LETTERS TO THE EDITOR

LETTERS/COLUMNS: SEND LETTERS TO THE EDITOR FOR PUBLISHING TO FRONTPAGENEWS1@YAHOO.COM. PLEASE INCLUDE DAY/EVENING/ CELL NUMBER, HOME NUMBER, AND EMAIL. CONTACT VAN STONE: FRONTPAGENEWS1@YAHOO.COM OR (215) 821-9147 TO SUBMIT A REQUEST FOR ANY WRITER. PLEASE DO NOT CONTACT THE WRITER DIRECTLY! ALL APPEARANCE REQUEST WILL GO THROUGH THE MANAGING EDITOR'S OFFICE. COPYRIGHT: THE USE OF ANY SUBMISSIONS APPEARING ON THIS SITE FOR MONETARY GAINS IS STRICTLY PROHIBITED. TO LEARN MORE: PHILADELPHIA FRONT PAGE NEWS WWW.FPNNEWS.ORG. YOUR TOP STORIES OF THE DAY (215) 821-9147.

Tuesday, March 29, 2016

Apple remains in dark how FBI hacked iPhone without its help

Apple remains in dark how FBI hacked iPhone without its help
 
AP Photo
FILE - In this Feb. 17, 2016 file photo, an iPhone is seen in Washington. The FBI’s announcement that it mysteriously hacked into an iPhone is a setback for Apple and increases pressure on the technology company to restore the security of its flagship product.

WASHINGTON (AP) -- The FBI's announcement that it mysteriously hacked into an iPhone is a public setback for Apple Inc., as consumers suddenly discover they can't keep their most personal information safe. Meanwhile, Apple remains in the dark about how to restore the security of its flagship product.

The government said it was able to break into an iPhone used by a gunman in a mass shooting in California, but it didn't say how. That puzzled Apple software engineers - and outside experts - about how the FBI broke the digital locks on the phone without Apple's help. It also complicated Apple's job repairing flaws that jeopardize its software.

The Justice Department's announcement that it was dropping a legal fight to compel Apple to help it access the phone also took away any obvious legal avenues Apple might have used to learn how the FBI did it. The Justice Department declined through a spokeswoman to comment Tuesday.

A few clues have emerged. A senior law enforcement official told The Associated Press that the FBI managed to defeat an Apple security feature that threatened to delete the phone's contents if the FBI failed to enter the correct passcode combination after 10 tries. That allowed the government to repeatedly and continuously test passcodes in what's known as a brute-force attack until the right code is entered and the phone is unlocked.

It wasn't clear how the FBI dealt with a related Apple security feature that introduces increasing time delays between guesses. The official spoke on condition of anonymity because this person was not authorized to discuss the technique publicly.

FBI Director James Comey has said with those features removed, the FBI could break into the phone in 26 minutes.

The FBI hacked into the iPhone used by gunman Syed Farook, who died with his wife in a gun battle with police after they killed 14 people in December in San Bernardino. The iPhone, issued to Farook by his employer, the county health department, was found in a vehicle the day after the shooting.

The FBI is reviewing information from the iPhone, and it is unclear whether anything useful can be found.

Apple said in a statement Monday that the legal case to force its cooperation "should never have been brought," and it promised to increase the security of its products. CEO Tim Cook has said the Cupertino-based company is constantly trying to improve security for its users.

The FBI's announcement - even without revealing precise details - that it had hacked the iPhone was at odds with the government's firm recommendations for nearly two decades that security researchers always work cooperatively and confidentially with software manufacturers before revealing that a product might be susceptible to hackers.

The aim is to ensure that American consumers stay as safe online as possible and prevent premature disclosures that might damage a U.S. company or the economy.

As far back as 2002, the Homeland Security Department ran a working group that included leading industry technology industry executives to advise the president on how to keep confidential discoveries by independent researchers that a company's software could be hacked until it was already fixed. Even now, the Commerce Department has been trying to fine-tune those rules. The next meeting of a conference on the subject is April 8 in Chicago and it's unclear how the FBI's behavior in the current case might influence the government's fragile relationship with technology companies or researchers.

The industry's rules are not legally binding, but the government's top intelligence agency said in 2014 that such vulnerabilities should be reported to companies.

"When federal agencies discover a new vulnerability in commercial and open source software - a so-called 'zero day' vulnerability because the developers of the vulnerable software have had zero days to fix it - it is in the national interest to responsibly disclose the vulnerability rather than to hold it for an investigative or intelligence purpose," the Office of the Director of National Intelligence said in a statement in April 2014.

The statement recommended generally divulging such flaws to manufacturers "unless there is a clear national security or law enforcement need."

Last week a team from Johns Hopkins University said they had found a security bug in Apple's iMessage service that would allow hackers under certain circumstances to decrypt some text messages. The team reported its findings to Apple in November and published an academic paper after Apple fixed it.

"That's the way the research community handles the situation. And that's appropriate," said Susan Landau, professor of cybersecurity policy at Worcester Polytechnic Institute. She said it was acceptable for the government to find a way to unlock the phone but said it should reveal its method to Apple.

Mobile phones are frequently used to improve cybersecurity, for example, as a place to send a backup code to access a website or authenticate a user.

