this post was submitted on 26 Sep 2024
218 points (98.7% liked)

politics

19233 readers
2178 users here now

Welcome to the discussion of US Politics!

Rules:

  1. Post only links to articles, Title must fairly describe link contents. If your title differs from the site’s, it should only be to add context or be more descriptive. Do not post entire articles in the body or in the comments.

Links must be to the original source, not an aggregator like Google Amp, MSN, or Yahoo.

Example:

  1. Articles must be relevant to politics. Links must be to quality and original content. Articles should be worth reading. Clickbait, stub articles, and rehosted or stolen content are not allowed. Check your source for Reliability and Bias here.
  2. Be civil, No violations of TOS. It’s OK to say the subject of an article is behaving like a (pejorative, pejorative). It’s NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
  3. No memes, trolling, or low-effort comments. Reposts, misinformation, off-topic, trolling, or offensive. Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
  4. Vote based on comment quality, not agreement. This community aims to foster discussion; please reward people for putting effort into articulating their viewpoint, even if you disagree with it.
  5. No hate speech, slurs, celebrating death, advocating violence, or abusive language. This will result in a ban. Usernames containing racist, or inappropriate slurs will be banned without warning

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.

That's all the rules!

Civic Links

Register To Vote

Citizenship Resource Center

Congressional Awards Program

Federal Government Agencies

Library of Congress Legislative Resources

The White House

U.S. House of Representatives

U.S. Senate

Partnered Communities:

News

World News

Business News

Political Discussion

Ask Politics

Military News

Global Politics

Moderate Politics

Progressive Politics

UK Politics

Canadian Politics

Australian Politics

New Zealand Politics

founded 2 years ago
MODERATORS
 

You know, the same thing happens to me every time the FBI takes my phones.

top 37 comments
sorted by: hot top controversial new old
[–] wavebeam@lemmy.world 91 points 2 months ago (3 children)

I really hate to defend this guy because he clearly sucks. But honestly: smart move. Your phone password and much of the contents of your phone should be considered speech and you shouldn’t be compelled to testify against yourself. That said, if this phone was government property then he shouldn’t have been the only one capable of unlocking it, which is a policy failure.

[–] growsomethinggood@reddthat.com 52 points 2 months ago

He's a cop, of course he knows how law enforcement will go through and find something incriminating

[–] thrawn@lemmy.world 21 points 2 months ago

Recorded speech about engaging in crimes is often acceptable evidence. It’s probably the same with written messages.

I guess it’s up to the accused to prevent law enforcement from acquiring what they said, whether it be preventing recording, preventing police from sifting through mail or unsecure communications, or preventing police from acquiring the accused’s copy of potentially illegal communications. Which he is currently attempting.

I don’t blame him for trying, and would agree on a lesser extent that he is right to prevent self incriminating now. But copied communication as acceptable evidence is pretty settled in law by now.

[–] some_guy@lemmy.sdf.org 6 points 2 months ago

I work in IT. Five bucks says their government-issued phones can be unlocked by an MDM (Mobile Device Management) profile.

[–] some_guy@lemmy.sdf.org 77 points 2 months ago (2 children)

“Adams claimed that after he learned about the investigation into his conduct, he changed the password,” and he “increased the complexity of his password from four digits to six,” the document reads. Adams said he did this to stop members of his staff “from inadvertently or intentionally deleting the contents of his phone because, according to Adams, he wished to preserve the contents of his phone due to the investigation.”

Sure thing, bud.

[–] Rocketpoweredgorilla@lemmy.ca 19 points 2 months ago

Wow... I could dream up more realistic excuses in middle school.

[–] masterofn001@lemmy.ca 12 points 2 months ago (1 children)

6 digits is brute force hackable in about 1 second.

Also, isn't lying to the FBI another crime?

[–] capital@lemmy.world 18 points 2 months ago (1 children)
[–] masterofn001@lemmy.ca 17 points 2 months ago* (last edited 2 months ago) (1 children)

Clone.

Repeat.

Also, cellebrite.

Edit: if people think forensics uses the actual device that would severely hinder any investigation.

That would risk tampering, or destroying evidence.

Copies are made.

Technology exists.

[–] TrickDacy@lemmy.world 4 points 2 months ago (1 children)

And the cloning can happen thousands of times in one second?

[–] stardom8048@lemmy.world 8 points 2 months ago (1 children)

According to reporting, they have actually done this before.

Most of the discussion I've read about this is along the lines of: clone the drive on the phone and then brute force the clones (circumventing the lockout issue: if you get locked out just keep trying on a new clone).

In a relatively famous case, the FBI cracked the password on the San Bernardino shooter's phone, but did not explain how they did it: https://www.vox.com/2016/3/29/11325134/apple-iphone-fbi-san-bernardino-case-ends

Here is a company selling a brute force module for iPhones, although they don't explain how they get around the lockout issue: https://belkasoft.com/unlocking-ios-devices-with-brute-force

Here is another article about a company that claims to be able to brute force iPhone passcodes: https://www.vice.com/en/article/how-to-brute-force-iphones-graykey/

[–] disguy_ovahea@lemmy.world 4 points 2 months ago* (last edited 2 months ago)

The FBI didn’t crack it. It was done by Cellebrite. I worked for Apple during the San Bernardino case. The suspect had an iPhone 5c, a model that did not have a Secure Enclave, and was vulnerable to brute force hacking through the Lightning Port. The Secure Enclave was released with the iPhone 5s, along with Touch ID, preventing peripheral access through the Lightning Port after the iPhone has been restarted.

[–] TheAlbatross@lemmy.blahaj.zone 34 points 2 months ago (1 children)

No worries, Eric, they'll figure it out for you.

[–] SpaceNoodle@lemmy.world 10 points 2 months ago (1 children)
[–] Valmond@lemmy.world 14 points 2 months ago (1 children)
[–] ShaggySnacks@lemmy.myserv.one 26 points 2 months ago

I wouldn't be surprised if at some point, Eric Adams said something a long the lines "If you didn't do anything illegal, you have nothing to hide".

[–] Myxomatosis@lemmy.world 25 points 2 months ago* (last edited 2 months ago) (1 children)

Damn, he must be in some deep shit because he’s pulling out Trumpian excuses.

[–] themeatbridge@lemmy.world 35 points 2 months ago (1 children)

I mean, this is an obvious lie.

But it's a smarter lie than Trump usually tells. Giving up your passcode is self incriminating, but a court can still compel you to do it. If you claim to have forgotten it, the court can't compel you to remember.

A Trumpian lie would be like "I never had a phone, and people said it was the best phone, better than Nokeeya, better than Obamaphone, nobody had ever seen a phone like it, people would come up to me and say, I've never seen a better phone. A perfect phone, they'd tell me, I don't know. The password, I shouldn't even tell you this, but it's so good, it's the name of a hooker I used to know in Atlantic City. She was, well, she was young and looked a lot like my daughter Ivanka, very smart woman, super smart, and sexy, smart though. Ivanka was smart, not Brandy, but she was very good too. She said I had the biggest hands of anybody, any hands, she'd ever seen. Brandy, not Ivanka said that, although Ivanka also says I have big hands. But no, to answer the question, I never touched Brandy, never even met her, she's not really my type, if you know what I mean. She's not a very good person, at least that's what they tell me, because I don't know, I never met her, bad person, bad."

[–] mosiacmango@lemm.ee 11 points 2 months ago* (last edited 2 months ago) (1 children)

Its a mess, but largely, courts cannot compel you to give up your phone password, because of the 5th amendment. They can force you to unlock a phone secured with biometrics, as that isn't compelled speech.

[–] themeatbridge@lemmy.world 6 points 2 months ago

Sort of, but also it hasn't gone to the SCOTUS yet. Plus:

There is a difference between communicating a passcode to police and physically providing an unlocked phone to police, the court said. Though these two acts "may be functionally equivalent in many respects, this functional equivalency is not dispositive under current Fifth Amendment jurisprudence," the court said. "We conclude that the act-of-production analytical framework makes sense only where law enforcement compels someone to perform an act to unlock an electronic device."

The Utah case was an officer demanding to know the passcode. A court in New York might decide that the defendant can be compelled to enter his password and hand over an unlocked phone.

But if he's forgotten the password, then the phone is simply locked until somebody hacks into it.

[–] DBT@lemmy.world 25 points 2 months ago (1 children)

If anyone ever takes my phone and asks for the password, I forgot it. Guilty or innocent, doesn’t matter.

[–] elbarto777@lemmy.world 4 points 2 months ago (1 children)

You're right. But it's not his phone. It's his employer's phone.

[–] DBT@lemmy.world 6 points 2 months ago (1 children)

Then they shouldn’t need the password…

[–] elbarto777@lemmy.world 1 points 2 months ago

I can't disagree with that. Which makes it worse - tampering with evidence.

[–] Nunar@lemmy.world 21 points 2 months ago (3 children)

Everyone should do this!!! No one who wants your phone code is your friend! Police, feds, spouses/partners. If anyone wants to unlock your phone, they're looking to incriminate.

[–] some_guy@lemmy.sdf.org 9 points 2 months ago

He's an elected public servant. Regardless of whether or not we want to protect ourselves from prosecution, he's supposed to be accountable for his actions and he's deliberately spoiling the investigation.

[–] elbarto777@lemmy.world 8 points 2 months ago

No, not everyone. If I'm a public servant, I should be using work phones for work stuff. And I should expect any government-sanctioned investigation office to have access to it.

It would be a different thing if it was his personal phone. In that case, I could agree with you.

[–] Flocklesscrow@lemm.ee 2 points 2 months ago

"Just say No"

[–] Th4tGuyII@fedia.io 19 points 2 months ago

From a pro-privacy standpoint changing your passwords to something you can't remember is absolutely the right thing to do to prevent yourself from being compelled to give up any passwords...

But in light of him being a government official tampering with his government issued phone to "accidentally" prevent it being used to investigate official wrongdoing, that act becomes highly suspicious, and (in the FBI's shoes) would only give more incentive to hack into his phone.

[–] MegaUltraChicken@lemmy.world 14 points 2 months ago

If it was turned on, they've likely already gotten it unlocked. If he had time to turn it off he might buy himself some time but I seriously doubt they would even charge him without having all the receipts already anyways.

In short, this dude is FUCKED.

[–] chemicalprophet@lemm.ee 5 points 2 months ago

I have not forgotten their training on how to put a knee on someone’s neck. Should I subdue the suspect?

[–] Doom@ttrpg.network 4 points 2 months ago

this is a fuckin SNL skit

[–] Beacon@fedia.io 3 points 2 months ago (1 children)

Does Apple/Android have a 2-factor authentication system to reset a phone's passcode?

[–] some_guy@lemmy.sdf.org 3 points 2 months ago

Apple has a feature to restrict changing the passcode when not in a typical geolocation. This is to prevent thieves from shoulder-surfing your passcode in a bar and then snatching the phone and changing the code. If you're at home or at work (where the phone recognizes your typical behavior / location), it shouldn't activate. In a random location, it would. I don't know how well that works. It's a relatively recent feature (within a year or so, I think).

FBI: "Darn! So did we!"