Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Is it possible that he's a double agent for the Democrats to ensure a Democrat victory?

Honestly I would LMAO. I also wouldn't put it past him to say that, as he bows out under pressure. I mean this not a guy who cops to defeat. So it would be as a grand deflection of all the critiques of how terrible a Republican he was.

"And by the way, I've filmed the whole primary season and it will air in segments with my voiceover pointing out how well I had you Repugnicans duped as I disrupted your silly debate scripts and heartless platforms."

In my dreams. But there's a downside, of course. Surely he'd think he deserved a chair in Clinton's cabinet. Secretary of State Donald Trump. :eek:
 

Yeah, that really sound stupid to those who knows a bit more. Actually I believe that this is just product placement like all those closeup to "agency mobiles" or tablets or whatever they use as gadgets.
But still funny ...
[doublepost=1457139219][/doublepost]
Is it possible that he's a double agent for the Democrats to ensure a Democrat victory?
I wouldn't be surprised ... And would make a phantastic movie ...
 
Last edited:
This District Attorney is in need of an enema from Harvey Specter!

No, he needs a judge to fall on him like a ton of bricks for trying to mislead the courts.
Slap him with a $100,000 fine, suspend him from practicing law for 6 months, do something to tell the lawyers they are in a privileged position, and if they want to behave like wankers they will be punished and loose that privilege
[doublepost=1457142589][/doublepost]Is there an election coming up where campaign funds are needed ?

How much does it cost to say something that bloody stupid.... in public ?????
 
Is it possible that he's a double agent for the Democrats to ensure a Democrat victory?
I've mentioned to my wife that I thought it odd that Trump had backed Hillary before.

If anything could possibly unhinge the Repubs more would be him backing out at the last moment for a 3rd party run, which I would believe would give the edge to the Demos.

Now don't get me wrong, I'm not really happy with the choices at hand. Our political system is broken at its worst.
This FBI is really up a creek, i believe. This gentleman (cough) adds to the pathos.

Pass the popcorn..this is getting good....
 
The problem with this argument is: installing a custom version of iOS would wipe out any malware that would be present.

If an iPhone was infected, the fix would be to re-install iOS, which is what the government is asking Apple to do with a custom version.
 
  • Like
Reactions: chabig
Honestly I would LMAO. I also wouldn't put it past him to say that, as he bows out under pressure. I mean this not a guy who cops to defeat. So it would be as a grand deflection of all the critiques of how terrible a Republican he was.

"And by the way, I've filmed the whole primary season and it will air in segments with my voiceover pointing out how well I had you Repugnicans duped as I disrupted your silly debate scripts and heartless platforms."

In my dreams. But there's a downside, of course. Surely he'd think he deserved a chair in Clinton's cabinet. Secretary of State Donald Trump. :eek:

It won't matter either way. He's so thoroughly and effectively splintered the party that it's never going back to what it was even two years ago. If he loses the nomination outright (improbable) or loses it via contested convention (60/40), his supporters will abandon the GOP and he'll run as an independent. The establishment knows it, which is why they're engaging in intense and concerted oppo assassination even though they're intending to contest. They want him unelectable under any title.
 
  • Like
Reactions: LizKat
So...if the phone did hold something like this turning it off and leaving it off fixes everything. This is antivirus 101. Can your AV solution quarantine and fix it easy enough to keep that endpoint on the network and working? No. Remove it from the network....NOW! Hell the DoD IT people cut off the entire section the computer is found in. My wife has had boring days at work when their segment shut down because of 1 computer.

Like I said earlier in another thread this is also the reason you make images of the source and work off them, In a closed environment,. No network, controlled environment. Some call these sandbox setups. Make it, run code in it , see what happens. That little virus can do what it wants to. Its not going anywhere. Its controlled so you know what the hell its doing. You know exactly what the files are at the start to see what its changing about the files once its run.

