FBI Says It Can't Release iPhone Hacking Tool Because It Might Still Be Useful (zdnet.com) 70
Justice Dept. officials say that details of a hacking tool used to access a terrorist's iPhone should not be released because it may still be "useful" to federal investigators. From a report: The government is fighting a case against three news organizations, including the Associated Press, which are fighting to release details of the hacking tool that FBI agents used to unlock a passcode-protected phone used by San Bernardino shooter Syed Farook. Details of the hacking tool have remained classified, not least because the Justice Dept. believes the tool may could still be used by the FBI in similar cases. "Disclosure of this information could reasonably be expected to cause serious damage to national security as it would allow hostile entities to discover the current intelligence gathering methods used, as well as the capabilities and limitations of these methods," said David Hardy, section chief of the FBI's records management division, in a court filing released late Monday.
Poor grammar (Score:2)
WON'T
Bad grammar reduces a story's credibility.
hello_1984.m (Score:2, Funny)
Re: (Score:3, Informative)
It's supposed to be a joke.
It's a play on the Star Trek: Deep Space 9 episode where Commander Pikard is abducted by Romulans and subjected to mental torture. They keep telling him that two plus two equals six, but he denies this. Each time he denies it they smack him around. Then Captain Data and his star ship get there just in time and teleport Commander Pikard out, just like happens in pretty much every sticky situation in that series.
In this case 3 - 1.1111111111111111111 equals 2.99999999999999999. So i
Re: hello_1984.m (Score:2)
Casting to int generally just cuts off the digits so (int)4.8 returns 4
Re: (Score:3)
Re: (Score:2)
I must be missing something. How does 3 - 1.1111111111111111111 = 2.99999999999999999? Integer math should be 2 and real math should be less than 2. I guess I just don't get the Objective C syntax as I am not an Apple guy.
Re: (Score:2)
Re: (Score:3)
" And the most worrisome attack on national security and counter intelligence agencies is the idea that the US should extend the protections of the Constitution and Bill of Rights to foreigners operating internationally or domestically."
Fucking aye right we should extend these to foreigners. The bill of rights is a basic template of right that all human beings should have not just citizens. How can we be any kind of example if we say "Nope, you're French so no freedom of speech for you." or "Nope, you are
Re: (Score:2)
If the world wants protection under the Bill of Rights and Constitution they should start paying US taxes. And I think the other poster was talking about foreign intelligence operatives not the people visiting for vacation, education, or other such mundane reasons.
"Nothing in the Bill of Rights inherently limits these rights to only US citizens." Only because the idea is so ludicrous that nobody gave it a second thought.
Re: (Score:2)
Well, he certainly has experience dismantling and shutting down large organizations. Let's see whether he can to it to a whole nation as well.
Re: (Score:2)
No, he is advertising a pretty repulsive right-wing populist that promises the world if elected, but will deliver nothing. Kind of like Trump, but worse.
Is this part of the adult conversation (Score:5, Interesting)
Re: (Score:2, Informative)
The fact that something happened (or didn't happen) in this particular case doesn't invalidate their point, since their point doesn't depend on finding something useful in every single instance. There may be other facts or issues that do invalidate their point, but not this one.
Re: (Score:2)
Re: (Score:2)
Licensed tool (Score:1)
Although a third-party company, said to be made up of professional hackers, created the hacking tool that was used to break the passcode lock on the iPhone 5c, the company's name has not been revealed
If the FBI is the licensee of this software, then maybe they can't release it because they don't actually own the code? Also, releasing details about the tool may violate trade secrets of the company which developed it so that may be another factor preventing release.
Re: (Score:2)
NOPE and NOPE. This dodge is what the company that makes the "Stingray" tries. Put it into the contract that a police department cannot reveal that they use the "Stingray". Then when the judge/defending attorneys ask about methods the Police state they are contractually bound not to reveal them.
The general method can be discussed without revealing details. AKA we purchased hacking tool "X" to perform the mission, details are contractually limited. Then the judge can make a ruling as to the validity of s
The federal government must be made to choose (Score:3)
To me, there is definitely solid reason to classify intelligence sources and methods. However, I think that we have to continue to resist the blurring of lines between foreign intelligence and law enforcement. Certainly law enforcement gathers intelligence (really, they gather information) as part of the investigative process. Our standard for evidence should allow for two possible choices on the part of the government:
Foreign intelligence is used to make strategic, operational, and tactical military decisions as well as national policy decisions, while information gathered in the course of a law enforcement investigation could be used to support criminal prosecution.
This way the spooks and feds get to argue to higher authority (probably the AG, DNI, and National Security Council) which is more important: continued use for foreign intelligence or disclosure to support criminal prosecution. That way the decision makers get to earn their keep and everything stays on the up and up.
Re: (Score:2)
Agree with everything you said except this:
This denies the defendant's right to face their accuser and prevents the defense from cross examining. There are very limited exceptions to this, such as dying declarations, but they should be few and far between, and event then the witness's identity isn't concealed.
But yeah, absolutely, if the method of acquiring evidence can't
Re: (Score:2)
(with key exceptions for the identity of human sources; for example, their disclosure may be only to the judge hearing the case, etc.).
This denies the defendant's right to face their accuser and prevents the defense from cross examining. There are very limited exceptions to this, such as dying declarations, but they should be few and far between, and event then the witness's identity isn't concealed.
Yeah, I realize I left a key piece of that. I was referring to certain human sources, something which would have to be severely limited and done with careful oversight. I was thinking of instances like people whose relationship to the case could result in their life being threatened if their identity is revealed. I know that there is witness protection, but I assume that is not the appropriate solution in every case. I was just trying to make room for the possibility. A real legal expert would need to
It's about trust (Score:4, Insightful)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: Sounds like a non sequitur (Score:1)
lets wait for wikileaks to reveal it (Score:2)
Fruit of the poisoned tree (Score:3)
If the use of the tool and the workings of the tool can't be examined in court, then any evidence provided by the tool or any evidence found because of any information provided by the tool can't be trusted in court. "Trust us" isn't good enough in a court of law.
Re: (Score:3, Insightful)
That's what Parallel Construction is for...
Re: (Score:3)
That's what Parallel Construction is for...
Unfortunately you're right...
Re: (Score:2)
And if they are caught lying under oath, nothing happens to them.
Really?! (Score:2)
The FBI would rather... (Score:4, Insightful)
What about what was recovered? (Score:2)
"National Security" = We have no good reasons... (Score:2)
... but we do not want to tell you and this way we do not have to explain ourselves.
I don't get it. (Score:2)
For the thousands of iPhones in their evidence locker it will still work and also on all the old/non-updated phones out there, publishing the tool won't change that.
But them telling us that old phones are vulnerable, might boost Apple sales.