaign" for malicious reasons.
(0)
Reply
(0)
SMSgt Thor Merich
SMSgt Thor Merich
8 y
Sgt Aaron Kennedy, MS - I am not sure what the big deal is. Currently, the police need a search warrant to view someone's phone (unless they provide consent). the FBI would still need a search warrant and comply with the law to view someone's phone.
(0)
Reply
(0)
Sgt Aaron Kennedy, MS
Sgt Aaron Kennedy, MS
8 y
SMSgt Thor Merich Two major issues:

1) The very existence of the capability creates Privacy Concerns. Apple built the current OS to prevent exactly what the FBI is requesting. Having a door with the best lock in the world is useless if everyone can just bypass it.

2) The "compelled" nature of the order to build a capability that does not currently exist. Should the Government be able to demand that you make something, not just take something that already exists. Especially if it is counter to your business model? Apple sells Security. The FBI is mandating that Apple make "Anti-Security" items which will be USED AGAINST Apple's customers.

Having a Warrant is great. But it's not a magic wand to make a citizen do something that is counter to their own self-interest. It just allows an item in your possession to be searched legally.
(0)
Reply
(0)
Capt Richard I P.
Capt Richard I P.
8 y
(0)
Reply
(0)
Avatar small
Capt Seid Waddell
5
5
0
Apple has the code.
(5)
Comment
(0)
1SG Civil Affairs Specialist
1SG (Join to see)
8 y
Of course they do.
(3)
Reply
(0)
SMSgt Thor Merich
SMSgt Thor Merich
8 y
Yep
(2)
Reply
(0)
Capt Seid Waddell
Capt Seid Waddell
8 y
SSG Ryan R., I have heard it said by IT types that it is possible to install a new update to the OS without needing the password; the new OS would not erase the data after 10 unsuccessful attempts at the password. I have no idea if this is possible.

It did occur to me however that it might be possible to remove the memory chip and install it in a different iPhone to read it. The forensic scientists have done wonders reading supposedly destroyed hard drives when the information was important enough - like damaged black box recorders.
(4)
Reply
(0)
SGT Writer
SGT (Join to see)
>1 y
Capt Seid Waddell - Hard drive forensics is like hacking - the more resources (and money) you have the easier it is for larger tasks.
(0)
Reply
(0)
Avatar small
CAPT Kevin B.
3
3
0
For all those theories out there, I'll add another for the "conspiracy club". Who says they haven't? The timing and emotions are aligned to make a power grab on the side? Copy, image, try 10, reimage, try another 10. Do it in an array; faster. Who knows?

BTW on this particular phone, there is no privacy issue. Owned by the county and used in a crime. Either alone negates privacy. OK to have the discussion about law abiding and privacy in general though.
(3)
Comment
(0)
1SG Civil Affairs Specialist
1SG (Join to see)
8 y
The phone records are public. The phone itself is publicly owned. Any data on the device would be public as well, and it is in evidence in a crime. Yet, the feds can't get in the device, or so they say.
Privacy wasn't an issue in this case anyway, since the FBI would easily be able to get a warrant, if they haven't already.
(1)
Reply
(0)
CAPT Kevin B.
CAPT Kevin B.
8 y
Yep, that's the used in a crime piece. The only way to have legal privacy is to own it directly as public/corporate phone have a no expectation of privacy policy that come with them.
(1)
Reply
(0)
Sgt Aaron Kennedy, MS
Sgt Aaron Kennedy, MS
8 y
CAPT Kevin B. Due to the way Apple's current OS works, they can't "clone" the phone prior to unlocking it. Can only backup/copy after it is already unlocked (have to be past the "dead man switch"). This is one of the Security Measures built into the OS.
(2)
Reply
(0)
SCPO Joshua I
SCPO Joshua I
8 y
Can't image it at all while it's locked. Can't try passcodes except on the hardware.
(1)
Reply
(0)
Avatar small
Capt Tom Brown
3
3
0
World terrorism has found it possible and effective to use our own freedoms against US. By affording our Constitutional freedoms to terrorist-types helps them to gravely injure US. Even Nazis and Nips stuck to conventional bombs and bullets mass murder, etc. The great USA has pigged-out on our own freedoms for too long and now they are being used against US. Hopefully it will not be 'to late' by the time people realize the only way to fight fire is with fire.
(3)
Comment
(0)
1SG Civil Affairs Specialist
1SG (Join to see)
8 y
I think that we have the technical capability to back trace things posted on twitter, social media, and obviously email. The legal question is can we collect metadata without getting a warrant. Existing precedent says yes, for non-US citizens outside the USA. But what happens when they are already here?
(1)
Reply
(0)
Avatar small
SSG(P) Opcen Ncoic
2
2
0
1SG, if I’m not the FBI did jack the device, via third party assistance. Whether or not this was a case of acquiring software or having a person perform the act themselves I believe has yet to reach the public. This is both alarming to know our limitations but also reassuring in the fact that our private devices can’t be so easily accessed. This falls directly into the realms of the game where we try to decide how much information collection is too much on the American public, in such, is it a compromise of rights, etc. as for why they believed Apple could do it, I would theorize that the FBI believed that since apples designed the encryption, they could provide back door access
(2)
Comment
(0)
1SG Civil Affairs Specialist
1SG (Join to see)
>1 y
SSG(P) (Join to see) - Were I to venture a guess, I would say that there was a time not so long ago when the US Government had a monopoly that technology companies had to recognize.
It was the only way to get your satellite into space.
Not anymore.
It was the only way to get permitting for broadcast frequencies.
Still sort of true.
They had the ability to approve or delay patents.
Still true.
The USG would love to maintain it's historical leverage, but finds it slipping away. Tech companies had always chafed at this, and I see this as a stiff-arm to keep the USG at bay.
(1)
Reply
(0)
SSG(P) Opcen Ncoic
SSG(P) (Join to see)
>1 y
1SG (Join to see), these are good points. It certainly holds true in the face of apple now looking into what legal action they can tale to get the FBI to spill the beans on how exactly they hacked the system, or what vulnerability they exploited. I guess this begs the question of if in the event the USG sits down with their specially appoint security official at the White House and determines this loophole is too great of one to lose by sharing it privately back to Apple, and is the only viable option for the USG to be able to access another phone in the future . . . Would Apple sink low enough to peruse the black market in search of such tech? Apple has been synonymous with security across its platforms for quite a while, which may be enough drive for them to pursue such a route. I’m sure they are reeling in anxiety over the issue that not only are they subject to the mercy of the government in this matter, but, their image as a security fortress if you will, is also compromised.
(1)
Reply
(0)
1SG Civil Affairs Specialist
1SG (Join to see)
>1 y
SSG(P) (Join to see) - Apple has been historically more secure more because it had a novel proprietary operating system that hackers attacked less often. It just didn't have the market penetration of windows, or the industrial espionage cachet of Linux-based systems.
The iphone and its market saturation changed that.
My guess is that NSA is quite adept at cracking encryption, and short of one-time keys coming into vogue, always will. It is just a matter of pointing that monstrous power on a specific target to get specific information that remains elusive.
If it were my phone and the feds were after me, I doubt my encryption would make it to the next sundown.
(0)
Reply
(0)
SSG(P) Opcen Ncoic
SSG(P) (Join to see)
>1 y
1SG (Join to see), point taken. Their history with the iPhone and hacking is sketchy at best. Surprisingly, this isn’t general public knowledge. The public stills sees Apple as a security fortress, and Apple exploits this quite efficiently. I can’t count how many times I’ve had the argument made to me to purchase an Apple product due to its encryption software and how they are virtually free of viruses, bugs, etc. public image drives perception and perception is key in so many facets of life. As to the NSA, I would wager your thoughts to be correct. I think the biggest issue was not having the capability to deactivate the zeroize feature. I would bet everything otherwise was fully capable of access. The question still remains to where it would drive the Silicon Valley giant to venture in unearthing their answer.
(1)
Reply
(0)
Avatar small
Sgt Aaron Kennedy, MS
2
2
0
Added for context. Article is from 2014 and quotes the current FBI Director (who I respect, but disagree with).

http://www.nytimes.com/2014/10/17/us/politics/fbi-director-in-policy-speech-calls-dark-devices-hindrance-to-crime-solving.html?emc=edit_th_20141017&nl=todaysheadlines&nlid=30254405&_r=2

This is "historical" however it sets the "tone" for the discussion we are having now. The San Bernadino issue is merely an event which "justifies" this historical statement.

