Tim Cook Vs. FBI: Why Apple Is Fighting The Good Fight - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
Tim Cook Vs. FBI: Why Apple Is Fighting The Good Fight
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 6   >   >>
Brian.Dean
50%
50%
Brian.Dean,
User Rank: Ninja
2/26/2016 | 7:17:25 AM
Re: Situation could have been avoided
@TerryB, the abilities of Android Device Manger are transferred to the phone over WiFi or 4G. ADM seems to read the Model Number data from the operating system. I feel that it would have been more intuitive for the user if ADM read the Device Name rather than Model Number. For instance, the default Device name for a Samsung Note 4 is Galaxy Note 4 and it is modifiable, the Model Number might be SM-N910C, it is not modifiable.

There is the possibility that ADM is utilized as ransomeware -- a user's Google account will need to be compromised for it to work and the user will need to be slower than the hacker for the hacker to retain control of the account during the duration of the exercise. I feel that it is unlikely for such an attack to be take place because, News travels extremely fast and I have not heard of a similar incident as yet.

Cost is a major concern as you rightly pointed out. Economies of scale have provided consumers will free ADM and thousands other free antivirus apps that provide similar functionality. If a department does want to allocate $10 extra per device for a premium service on top of a $500 device, free services (supported by ads) would be better than no service. 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
2/26/2016 | 2:36:59 AM
Re: Apple vs FBI
Depending upon how one reads his boasts about being able to break into the phone with his team, John McAfee seems to suggest that the encryption itself is sufficiently strong enough to withstand expert cracking -- and that what's really needed is some undercover social engineering.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
2/26/2016 | 2:33:48 AM
Re: With apologies to Archer...
Ireland is its base for certain international purposes, but the US would stand to lose a lot more tax revenue -- and a lot more jobs -- if Apple's true headquarters just up and left.
TerryB
50%
50%
TerryB,
User Rank: Ninja
2/25/2016 | 1:21:25 PM
Re: Situation could have been avoided
Yikes Brian. So what stops ADM from being a hacking device on any Android phone, yours or not? Surely you don't USB attach any phone to computer and then you get all that ability? Is it locked to a particular SIM or IMEI in advance or you can not get in?

Full blown MDM systems are expensive. I'm not overally shocked a public gov isn't running one. Our Lotus Notes Traveler can issue a remote wipe to a phone but by no means could access the data on it or reset the passcode protection.
PedroGonzales
50%
50%
PedroGonzales,
User Rank: Ninja
2/25/2016 | 10:14:59 AM
Re: Situation could have been avoided
It seems there isn't much the FBI can do to get the information from that individual's Iphone.   This battle will be a long one.  What do you suggest as these scenarios occur more often in the future?  Is there an alternative or does the government has the power to get personal data from a desired individual.   
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
2/25/2016 | 1:00:10 AM
Re: With apologies to Archer...
@Brian: I am unconvinced that the FBI is interested in a middle ground with Apple.  They have been lambasting the company and its encryption in the press for about a year now -- likening Apple's encryption to horrific crimes against children (see my piece for InformationWeek on this topic here: www.informationweek.com/government/cybersecurity/bypassing-the-password-part-3-freedom-compromised/a/d-id/1319972 ).
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
2/24/2016 | 11:16:57 PM
Re: Situation could have been avoided
Ah, but while the physical device might or might not be the property of a government agency (and, even so, there are other legal issues there), the accounts linked to the phone may or may not be.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Author
2/24/2016 | 11:14:41 PM
Re: With apologies to Archer...
I think it's a very good bet that there is a vast contingent that are more loyal to their iPhones than their country's tax policies ;)
Brian.Dean
50%
50%
Brian.Dean,
User Rank: Ninja
2/24/2016 | 3:26:51 PM
Re: Situation could have been avoided
The functionality would be similar to Android Device Manager that can be accessed by a user through a desktop computer. Android Device Manager enables a user to locate, ring, erase, lock or reset device password. It will not display the old password because, the password is encrypted. However, it will provide an entry key into a device to reset the password and recover the device.
vnewman2
50%
50%
vnewman2,
User Rank: Ninja
2/24/2016 | 1:49:55 PM
Re: Situation could have been avoided
I'm not sure about the recovering a password part.  I believe you just have to reset it and I guess that's where the problem comes in...
<<   <   Page 3 / 6   >   >>


2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
Commentary
The Growing Security Priority for DevOps and Cloud Migration
Joao-Pierre S. Ruth, Senior Writer,  9/3/2020
Commentary
Dark Side of AI: How to Make Artificial Intelligence Trustworthy
Guest Commentary, Guest Commentary,  9/15/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll