lifelibertytech.com Open in urlscan Pro
207.246.88.149  Public Scan

Submitted URL: http://lifelibertytech.com/
Effective URL: https://lifelibertytech.com/
Submission: On October 28 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

GET https://lifelibertytech.com/

<form method="get" class="searchform search-form" action="https://lifelibertytech.com/" role="search"><input type="text" value="Search this website …" name="s" class="s search-input"
    onfocus="if ('Search this website …' === this.value) {this.value = '';}" onblur="if ('' === this.value) {this.value = 'Search this website …';}"><input type="submit" class="searchsubmit search-submit" value="Search"></form>

POST https://feedpress.it/e/mailverify

<form style="border: 1px solid #ccc; padding: 3px; text-align: center;" action="https://feedpress.it/e/mailverify" method="post" target="popupwindow" onsubmit="window.open('http://feedpress.it/e/mailverify?feed_id=LifeLibertyTech', 'popupwindow',
'scrollbars=yes,width=550,height=400');return true">
  <p></p>
  <p style="text-align: center;"><strong style="line-height: 1.5em;">Get Life, Liberty, and Technology in Your E-mail</strong></p>
  <p>Enter your e-mail address:</p>
  <p><input style="width: 140px;" type="text" name="email"></p>
  <p><input type="hidden" name="feed_id" value="LifeLibertyTech"> <input type="submit" value="Subscribe"></p>
</form>

Text Content

 * Home »
   * Life
   * Liberty
   * Tech
 * About This Blog
 * About “New Liberty Bell”
 * Contact the Author
 * The MB Tech Network


LIFE, LIBERTY, AND TECHNOLOGY

Digital Enlightenment


REMEMBERING 9/11, SIXTEEN YEARS LATER

September 11, 2017 by Marcel Brown 2 Comments
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

I’m not usually an overtly “patriotic” type of person. Two years ago my oldest
daughter played the national anthem at one of her first football games as part
of her high school marching band. It happened to be 9/11. I did feel something
stir inside me. It probably was because on September 11th, 2001 the birth of my
first child was imminent and my life was changing forever. So these events are
forever intertwined in my mind.
 
I remember a lot of that day 16 years ago. Minor little things like I had just
watched the Monday Night Football game the evening before. It featured the New
York Giants and Denver Broncos. Wide receiver Ed McCaffrey broke his leg during
that game. However, I also remember important details of my life. My wife was
very pregnant and was basically on restricted activity so I had been driving her
to work for a week or two. We were listening to the The Steve & DC Show show
that morning as we had done for many years. When news of the first plane
crashing into the towers came across, my first thought was of one of the Die
Hard movies where the terrorists manipulated the airport’s guidance system to
make a plane crash. Commercial jetliners don’t just crash into buildings. This
either had to be a horrible mistake or it was intentional. Not knowing for sure
what was happening (and assuming it was simply just a terrible accident) I went
ahead and began driving my wife to work. When the news of the second plane was
announced I remember exactly where I was. I-255 South right before the exit ramp
to I-55/50 West. At that point I knew it was no accident. Had I known better I
would have turned around and brought my wife back home. But being young and
naive, I went ahead and took her to work, then went to my parking lot in
downtown St. Louis (where the new Busch stadium now stands) to wait for a
shuttle to bring me to work.
 
While waiting for the shuttle to come around, there wasn’t really anyone near
me. I looked around and thought to myself how the calm in that parking lot was
such a contrast to what was happening in New York. I felt that the relative
peacefulness surrounding me at that moment was like the calm before a storm.
These events, even before I heard about the Pentagon attack and the scale of the
tragedy to unfold, were unlike anything that had happened in this country and I
knew that things would change drastically for everyone after that day.
 
