User Panel
Posted: 10/23/2017 2:16:21 PM EST
https://apnews.com/04791dfbe30a4d3596e8d187b16d837e
The FBI hasn’t been able to retrieve data from more than half of the mobile devices it tried to access in less than a year, FBI Director Christopher Wray said Sunday, turning up the heat on a debate between technology companies and law enforcement officials trying to recover encrypted communications.
In the first 11 months of the fiscal year, federal agents were unable to access the content of more than 6,900 mobile devices, Wray said in a speech at the International Association of Chiefs of Police conference in Philadelphia. “To put it mildly, this is a huge, huge problem,” Wray said. “It impacts investigations across the board — narcotics, human trafficking, counterterrorism, counterintelligence, gangs, organized crime, child exploitation.” View Quote *or at least a solution that anyone's going to like and/or wouldn't be ridiculously easy to circumvent by the average user. |
|
|
|
Hey FBI, there's a whole nest of Pedos in Hollywood and DC. They're pretty open about it too. Doubt you'd have to do any hackerman stuff to catch them. Go catch those guys and we'll talk.
P.S. The answer will still be no you statist fucks. |
|
|
They have it wrong. They can access the devices... they just can't interpret the data on them.
|
|
Quoted:
I'm not prepared to take his word for it. View Quote Being unable to access roughly half the cell phones is basically my experience - although that wasn't necessarily always due to the latest / greatest uber-encryption from Apple or Google. Lots of bad guys use shitty Chinese clone burner phones that are a pain in the ass to access due to tool compatibility reasons more than anything else... |
|
|
Quoted:
Those stats would be easy to FOIA. Being unable to access roughly half the cell phones is basically my experience - although that wasn't necessarily always due to the latest / greatest uber-encryption from Apple or Google. Lots of bad guys use shitty Chinese clone burner phones that are a pain in the ass to access due to tool compatibility reasons more than anything else... View Quote View All Quotes View All Quotes Quoted:
Quoted:
I'm not prepared to take his word for it. Being unable to access roughly half the cell phones is basically my experience - although that wasn't necessarily always due to the latest / greatest uber-encryption from Apple or Google. Lots of bad guys use shitty Chinese clone burner phones that are a pain in the ass to access due to tool compatibility reasons more than anything else... |
|
Quoted:
Hey FBI, there's a whole nest of Pedos in Hollywood and DC. They're pretty open about it too. Doubt you'd have to do any hackerman stuff to catch them. Go catch those guys and we'll talk. P.S. The answer will still be no you statist fucks. View Quote |
|
Quoted:
There's also some choices made in the words. I wonder how many of them they were able to obtain the information they were wanting through other avenues. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
I'm not prepared to take his word for it. Being unable to access roughly half the cell phones is basically my experience - although that wasn't necessarily always due to the latest / greatest uber-encryption from Apple or Google. Lots of bad guys use shitty Chinese clone burner phones that are a pain in the ass to access due to tool compatibility reasons more than anything else... Bad Guy can have the latest / greatest uber-phone with unbreakable encryption. If the evidence the feds are looking for can be found in his Gmail account they are simply going to get a search warrant for the contents of that account held by Google. |
|
“To put it mildly, this is a huge, huge problem,” View Quote They act like the gov has an innate right to our communications. Statist fuck indeed. |
|
|
Quoted:
Good point. Depends on what they were wanting. Bad Guy can have the latest / greatest uber-phone with unbreakable encryption. If the evidence the feds are looking for can be found in his Gmail account they are simply going to get a search warrant for the contents of that account held by Google. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
I'm not prepared to take his word for it. Being unable to access roughly half the cell phones is basically my experience - although that wasn't necessarily always due to the latest / greatest uber-encryption from Apple or Google. Lots of bad guys use shitty Chinese clone burner phones that are a pain in the ass to access due to tool compatibility reasons more than anything else... Bad Guy can have the latest / greatest uber-phone with unbreakable encryption. If the evidence the feds are looking for can be found in his Gmail account they are simply going to get a search warrant for the contents of that account held by Google. |
|
If they can physically touch it they have access to it. They just can't actually get the data off of it, but I don't care. It's a search warrant not a find warrant.
|
|
Why not outlaw burning or hiding letters while they're at it?
