The now famous dispute over the iPhone and Apple’s refusal to provide a backdoor to the data on it is interesting not for wht is said, but for what is not said.
The FBI went to a tame Judge to ask for a Court Order. Obviously, no Judge will go against the FBI’s wishes – as many a dead President and Activist can prove.
Now, iPhones have been around since 2007 – 9 years. Bearing this in mind, the FBI (supposedly) didn’t think to invest in a team of hackers for this technological advance in communications. After all, they’ve been hacking telephones, mail, email and routers since their invention. Seem odd to you?
John McAfee offered to hack the phone for free but the FBI don’t want that. One of the foremost security experts offers you free services to do what you say you can’t do and you turn them down? Either the data is important or it isn’t and when did the FBI start caring who ‘Got the result’ for them?
Then there is the ‘Somebody changed the password’ story. If you can’t get in to access the Contacts and Call record, how did you get in to change the password?
Farook stopped using his WORK phone over month before the attacks. So what relevant work related information is on it that is so important? He had a personal cell phone, so why conduct illegal business on a work phone? Where is the evidence that this is relevant?
“Oh, we’ll only use the backdoor once” – Um, there’s at least a dozen cases before the Courts already where the FBI wants Apple to ‘help’. So that claim does not hold water either. Seriously – who would use the Magic Key only once?
According to the Justice Department’s court filings in Brooklyn, Apple has cooperated with All Writs Act orders more than 70 times, though those cases involved older model iPhones.
Now, this is an iPhone 5 – long outdated, so there is some obsolescence in the software already, so issuing a backdoor for an ‘Old’ operating system does not impact on the new iPhones with strong encryption built in. So a ‘Backdoor’ would not work on newer iPhones one assumes.
Another option is to clone the phone. A long time ago (Well over 20 years) I used to clone memory chips for Commodore computers and it’s software. Pretty simple – copy, bit for bit, contents from here to there. Such copiers still exist, so why not clone the phone in case of problems?
Software exists today that can read up to 5 historical versions of a hard drive. That is, data deleted, replaced, deleted, replaced – you get the picture. I would hazard a guess that the ‘Delete everything’ only does a basic delete, not a repeated overwrite of the data to military specified standards. So the memory could be reconstructed.
All smells – A LOT – of dishonesty by both Apple and the FBI. There’s something bigger going on.