Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Wednesday August 12 2015, @04:05AM   Printer-friendly
from the prosecutors-want-access-to-everything dept.

The New York Times features a joint (and very one sided) opinion piece by prosecutors from Manhattan, Paris, London and Spain, in which they decry the default use by Apple and Google of full disk encryption in their latest smartphone OSes. They talk about the murder scene of a father of six, where an iPhone 6 and a Samsung Galaxy S6 Edge were found.

An Illinois state judge issued a warrant ordering Apple and Google to unlock the phones and share with authorities any data therein that could potentially solve the murder. Apple and Google replied, in essence, that they could not — because they did not know the user's passcode. The homicide remains unsolved. The killer remains at large.

Except, there is no proof that having such a backdoor would conclusively allow them to solve the case and wouldn't require actual police work.


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by Anonymous Coward on Wednesday August 12 2015, @04:15AM

    by Anonymous Coward on Wednesday August 12 2015, @04:15AM (#221560)

    I write good thing about authority. I good guy. You appoint me political posting. You pay me good I agree with every thing.

    • (Score: 1) by Ethanol-fueled on Wednesday August 12 2015, @05:22AM

      by Ethanol-fueled (2792) on Wednesday August 12 2015, @05:22AM (#221575) Homepage

      Too soon, Xia Hong. Hang out in your Orange County beach house and wait a few more presidential elections and try again when the Democrats win.

  • (Score: 2) by KilroySmith on Wednesday August 12 2015, @04:18AM

    by KilroySmith (2113) on Wednesday August 12 2015, @04:18AM (#221561)

    Oh, my god.

    Have they considered hiring someone who's capable of downloading a password cracker from the internet, looking at the Android code to see how the decryption key is generated from the passcode, and start brute forcing passcodes from the internet databases of most common passwords?

    Is it really much more difficult than that?

    • (Score: 2, Funny) by Anonymous Coward on Wednesday August 12 2015, @04:25AM

      by Anonymous Coward on Wednesday August 12 2015, @04:25AM (#221562)

      They could even outsource the job to Hacking Team

    • (Score: 0, Troll) by Anonymous Coward on Wednesday August 12 2015, @04:44AM

      by Anonymous Coward on Wednesday August 12 2015, @04:44AM (#221563)

      Hey, maybe America is improving after all. Still evil, but the idiots in charge are so incredibly stupid they they've completely forgotten how to do evil things, like waterboard random suspects until someone confesses to the murder.

    • (Score: 3, Interesting) by TheLink on Wednesday August 12 2015, @06:27AM

      by TheLink (332) on Wednesday August 12 2015, @06:27AM (#221591) Journal

      Don't they have an upgraded version of this?
      http://www.forbes.com/sites/andygreenberg/2012/03/27/heres-how-law-enforcement-cracks-your-iphones-security-code-video/ [forbes.com]
      I'm pretty sure most phone users don't use strong passphrases on their phones and most use something that can be brute-forced in a few minutes, at most a few hours. Think about how long someone is willing to take to unlock their phone and how reliable most touch phone data entry methods are. Good luck entering a 50 character passphrase correctly into your phone in under a minute.

      • (Score: 4, Informative) by quacking duck on Wednesday August 12 2015, @01:55PM

        by quacking duck (1395) on Wednesday August 12 2015, @01:55PM (#221679)

        Any phone OS worth their salt has the option to wipe the phone after a certain number of failed attempts, and if not will still introduce longer lockout delays with every failed passcode attempt. Not long ago a flaw was discovered on iOS where you could get around this by killing power to it before it stored the number of failed attempts, but it's been long enough Apple should have fixed this already.

        • (Score: 5, Informative) by KilroySmith on Wednesday August 12 2015, @02:36PM

          by KilroySmith (2113) on Wednesday August 12 2015, @02:36PM (#221696)

          And any phone manufacturer worth their salt can have a technician desolder the FLASH from the phone motherboard, and attach it to a non-phone microcontroller as a peripheral, and run the brute force attacks on that. Two weeks at the outside if you have to have a PCB designed/built. No timeouts, no retry limits.