From a book I read: "To the government, everything not under its control is out of control." |
|
Good
how many truecrypt containers/hidden containers can they access? Gov doesn't need to be able to crack everyone's hidden stuff. |
|
Interesting. I figured they had hacks for most of that stuff.
|
|
Quoted:
Good how many truecrypt containers/hidden containers can they access? Gov doesn't need to be able to crack everyone's hidden stuff. Thats why we had the above on our issued/personal laptops I know the SOCOM guys use it or something similar for their operational laptops. View Quote |
|
I will ask the computer savvy guys, is truecrypt using a hidden container still safe?
Im talking 7.0 and below. |
|
|
Quoted:
Hey FBI, there's a whole nest of Pedos in Hollywood and DC. They're pretty open about it too. Doubt you'd have to do any hackerman stuff to catch them. Go catch those guys and we'll talk. P.S. The answer will still be no you CORRUPT fucks. View Quote |
|
|
|
|
|
|
Quoted:
https://apnews.com/04791dfbe30a4d3596e8d187b16d837e The FBI hasn’t been able to retrieve data from more than half of the mobile devices it tried to access in less than a year, FBI Director Christopher Wray said Sunday, turning up the heat on a debate between technology companies and law enforcement officials trying to recover encrypted communications.
In the first 11 months of the fiscal year, federal agents were unable to access the content of more than 6,900 mobile devices, Wray said in a speech at the International Association of Chiefs of Police conference in Philadelphia. “To put it mildly, this is a huge, huge problem,” Wray said. “It impacts investigations across the board — narcotics, human trafficking, counterterrorism, counterintelligence, gangs, organized crime, child exploitation.” View Quote *or at least a solution that anyone's going to like and/or wouldn't be ridiculously easy to circumvent by the average user. View Quote Anyone who thinks intel types don't have backdoors are fooling themselves. They just don't tip their hand or show off their actual capability for petty stuff like homicide, drug / gun running, or theft. They save it for the big stuff. |
|
Quoted:
Within the DoD at least, data at rest protections are required for all unclassified laptops. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Good how many truecrypt containers/hidden containers can they access? Gov doesn't need to be able to crack everyone's hidden stuff. Thats why we had the above on our issued/personal laptops I know the SOCOM guys use it or something similar for their operational laptops. |
|
Quoted:
I think everyone is using veracrypt now. View Quote View All Quotes View All Quotes |
|
Quoted:
Absolutely. Translation of OP's article: "These constitutionally-protected rights are a real problem; big government needs a "final solution" to these problematic rights!" View Quote View All Quotes View All Quotes |
|
Quoted:
Interesting. I figured they had hacks for most of that stuff. View Quote They're not the only people on earth who get paid to do that either, nor do they have a monopoly on really clever and resourceful coders. If the FBI can work around it, so can anyone else. Ergo, my reply of "good" to the story. |
|
|
Quoted:
"Good enough" for probably 99.97 percent of the threat models out there... (Standing by the get flamed by some obscure Linux flavor zealot) View Quote |
|
Quoted:
Ok, I know for some things our G2 IMO Officer had to have copies of our truecrypt passwords for reg and hidden containers. If the above was true why would they need our passwords for our containers on the gov laptops? If they could access them why would they need our password? View Quote |
|
The DoD CIO memo on DAR was specifically for unclassified laptops as classified ones should have proper physical controls in place to keep them from being walked away with from airports.
|
|
Quoted:
The only real hope they have (without manufacturer collusion) in something implemented properly, is finding an undiscovered and/or unpatched exploit. They're not the only people on earth who get paid to do that either, nor do they have a monopoly on really clever and resourceful coders. If the FBI can work around it, so can anyone else. Ergo, my reply of "good" to the story. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Interesting. I figured they had hacks for most of that stuff. They're not the only people on earth who get paid to do that either, nor do they have a monopoly on really clever and resourceful coders. If the FBI can work around it, so can anyone else. Ergo, my reply of "good" to the story. Of course, it's also assumed they have manufacturer collusion. |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.