Encrypted iPhone data – and access to it – is the basis of the current Apple vs FBI legal and technological battle. The United States FBI (Federal Bureau of Investigation) has sent Apple Inc., maker of the iPhone (and the iOS software that goes with it), an order to help them access the data on it. The FBI seized the iPhone of a suspect in the San Bernardino mass shooting (another false flag event), but they claim they are unable to access the encrypted content on it. They further state that Apple, and Apple alone, has the exclusive technical means to unlock the encrypted iPhone data in this situation, and so now they are ordering Apple to do so. Edward Snowden has called this “the most important tech case in a decade.” However, something smells fishy about this story …
FBI Claims It Can’t Hack into Encrypted iPhone Data of San Bernardino Suspect
First of all, here is some of the text from the legal order:
Despite both a warrant authorizing the search and the phone owner’s consent, the government has been unable to complete the search because it cannot access the iPhone’s encrypted content. Apple has the exclusive technical means which would assist the government in completing its search, but it has declined to provide that assistance voluntarily. Accordingly, the government respectfully requests that this Court issue an order compelling Apple to assist in enabling the search commanded by the warrant.
Whenever you read a story on the Mainstream Media, you have to run it through your own truth filters to see if it adds up. In this case, here are a number of questions about the case:
1. Why would we assume that Apple is doing this for principled reasons? At the every least, they would be doing it as a business move to become a “key market differentiator” by trying to set themselves apart from other tech companies as a company that really cares about consumer privacy. However, did you know that Apple has unlocked the encrypted iPhone data for the Feds 70 times in the past?
2. How do we know for sure that the FBI can’t already hack into encrypted iPhone data? We are told that end-to-end encryption is currently unbreakable by intelligence agencies like the FBI, CIA and NSA. But who’s to say they haven’t already worked out how to do it, and are keeping it secret?
3. Could this be a big public relations charade on both sides – Apple to pretend it really cares about consumer privacy, and the FBI to put on a show that it can’t hack end-to-end encryption, or encrypted iPhone data, when it really can?
4. If the NSA can’t already hack encrypted iPhone data (even with the new iOS 9 which was released on September 16, 2015), then why did Michael Hayden, former director of both the NSA (1999-2005) and CIA (2006-2009), state in this interview that the intelligence agencies figured out a way around an inbuilt backdoor?
(In the mid-1990s) we then began the greatest 15 years in the history of electronic surveillance. It didn’t matter – we figured out ways to get around the ‘unbreakable encryption’ … number one, no encryption is unbreakable, it just takes more computing power, and number two … we developed … bulk collection and metadata.
5. Is the FBI only doing this to try to make something legal that they can already do, so there will be legal precedent in future and less roadblocks to their ubiquitous surveillance?
How to Disappear Off the Grid Completely (Ad)
6. Finally, let us remember that San Bernardino was a blatant false flag event, another in a long string of false flag shootings and bombings that have taken place in the US. We already know the Government was behind this, not some Muslim patsies. Is the FBI using this case to gain more sympathy for its cause, playing on Islamophobia and the American public’s gullibility, hoping people will cry out for the FBI to “make it safe” and give up their rights, liberties and privacy in the process?
*****
Want the latest commentary and analysis on Conspiracy, Natural Health, Sovereignty, Consciousness and more? Sign up for free blog updates!
Makia Freeman is the editor of alternative news / independent media site The Freedom Articles and senior researcher at ToolsForFreedom.com (FaceBook here), writing on many aspects of truth and freedom, from exposing aspects of the worldwide conspiracy to suggesting solutions for how humanity can create a new system of peace and abundance.
Sources:
- http://freedom-articles.toolsforfreedom.com/san-bernardino-false-flag-or-hoax/
- https://twitter.com/snowden?lang=en
- http://www.wired.com/wp-content/uploads/2016/02/SB-shooter-MOTION-seeking-asst-iPhone.pdf
- http://motherboard.vice.com/read/feds-say-apple-has-unlocked-suspects-iphones-at-least-70-times-in-the-past
- *https://www.youtube.com/watch?v=6HNnVcp6NYA
- http://freedom-articles.toolsforfreedom.com/category/false-flag-staged-terror-events/
This article, perhaps out of antipathy toward the government for any reason, suggests that the government may already be able to access the Apple phone and just isn’t telling, and further suggests that it may be doing that “to put on a show that it cant hack end-to-end encryption, or encrypted iPhone data, when it really can.” Apart from it being unlikely that the government would waste its own or the courts’ time for this
purpose, the author overlooks the fact that the new protection system fries an iPhone if someone attempts unsuccessfully to crack the code to access the phone’s data. That could be done fairly easily, however, if Apple would provide the government with a way to avoid that kill-switch.
There was a really excellent discussion about this issue on Charlie Rose’s show last night. I recommend that anyone interested in this issue watch the video on the Charlie Rose site when it’s posted. I came away convinced that the government has the better argument. This is nothing like the government monitoring all our phone conversations, or even metadata. This is about accessing a specific smartphone, under a court-issued search warrant directed to it, in order to get criminal, even terrorist, activity. We have done that since the Fourth Amendment was written. We can do it to the U.S. mail, and to ordinary telephones, and lots of dangerous criminals have been locked up that way. It makes no sense to cut major slack for criminals who are the most dangerous to us yet, just because the technology is harder to pierce.
Charlie Rose? Love those psy ops.
DL Trolling pays well?
::f220Work At Home….Special Report….Earn 18k+ per monthfew days ago new McLaren. F1 bought after earning 18,512$,,,this was my previous month’s paycheck ,and-a little over, 17k$ Last month ..3-5 h/r of work a days ..with extra open doors & weekly. paychecks.. it’s realy the easiest work I have ever Do.. I Joined This 7 months ago and now making over 87$, p/h.Learn. More right Here::f220➤➤➤➤➤ http://www.easytechjob.com.nu .❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:❦2:::::::f220…….
I’m sure that most (if not all) chips have a backdoor that the nsa or mosad or any other alphabet Deceipt has can access at anytime. Keep in mind they can steal your data they can certainly taint your data (download a bunch of b.s.) and make you appear to be scum.
This is the real deal. This in how the FBI operates. Stasi or Mossad couldn’t have done it better.
“Finally, let us remember that San Bernardino was a blatant false flag event, another in a long string of false flag shootings and bombings that have taken place in the US. We already know the Government was behind this, not some Muslim patsies. Is the FBI using this case to gain more sympathy for its cause, playing on Islamophobia and the American public’s gullibility, hoping people will cry out for the FBI to “make it safe” and give up their rights, liberties and privacy in the process?