          • (Score: 2) by FatPhil on Wednesday August 12 2015, @07:08PM

            by FatPhil (863) <{pc-soylent} {at} {asdf.fi}> on Wednesday August 12 2015, @07:08PM (#221847) Homepage
            Only if it's stored in a separate flash device. I see no reason why there couldn't be some eeprom behind the security firewall of the processor core itself. I'm pretty much sure I've seen such tech from big-name SoC manufacturers.
            --
            Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
    • (Score: 2) by kurenai.tsubasa on Wednesday August 12 2015, @02:17PM

      by kurenai.tsubasa (5227) on Wednesday August 12 2015, @02:17PM (#221686) Journal

      I have been wondering this as well. If whatever's on the cell phone is so absolutely crucial to the investigation, why don't they buy some CPU time from, say, the NSA and spin up a cluster of a few thousand John the Ripper [wikipedia.org] nodes?

      Of course, doing that, obtaining the password in a few days or so (assuming it's not “password” or one of the children's names or birthdates), and bringing a murderer to justice wouldn't move forward the narrative that only terrorists need strong encryption!

      Strong encryption is magick! Dark magick of the House of Slythryn! Voldem^#24j57T89$23+++NO CARRIER

  • (Score: 5, Interesting) by Ethanol-fueled on Wednesday August 12 2015, @04:53AM

    by Ethanol-fueled (2792) on Wednesday August 12 2015, @04:53AM (#221564) Homepage

    " They talk about the murder scene of a father of six, where an iPhone 6 and a Samsung Galaxy S6 Edge were found.

    Why would a killer toss his phone in the crime scene? The answer is that nobody did and only thugs and dope dealers carry more than one phone.

    " The homicide remains unsolved. The killer remains at large. "

    In Chicago. Since when did anybody give a fuck about a murder in Chicago?

    So not only are they trying to ban (end-to-end)encryption, but they're trying to ride the coattails of #Blacklivesmatter and so disagreeing with the prosecutors would be racist.

    Those desperate prosecutors are really scraping the bottom of the barrel here in trying to bait the Blacks into being anti-encryption. Couldn't they at least make up some bullshit about some high-powered mafia boss or terrorists or somethin'?

    • (Score: 0) by Anonymous Coward on Wednesday August 12 2015, @04:59AM

      by Anonymous Coward on Wednesday August 12 2015, @04:59AM (#221566)

      Why would a killer toss his phone in the crime scene?

      I haven't read beyond the summary, but I inferred the encrypted phones belonged to the victim, and knowledge of the passcodes died with him.

    • (Score: -1, Flamebait) by Anonymous Coward on Wednesday August 12 2015, @05:39AM

      by Anonymous Coward on Wednesday August 12 2015, @05:39AM (#221583)

      >In Chicago

      It was a nigger.

    • (Score: 0) by Anonymous Coward on Wednesday August 12 2015, @05:54AM

      by Anonymous Coward on Wednesday August 12 2015, @05:54AM (#221587)

      Evanston is not in Chicago, it's a suburb, and the article is wrong as well, as Evanston is on the northern border of the city, not 10 miles north of the city. Chicago is bigger than the article says it is and yet smaller than you want it to be. Good work. You're all geographically ignorant.

      • (Score: 0, Offtopic) by Ethanol-fueled on Wednesday August 12 2015, @06:05AM

        by Ethanol-fueled (2792) on Wednesday August 12 2015, @06:05AM (#221588) Homepage

        Somebody once used "its" instead of "it's" on an online forum somewhere. Nobody believed that motherfucker because he was too stupid to know English.

      • (Score: 2) by Daiv on Wednesday August 12 2015, @06:20PM

        by Daiv (3940) on Wednesday August 12 2015, @06:20PM (#221803)

        Yeah, well Michigan isn't Detroit, but that doesn't stop people from that mistake either.

        Ignore the little flaws, see the message.

      • (Score: 2) by FatPhil on Wednesday August 12 2015, @11:57PM

        by FatPhil (863) <{pc-soylent} {at} {asdf.fi}> on Wednesday August 12 2015, @11:57PM (#222007) Homepage
        It sounds like you are unable to distinguish "X" from "X metropolitan area". "X metropolitan area" is often way bigger than X, and includes towns and cities which are not X. In the US, it may even include towns and cities which aren't even in the same state as X. In Europe and the US there are even examples of metropolitan areas which span national boundaries.
        --
        Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
    • (Score: 1, Redundant) by wonkey_monkey on Wednesday August 12 2015, @06:43AM

      by wonkey_monkey (279) on Wednesday August 12 2015, @06:43AM (#221597) Homepage

      Why would a killer toss his phone in the crime scene?

      Ah, thank you Sherlock Holmes. Obviously the phone couldn't possibly hold any other clues. Oh, and don't bother dusting for fingerprints, the killer won't have left any so any others will be useless.

      --
      systemd is Roko's Basilisk
      • (Score: 0) by Anonymous Coward on Wednesday August 12 2015, @08:33PM

        by Anonymous Coward on Wednesday August 12 2015, @08:33PM (#221900)

        So they need encryption backdoors to dust fingerprints?

    • (Score: 2, Interesting) by brocksampson on Wednesday August 12 2015, @10:30AM

      by brocksampson (1810) on Wednesday August 12 2015, @10:30AM (#221643)

      How do you know when you are making a baseless argument? When you use scary-sounding numbers instead of statistics followed by the implication of a hyperbolic tragedy. They managed to do both in the same paragraph; 74 iPhones!!! That sounds like a big number!!! And THINK OF THE CHILDREN!!! Oh, why won't someone think of the children!

    • (Score: 0) by Anonymous Coward on Thursday August 13 2015, @03:43PM

      by Anonymous Coward on Thursday August 13 2015, @03:43PM (#222355)

      Why would a killer toss his phone in the crime scene?

      Maybe the killer was also a thief and those phones were stolen... thus useless to solving the case.

  • (Score: 5, Insightful) by Anal Pumpernickel on Wednesday August 12 2015, @05:13AM

    by Anal Pumpernickel (776) on Wednesday August 12 2015, @05:13AM (#221570)

    Except, there is no proof that having such a backdoor would conclusively allow them to solve the case and wouldn't require actual police work.

    That's a lesser reason to object to this. The real problem is that the idea that citizens should (or be forced to) live their lives in such a way as to make the jobs of people in the government easier is an inherently authoritarian notion, and a laughable one in a country that is supposed to be 'the land of the free and the home of the brave'. It should be the other way around: The government should fear The People.

    Banning strong encryption would be completely unconstitutional, as it would conflict with not only the first and fourth amendments, but the government simply does not have authority to do so even without taking those into account. A warrant only allows the government to make the attempt to get what they want; it is not mandatory that they succeed. They cannot force everyone to communicate in such a way that the government can always break the encryption just so they can supposedly solve crimes. It is nonsense to say that because they have a warrant, they should be guaranteed success. That is simply not the purpose of the fourth amendment or the constitution, and it violates the principles to which this country is supposed to aspire.

    If I had to choose between more crime or more privacy and freedom, I would choose more crime. Freedom can carry many risks, and I would rather take those risks than live like a coward. But I don't believe there is such a dichotomy in most cases.

  • (Score: 1, Funny) by Anonymous Coward on Wednesday August 12 2015, @05:19AM

    by Anonymous Coward on Wednesday August 12 2015, @05:19AM (#221572)

    The state should murder such people!

    • (Score: 1, Insightful) by Anonymous Coward on Wednesday August 12 2015, @05:27AM

      by Anonymous Coward on Wednesday August 12 2015, @05:27AM (#221579)

      There are too many people nowadays. Please eliminate all of them.

  • (Score: 3, Interesting) by Anonymous Coward on Wednesday August 12 2015, @05:38AM

    by Anonymous Coward on Wednesday August 12 2015, @05:38AM (#221582)

    They love to trot out pedophiles and murderers in support of ridiculous policies. But I'm sure they would also use their "lawful warrants" to crack the phones of protesters who practice civil disobedience. Thankfully, some chickens are coming home to roost.

    • (Score: 2) by mtrycz on Wednesday August 12 2015, @12:16PM

      by mtrycz (60) on Wednesday August 12 2015, @12:16PM (#221654)

      You are several years late, but yes, that's the idea.

      --
      In capitalist America, ads view YOU!
  • (Score: 2) by aristarchus on Wednesday August 12 2015, @05:47AM

    by aristarchus (2645) on Wednesday August 12 2015, @05:47AM (#221585) Journal

    If you say something, . . . no, that's not it. If you smell something, yeah, that's it, say something. But since we want law enforcement to have tips given to them because they are no longer capable of basic investigative operations, it should be, "If you say something, see something." So I guess they really need to know if you say something.

  • (Score: 4, Interesting) by jmorris on Wednesday August 12 2015, @06:26AM

    by jmorris (4844) on Wednesday August 12 2015, @06:26AM (#221590)

    Be careful what you wish for.... you might get it good and hard up the pooper. If they can really make a phone that can't be cracked then it is, pretty much by definition, equally capable of being unrootable and unjailbreakable too.

    And does anyone really think Apple doesn't have a way to force an FOTA without user intervention? And if they can, then yes they could craft an update to null out the lock code and have that one handset be given that update when it checks in. Assuming of course that data is enabled, updates via data are enabled, Wifi is enabled and they know an AP it would automatically connect to, etc, etc.

    Most phones are anything but secure though, even if they are locked. So some beefing up of security is probably a good thing. I'm still using a Tegra3 based LG Optimus 4X. Utterly insecure. Utterly.

    Entryway #1 is where it gets rooted; the stock recovery is 'secured' in that it is RSA signed and and unless you have unlocked the bootloader it is proof from tampering. But you don't need to tamper. The damned thing will take a sideloaded update signed with the Android SDK TEST KEY. Game over. Yea it made getting root easy peasy but ANYBODY can read anything from the phone if they can send it a file signed with a widely published key and have it run as root.

    Entryway #2 is less of a bungle but totally unpatchable. They let their blob.bin file escape and if you have looked at a Tegra you know that means game over. NVidia has a ROM in the die itself with a recovery/initial load program and all turning on the AES encyption means is you need that encrypted blob to get back in and you can read all of the partitions off the flash. Yes the bootloader is still encrypted but you can read out all of the other data. While it only recently leaked out to xda-developers raise your hand if you think law enforcement hasn't had that file for years.

    People like us prevailed on LG to unlock the bootloader and they added it. But unless you have already rooted you have to do it their way and it involves a wipe so that isn't a new security flaw. So good on them.

    • (Score: 1, Informative) by Anonymous Coward on Wednesday August 12 2015, @06:31AM

      by Anonymous Coward on Wednesday August 12 2015, @06:31AM (#221592)

      If they can really make a phone that can't be cracked then it is, pretty much by definition, equally capable of being unrootable and unjailbreakable too.

      What? The point is to put all the power in the hands of the user. That includes Free Software, or else it can't truly be trusted.

    • (Score: 2, Insightful) by Anonymous Coward on Wednesday August 12 2015, @07:12AM

      by Anonymous Coward on Wednesday August 12 2015, @07:12AM (#221606)

      If they can really make a phone that can't be cracked then it is, pretty much by definition, equally capable of being unrootable and unjailbreakable too.

      If the manufacturer prevents you, who have paid them money for a device, from rooting/jailbreaking it, then you have paid good money for a device you are at most renting. Maybe that's all right, but you need to keep that in mind. The manufacturer ought to provide you with any and all encryption keys required to root the device should you choose to do so, perhaps with the usual caveats about warranties. Rooting should never have to involve the exploitation of a security flaw in the device!

