Prosecutor says Farook's Apple iPhone 5c could contain name of mystery third assailant

On December 2nd, when Syed Farook and his wife, Tashfeen Malik, murdered 14 office workers in a San Bernardino office building, initial reports from eye witnesses seemed to indicate that there were three shooters involved. When police cut down the two terrorists in a hail of bullets hours later, there was a methodical search for a third person in the vicinity, but one was never found...
This is a discussion for a news article. To read the whole news, click here


44. VZWuser76

Posts: 4974; Member since: Mar 04, 2010

See post 8. If criminals and terrorists start using their devices because their content will be inaccessible to everyone, then what? Wouldn't that be giving them a tool to carry out their acts? Like I said above, simply saying no one should have access to anyone's phone under any circumstances is no better than those saying we should automatically give up all rights to privacy.

54. Leo_MC

Posts: 6900; Member since: Dec 02, 2011

Shouldn't we ban encryption algorithms that can't be decrypted, programs that sweep data from hard disks, shredders and every device or method that keeps the data out of the reach of the others?

60. VZWuser76

Posts: 4974; Member since: Mar 04, 2010

My point was, taking an extreme stance, either for or against encryption, isn't the way to go. If you're absolutely for encryption, you're sacrificing your privacy. If you're absolutely against encryption, you're sacrificing security. You respond and make it sound like I said we need to sacrifice all privacy. Show me where I said that. Just because everyone is taking an extreme stance, either for or against, doesn't mean I am, and doesn't mean either are right.

17. darkkjedii

Posts: 30880; Member since: Feb 05, 2011

The should hire Detective James Carter, and the great inspector Lee.

47. roscuthiii

Posts: 2383; Member since: Jul 18, 2010

The real ones (Chris Tucker/Jackie Chan), I don't see the made for TV bit lasting. Dang it... Now I'm gonna go on a Chris Tucker & Jackie Chan movie binge. Way to go!

48. darkkjedii

Posts: 30880; Member since: Feb 05, 2011

Nahhh, only the real Carter and Lee for me. Dude just isn't Chris.

21. matistight

Posts: 949; Member since: May 13, 2009

Just kill whoever steals the software, easy as that.

46. roscuthiii

Posts: 2383; Member since: Jul 18, 2010

I'm actually for the unlocking of the phone... it's not against the law to be investigated. Yes, the US does indeed have issues with illegal search & seizure, wrongful prosecution/conviction, and law enforcement heavy handedness... but, a planned mass killing should warrant an investigation. If not for evidence for conviction, then at least for background information for anything that might shed light on what lead up to the atrocity. Apple's being disingenuous about not being able to access the data on it without creating a new version of iOS. That's B.S. right there. For troubleshooting purposes the software engineers have to be able to gain access just in case a bug or glitch pops up that affects security and/or stability. HOWEVER... The government is clearly overstepping it's bounds demanding it's own version of iOS. Also, the ballistics report would tell them how many firearms were used, their calibers, and the angle from which they were fired. The prosecutor is taking a shot in the dark on this one. The feds need to be slapped down for their overreach... and for just being plain inept. And, Apple should take a little heat too for making false claims which means they know full well they're obstructing.

50. greyarea

Posts: 267; Member since: Aug 14, 2015

For what it's worth your information about how apple troubleshoots is essentially opinion. I'm not going to state that you are unequivocally wrong because my information is different, just know what you seem sure of is not fact.

51. roscuthiii

Posts: 2383; Member since: Jul 18, 2010

It's similar to Schrodinger's Cat and the locked box. But, to put it in simpler terms. Picture a bank vault. This vault is iOS, the bank then being Apple. What Apple is then saying is they looked in the vault, everything looked good, so they locked it and destroyed their key to open it. So, unless they can open that door back up to look in the vault to check on the contents stored inside, they simply cannot confirm if/when someone hasn't managed break in (security), or that there isn't a fire in there burning the valuables (stability). All the while, they're telling everyone everything is fine even though they don't know themselves for sure. Either way, Apple should either admit they lied and do have a key, or they should retract any and all claims that the customer's belongings are safe with them. You simply don't know if the cat's alive or dead until you look in the box.

55. Leo_MC

Posts: 6900; Member since: Dec 02, 2011

That imaginary vault could have imaginary sensors and an imaginary automatic feeding system that tells the vault keeper the cat is alive and kicking, without having the need to look inside.

57. roscuthiii

Posts: 2383; Member since: Jul 18, 2010

Exactly part of my point. None of that confirms whether the contents within the vault are being properly safeguarded. The automatic feeder can just be dropping a growing pile of cat food on the decayed rotting corpse of Mr. Bojangles if the sensor and/or the read-out have been corrupted to just show that everything is A-Okay. Someone, at some point, is actually going to have to open that door and take a peek at that kitty. Think of the litter box!

56. greyarea

Posts: 267; Member since: Aug 14, 2015

I appreciate you trying to breakdown how you understand it. I still have a pretty different understanding about it. For one thing I'm not sure how apple having a universal key makes their customers are safe, while having no weakness means all the customers valuables are not safe. Encryption is supposed to solid like a wall, not like a bank vault. You can't sync your valuables to the cloud. It's everyone's own responsibility not to lock themselves out and/or to have backups.

58. roscuthiii

Posts: 2383; Member since: Jul 18, 2010

Encryption is not solid like a wall. It's exactly like a vault. Encryption is just a code. It follows an algorithm. That algorithm has a key to unlock the code. Much like the combination to unlock the door on a vault. You're not supposed to lose your key, but it happens... and since it does happen, and contents in storage are your property, a key is re-issued to you. Why? Because the storage facility, be it a bank, a public storage unit, and yes even an online password like Apple's has a means of re-keying for you. It's not about having a key equals customers valuables are safe and not having one equals they are not safe. It's about what Apple has publicly claimed they are capable of. Apple as the entity that provides the storage space, maintains, and secures it... has the ability to re-key one lock without creating and giving away a universal key like the FBI is requesting.

61. greyarea

Posts: 267; Member since: Aug 14, 2015

If you wouldn't mind pointing me to who/where you're getting you're crypto info about this I'd be curious to take a look. I'm pretty positive apple is not lying about having a key and further cannot "re-issue" you key. Remember icloud works differently as it's not encrypted. yet.

66. roscuthiii

Posts: 2383; Member since: Jul 18, 2010

Of course Apple has the "key" to iCloud. They developed the software. They have the source code, and the code to every other underlying instruction set to be run. It's why I'm staunchly against them making an OS to give to the government.

67. greyarea

Posts: 267; Member since: Aug 14, 2015

My sentence structure was poor. What I meant was I believe apple is being honest when they say they do not have a key and cannot re-issue you one for your iphone. UNLIKE icloud which work differently.... Still would be curious about your technical sources.

* Some comments have been hidden, because they don't meet the discussions rules.

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit for samples and additional information.