CC: Capt Richard I P. MSgt Kurt Woodward MAJ (Join to see)
(2)
Comment
(0)
Capt Richard I P.
Capt Richard I P.
8 y
"Never let a good crisis go to waste".
(0)
Reply
(0)
MAJ Contracting Officer
MAJ (Join to see)
8 y
I agree with the premise to prevent the Government from being able to access your information without a proper search warrant. I do not agree that a judge cannot order the device unlocked. I'd be willing to listen to Apple's arguments on how much it would cost to unlock this specific phone, I do not agree with their claims that opening one phone would jeopardize others. Apple could easily unlock this phone and others where a search warrant has been issued, without giving the capability to the government. Freedom from illegal search and seizure is not a grounds for freedom for legal searches.
(1)
Reply
(0)
Sgt Aaron Kennedy, MS
Sgt Aaron Kennedy, MS
8 y
MAJ (Join to see) - I think you meant to respond to the other post.

However:
1) We're in a agreement (Search Warrant).
2) Apple has already been assisting the DoJ (et al) regarding unlocking "individual" devices, and even this particular device (Which can be done from a hardware standpoint). Ordering them to use a specific method is where I have a disagreement with, especially since it opens them and the People up to other issues. (See article).
3) Please check the article. It provides context from Oct 2014 where the FBI Director said that "software access" was his goal.
4) Putting in "backdoors" is counter to the point of "security." WE are paying them to NOT have those design flaws.
5) Freedom from illegal search & seizure is protected, however nothing says we have to make it easy for the Government to violate Privacy. Just like you can't be compelled to testify against yourself, why should you be compelled to turn over (potential) evidence in your possession, in what is arguably a "fishing expedition?"

If I have things on my phone/computer/safe/etc and the Government demands to search them, my instant response is going to be to Pound Sand whether they have a warrant or not. They can figure out how to get in on their own. I am under no obligation to assist the prosecution in helping to hang me.
(1)
Reply
(0)
Avatar small
MCPO Roger Collins
2
2
0
I find it ironic that this administration abuses power nearly every day with the average citizen, but when it comes to conglomerates, with lots of cash and influence, they can't make it happen. The term "overcome by events" will be appropriate soon, because all evidence that can be captured will be mitigated by time. WTF is with all the NSA expertise that they can not do this themselves? How much of their funding goes to scientists that should be able to reverse engineer the phones.
(2)
Comment
(0)
MCPO Roger Collins
MCPO Roger Collins
8 y
Even if they couldn't they could pay someone with the expertise to do it, on the quiet. One of the telecomm companies I worked for that developed features for basic phone service from Central Offices, was asked to develop the ability to monitor a phone by opening the circuit with the phone on-hook, we gave a price and said we could do it. I left the company before the feature was sold (too bad, that would have been a commission sale for me), so I don't know what happened.
(1)
Reply
(0)
SSgt Robert Marx
SSgt Robert Marx
8 y
I imagine this whole procedure is a farce. The Feds probably have the phone hacked but for some reason they are trying to make legal precedent so that future security/encryption has a legal back door.
(1)
Reply
(0)
SCPO Joshua I
SCPO Joshua I
8 y
Yep. This is nothing more than a power grab by the FBI. Clipper chip all over again. Comey is on record that he thinks encryption he can't break is bad and shouldn't be allowed.
(1)
Reply
(0)
SCPO Joshua I
SCPO Joshua I
8 y
They can't get signed firmware on the phone without apple's keys. The phone won't execute firmware that isn't signed.
(0)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close