The chief technologist at the Center for Democracy and Technology, Joseph Lorenzo Hall, said keeping details secret about a flaw affecting millions of iPhone users "is exactly opposite the disclosure practices of the security research community. The FBI and Apple have a common goal here: to keep people safe and secure. This is the FBI prioritizing an investigation over the interests of hundreds of millions of people worldwide."

Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID

Van Stone Productions Inc. 501C3 Nonprofit Organization Informatioin (EIN) / Tax ID
Click on the logo to learn about the non-profit status

BECOME OUR VLOGGER OF THE MONTH: VIDEO NEWS CONTENT PUBLISHED ON ANY TOPIC BELOW

Latest edition of Talk Live Philly With Van Stone

VAN STONE PERFORMANCE PROMOTION VIDEO AT WEST PHILADELPHIA HS 1999 - BELOW

FPN NEWS “TAKE TIME FOR WINNERS IN ANY COMMUNITY!”

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection

Van Stones' Beautiful World Images -Latinamerica, South Asia, and USA Fashion and Beauty Collection
Family Modeling -modelado de la familia

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

WE'RE #1

WE'RE #1

Van Stones' Beautiful World Images -Hermosas World Images Van Stones

Van Stones' Beautiful World Images -Hermosas World Images Van Stones
Family Modeling -modelado de la familia

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones

Van Stones' Beautiful Tween Images-Hermosas Imágenes Tween Van Stones
Family Modeling -modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud

Van Stones' Beautiful Youth Images -Van Stones imágenes hermosas de la Juventud
Family Modeling -Modelado de la familia

WE'RE NO 1

WE'RE NO 1

Van Stones' Beautiful Child Images -Van Stones Niño hermoso Imágenes

WE'RE #1

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre

Van Stones’ Beautiful Children Images - Van Stones imágenes hermosas Madre
Family Modeling -modelado de la familia

Like Us On Facebook

We"re Looking For Volunteers

News, and more about youth, education, political analyst, schools, anti-violence, social justice, grass roots democracy, ecological protection, seniors, Historic Preservation & Restoration, (Black, Latinos, Asian, Pakistani, Italian, and other)Arts, Books, Super Heroes, Trading Cards, Youth, College, and Pro Sports, Nonprofits and Real-estate.

Blog Archive

About Us

  • FPN can reach out to Representatives from your side of: The Village, The Township, or The City
  • FPN features
    Sports
    Cars
    Family Entertainment
    Neighborhood News
    Scholastic News
    Regional News
    National News
    Citywide News
    Legal News
    Alternative Green Energy Education News
    Superhero & Comic Strip News
  • Teen Stars
  • Humanitarian/Ministers/Political
  • Community Services
  • Women & Men & Kids

  • You acknowledge and agree that you may not copy, distribute, sell, resell or exploit for any commercial purposes, any portion of the Newspaper or Services. Unless otherwise expressly provided in our Newspaper, you may not copy, display or use any trademark without prior written permission of the trademark owner.

    FPN/VSP® is in no way responsible for the content of any site owned by a third party that may be listed on our Website and/or linked to our Website via hyperlink. VSP/FPN® makes no judgment or warranty with respect to the accuracy, timeliness or suitability of the content of any site to which the Website may refer and/or link, and FPN/VSP® takes no responsibility therefor. By providing access to other websites, FPN/VSP® is not endorsing the goods or services provided by any such websites or their sponsoring organizations, nor does such reference or link mean that any third party websites or their owners are endorsing FPN/VSP® or any of the Services. Such references and links are for informational purposes only and as a convenience to you.

    FPN/VSP® reserves the right at any time to modify or discontinue, temporarily or permanently, the Website and/or Services (or any part thereof) with or without notice to you. You agree that neither FPN/VSP® nor its affiliates shall be liable to you or to any third party for any modification, suspension or discontinuance of the Website and/or Services.

    You agree to indemnify and hold harmless FPN/VSP®, its subsidiaries, and affiliates, and their respective officers, directors, employees, shareholders, legal representatives, agents, successors and assigns, from and against any and all claims, actions, demands, causes of action and other proceedings arising from or concerning your use of the Services (collectively, "Claims") and to reimburse them on demand for any losses, costs, judgments, fees, fines and other expenses they incur (including attorneys' fees and litigation costs) as a result of any Claims.

    The Website is © 2009 by VSP®, or its designers. All rights reserved. Your rights with respect to use of the Website and Services are governed by the Terms and all applicable laws, including but not limited to intellectual property laws.

    Any contact information for troops overseas and/or soldiers at home provided to you by FPN/VSP® is specifically and solely for your individual use in connection with the services provide by Van Stone Productions Foundation VSP.

    FPN/VSP® soldiers contact information for any other purpose whatsoever, including, but not limited to, copying and/or storing by any means (manually, electronically, mechanically, or otherwise) not expressly authorized by FPN/VSP is strictly prohibited. Additionally, use of FPN/VSP® contact information for any solicitation or recruiting purpose, or any other private, commercial, political, or religious mailing, or any other form of communication not expressly authorized by FPN/VSP® is strictly prohibited.