Tech musings, 16.3.16

…or, How the Apple vs. the feds bit is the perfect example of government incompetence.

Thinking about it today, it struck me: You know how this entire brouhaha could have been avoided, right?

The whole thing could have been avoided if San Bernardino County had competent IT administrators who knew how to manage their iPhones. If their IT admins knew what they were doing, they would have had Mobile Device Management deployed on those phones, and an Apple ID set up in the county’s name for iCloud backups. If they’d had all of that, all the information on Syed Farook’s iPhone would have been there for the FBI to get through a proper warrant, because the passcode would have been able to have been remotely reset or if all else failed accessed the information in the iCloud backup. But what did San Bernardino County do? They gave their employees free reign over those county-owned assets, and here we are. It’s gonna be fun to see if we get to pay the price for their IT ineptitude…

Advertisements

Tags:

5 Responses to “Tech musings, 16.3.16”

  1. Borepatch Says:

    It’s not a technical issue. It’s a power grab by the FYI to get around encryption once and for all. The stated issues are a window dressing.

    • southtexaspistolero Says:

      Oh, of course. I just think it would be interesting to see how the whole thing would have played out had SB actually managed their devices like a professional organization.

  2. mick Says:

    Absolutely true that MDM would have taken care of this.

    Also, the FBI / DOJ / SBPD could have NOT changed the password on the phone so that the iCloud Backup could have run again and gotten them any recent data, but I guess they were afraid of a potential third conspirator changing the password first? (Or intentionally ruining the easy way…)

    Yet another option is physically hacking into the phone. This could involve liquid nitrogen, or lasers and an electron microscope. It’s expensive, slow and requires a sure-handed expert… but if anyone were able to afford that it’s the FBI / DOJ’s deep pockets. More info on that here: http://arstechnica.com/apple/2016/03/there-are-ways-the-fbi-can-crack-the-iphone-pin-without-apple-doing-it-for-them/ (Specifically the middle of page 1 on “acid and laserbeams” and the bottom of page 2 on wiping encryption keys.)

  3. mick Says:

    Also, Happy Anniversary!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: