Speaking with reporters Thursday, FBI director James Comey described himself as “very concerned” by steps tech companies like Apple are taking to strengthen privacy on mobile devices.
“I am a huge believer in the rule of law, but I am also a believer that no one in this country is beyond the law,” Comey said. “What concerns me about this is companies marketing something expressly to allow people to place themselves above the law.”
The Federal Bureau of Investigation needs to hire more hackers — and that means changing the rules about how much pot you can smoke on the job.
“I have to hire a great work force to compete with those cybercriminals, and some of those kids want to smoke weed on the way to the interview,” FBI Director James B. Comey told the Wall Street Journal.
There’s a belief that Apple makes new engineers work on fake products until they can be trusted. According one of the company’s former employees, Adam Lashinsky, who published the book Inside Apple last January, the Cupertino company hires people into so-called “dummy positions” until it’s confident that they can be a part of upcoming products without leaking information.
But how accurate are those claims? We know Apple takes secrecy very seriously, but would it really waste time and money on giving people fake projects just to ensure they won’t squeal?
First, AntiSec leaked a ton of iPhone and iPad UDIDs to the public, claiming they hacked them off an FBI laptop. The FBI responded and said there was no way the UDIDs came from them. Then Apple jumped in and said that they totally didn’t give anyone 12million UDIDs. But 12million UDIDs were still leaked and people are still wondering how the heck AntiSec got them.
A few theories have been bouncing around the web this morning, but the most plausible theory of how AntiSec got all the UDIDs is that a network of free apps were keeping track of UDIDs and AntiSec hacked them off the publisher’s laptop.
Yesterday, AntiSec leaked over 1million Apple UDIDs that they claim came from a FBI laptop they hacked. What was the FBI doing with all those UDIDs, and who gave them to them? Well the FBI says that they totally didn’t get hacked so it’s not their fault.
Apple has been quiet the entire time about the whole thing, until this morning when they released an official comment stating that they never gave the FBI anyone’s device IDs.
The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs was exposed. At this time there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.
Strange. If that data didn’t come from the FBI, then, who did it come from?
You have to wonder if they felt a storm coming, as today, the hacking group AntiSec has released more than 12 million UDIDs that they managed to recover from an infilitrated FBI laptop. And your device ID — along with everything you did with the iPhone, iPod touch or iPad associated with it — might just be one of them.
When we think about security for our mobile devices, we’re usually protecting it from nefarious individuals. Well guess what? It apparently works both ways. In a story straight out of James Brown’s diary, the FBI is having a hard time busting a notorious San Diego pimp thanks to Android’s pattern lock feature.
Back in 1991, according to a recently released FBI file on Apple’s iconic founder, Steve Jobs was considered for a sensitive position in the Bush Administration.
The file is quite long, and we’re reading through it now. But one thing that the file immediately makes clear is that even the FBI knew about Steve Jobs’s patented reality distortion field! In fact, it’s directly referenced in their file on more than one occasion.