FBI really needs to stop this crap now (they are using county as a proxy....my tin foil hat anyway). I have had nothing but respect for many of their "cyber" divisions. The child sicko section does amazing things for example. Stuff that blew my mind and had me go damn.....they have some skills. They are making these people look bad. That and they are making cyber forensics look bad.

I see backlash in the defense realm here worst case. Your honor my client was convicted by FBI cyber forensics people and well.....I am petitioning for a competency hearing to clear my client. I don't think he was convicted by firm evidence analyzed by skilled personnel.

That and well.....if this was the case why was the NSA not contacted....again (becoming a broken record for me it seems). Virus on a phone that can crash US government infrastructures is kind of their thing. I think the FBI is bringing the wrong people to court. Seems the NSA is not being helpful here. If they are even being contacted. If the credit for this phone is so vital to ego of the FBI....this is potentially a bigger issue than the phone. This isolationist and glory seeking....problems I see. 15 years in IT and I have no ego, I just want stuff fixed and on to other things. Youngblood has some skills, I will ask for help if stumped and say teach this old dog some new tricks.
 
Simple solution. Pull the battery. Disconnect all transmission antennas and cut circuits to transmission chips. No wifi, no Bluetooth, no cellular. And no power.

Then they have full control over what it's capable of.

Or burn it, and be done with it.

If they believe it's a ticking time bomb, then do what they're trained to do, blow it up.

Bring George Bush in, he'll show you how to destroy it.

Set it out in the desert and point 20 missiles at it. Problem solved.

According to their theory, it's now a weapon of mass destruction. Treat it like one. George had it right there, he didn't try to dissect the weapon. If he thought one might exist, he obliterated the area.

Let's take George's lead, iPhone weapon of mass destruction is located in FBI headquarters. We now know where to aim the missiles. Blow that phone up. George would have solved this problem with one button.
 
  • Like
Reactions: bwillwall
the iPhone used by terror suspect Syed Rizwan Farook "may contain evidence that can only be found on the seized phone that it was used as a weapon to introduce a lying dormant cyber pathogen that endangers San Bernardino's infrastructure."

Evidently he has lost his dictionary and / or doesn't know the meaning of lying ... if that is what he actually wrote.
 
Say the words "National Security" and we will all drop our underwear, just like we drop our shoes at all major lines, even though it is a stupid screening method.

Chicken Little has nothing on these panic teams.
 
  • Like
Reactions: Benjamin Frost
Wow.

I'm not siding with Apple on the issue given known considerations, but that dude is off the rocker switch. "Dormant cyber pathogen"?

It's not impossible, especially if the phone were jailbroken beforehand, but the chances of that-- why bother when the phone can do most things with a simple flick of a finger?

I don't recall anything saying the phone was or was not jailbroken. Just Apple's own algorithm, for which the "human rights but only when we profit by them because we still profiteer from child and slave labor" advocates start to mewl and whinny.

It's far more likely that documentation for crimes, addresses of cohorts, et cetera, are on that phone and nothing more.

Plus, depending on type of malware, it's not going to get very far. And it's not often when malware made for one brand of phone can magically jump platforms, unless there's a write-once-run-anywhere middleman like Flash or Java and APIs therein to exploit. Jobs was hyperfocused on battery life, no touch capabilities, and resource usage when screaming at the masses (while quaintly ignoring all the battery draining nonsense in the Apple app store), but for the security aspect there was a point, even if he didn't say it*. A convenient one, but one nonetheless.

If nothing else, maybe there's just a recipe for meatloaf and the whole rigmarole circus will have been for nothing - which is not to say other cases would be identical by default...


* At all, or anywhere near as loudly as his other checklist o' attack vectors to wipe out the competition that provided the same games for free instead of $3.99 ;), I'd read some articles from 2010, like this one, when he made his claim.
 
IT'S HIS WORK PHONE. Half the country has a phone from work. AT LEAST half of those people know to put only work stuff on it. Worst case the thing has a forwarded bulk junk mail on it with a typical teenhack mail enclosure that works on Windoze desktops. FBI and DA need to up their game.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.