  • (Score: 5, Insightful) by mendax on Wednesday August 12 2015, @07:05AM

    by mendax (2840) on Wednesday August 12 2015, @07:05AM (#221604)

    The bullshit spewed by bastards like Cyrus Vance, Jr., et al. makes my blood boil.

    The new encryption policies of Apple and Google have made it harder to protect people from crime. We support the privacy rights of individuals. But in the absence of cooperation from Apple and Google, regulators and lawmakers in our nations must now find an appropriate balance between the marginal benefits of full-disk encryption and the need for local law enforcement to solve and prosecute crimes. The safety of our communities depends on it.

    Marginal benefits? The ability to protect oneself from the actions of a government that has been shown time and again to willfully, unlawfully, and with no regard for the civil rights or privacy of the People it is supposed to be protecting and serving I find to be of great benefit.

    The government wants us to force us to reveal to it the encryption keys we use to protect our data, to trust it to keep it safe from others,and we are supposed to believe that it won't misuse that trust or not screw up and give all the keys to the Chinese or the Russians? The government has amply demonstrated that it cannot be trusted. Mr. Vance, et al. just will never get it. The revelations thanks to the bravery of Edward Snowden and others who have and not yet been revealed indicate that the U.S. government has permanently forfeited any legitimacy with regard to this issue.

    --
    It's really quite a simple choice: Life, Death, or Los Angeles.
  • (Score: 5, Insightful) by maxwell demon on Wednesday August 12 2015, @08:29AM

    by maxwell demon (1608) Subscriber Badge on Wednesday August 12 2015, @08:29AM (#221615) Journal

    In other news, if the authorities would have a complete record of where everyone was and what they did at any instant in time, then there would never be a question who did it, at we could just look it up in the database. Does that justify the total surveillance state, with every corner of the world (including the private corners) being covered by cameras and microphones?

    If your answer if no, then you have just admitted that being able to solve crimes is not the highest value, and therefore it is not sufficient as argument that a fundamental right needs to be restricted.

    --
    The Tao of math: The numbers you can count are not the real numbers.
  • (Score: 4, Insightful) by doublerot13 on Wednesday August 12 2015, @12:16PM

    by doublerot13 (4497) on Wednesday August 12 2015, @12:16PM (#221653)

    The only way I can protect you is if you give me complete power of you.

  • (Score: 3, Informative) by Frost on Wednesday August 12 2015, @04:49PM

    by Frost (3313) on Wednesday August 12 2015, @04:49PM (#221755)

    Prosecutors are exactly the wrong people to ask about legal policy. Their only priority is to maximize successful convictions. They don't give a damn about society or justice.

  • (Score: 2) by mendax on Wednesday August 12 2015, @09:34PM

    by mendax (2840) on Wednesday August 12 2015, @09:34PM (#221937)

    El Reg published a review [theregister.co.uk] of sorts of this op-ed. It's worth reading.

    --
    It's really quite a simple choice: Life, Death, or Los Angeles.
  • (Score: 0) by Anonymous Coward on Thursday August 13 2015, @09:10PM

    by Anonymous Coward on Thursday August 13 2015, @09:10PM (#222517)

    Instead of a warrant asking Apple to unlock an iPhone, couldn't they ask for a warrant for Apple to authorize a new iPhone for the suspect's Apple ID? (An Apple ID isn't exactly secret---a little traditional police work, possibly with assistance from Apple, could uncover that.) With a password reset from Apple, that would get them everything from that phone that is backed up to Apple's iCloud. (This seems to have been the technique used in that celebrity nude-selfie hack a while back---and they didn't even need a warrant to make it work!)

    For Android, if they know the suspect's gmail account associated with that phone, they should be able to do something similar with Google's cooperation.

    I realize that a savvy user might have turned off cloud backups, but how many people think to do that? It seems as if this would be a good Plan B for the police to pursue.