When I got to work there was of course very little work going on. Most people
were talking about the news and trying to watch a TV. People were still
beginning to hear about the 2nd plane and realizing it was no accident. As word
kept coming in about further attacks and the towers collapsing, it felt weird to
be at a job where work tasks seemed so insignificant by comparison to what was
happening in the rest of the world. I had a relatively important call scheduled
with someone in another department that morning and we went ahead with that, but
talking about some mundane technology details of some corporate network system
felt surreal as none of that really mattered on that day. I recall where a woman
co-worker came crying frantically down the hall saying she saw a plane circling
near our high-rise building. I remember trying to calm her down and realizing
just how much this was affecting people who I had never seen act in a
non-professional way. Eventually our management felt that anyone who wanted to
go home could and that was good with me because I was going to leave anyway, as
my wife had already left her job and I should have been the one to pick her up.
 
We spent much of the afternoon at a friend’s house who was home recovering from
a recent kidney transplant: his own life changing event. Having had kidney
problems for literally all of his life, he had said previously that this was the
first time that he expected to live past his 20’s. He shared that he never
really saved much money because he didn’t think he’d be around long enough to
spend it. And now he was set to marry his fiancé (who incidentally was the
person who donated the kidney) in a couple of months. So as I was ready to bring
a child into the world, he was basically starting his life anew. The set of
circumstances that were surrounding us all at that time seemed odd, but also
perhaps fitting. All our lives would have never been the same after that fall
regardless, but now the world was changing in front of our very eyes in a very
dramatic way.
 
So as it is, every milestone birthday in my oldest daughter’s life is
synchronized with the anniversary of that horrific day in our history. This
year, being her sweet 16, perhaps it is a little more poignant. She is about to
get her driver’s license and essentially begin to venture out into the world on
her own. The world where 16 years ago on this day we suddenly we all wondered
about our future and our children’s future. However, don’t be mistaken. As sad
as all this sounds I choose to look at the positive. Where great evil was
perpetuated on that day, we saw incredible heroism and selfless behavior.
Afterwards, we saw an outpouring of support from people in this country and all
over the world. Since that time I have come to believe that there is far more
good in the world than evil and that humanity is generous, kind, and full of
love by nature. Perhaps symbolically we are seeing a lot of that kindness and
generosity right now with the recent hurricanes that have caused a lot of
devastation in Texas and Florida, among other places. While we all had our own
particular circumstances that shape the way we remember 9/11, my own with the
forthcoming birth of my first daughter ultimately taught me that life goes on. I
don’t worry for either of my daughters becoming young women even in a post-9/11
world. I know there will always be evil but I also know that we can’t dwell on
the possibility of bad things happening. So my advice to my daughters will be to
seek the good in this world, surround yourself with kind people, and work to
help others in whatever way we can. We must live our lives as we are meant to
live them and not be afraid of what the future holds.
Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Life


BERNIE SANDERS’ LAST CHANCE FOR PRESIDENT

November 1, 2016 by Marcel Brown 1 Comment
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Let me be clear: I am not a fan of Bernie Sanders’ politics. I do not believe
socialism is a good economic system, nor that it is compatible with the United
States Constitution. However, I do agree in principle with one idea that Bernie
Sanders symbolized: that the political system in the United States is corrupt
and tilted in favor of the rich and politically powerful. While at first I was
diametrically opposed with what Bernie Sanders stood for, I eventually gained a
respect for the man and the movement that grew around him. I believe that many
of his supporters are less true socialists and rather hold more
anti-establishment ideals. I can definitely see why someone who claimed they
were going to level the political playing field received so much support.
Therefore I was a bit surprised when Bernie Sanders seemed to sell out and
support Hillary Clinton as nominee of the Democratic Party. He had just spent
many months painting her as everything he stood opposed to and then it was
revealed that the Democratic National Committee conspired to ensure Hillary
Clinton was their nominee. Having some time to ponder the situation, I’ve come
to two conclusions.


BERNIE IS DOING WHAT HE MUST

First, Bernie Sanders is being an extremely smart politician. If he had bucked
the DNC and withheld his support for Hillary Clinton, he would be politically
finished. The DNC is too powerful for him to stand against. His best chance at
moving his political agenda forward was to ally with Hillary Clinton and give
her his full support. In exchange, she claims she will adopt some of his ideals
and the DNC will keep Bernie at the forefront of their party. Bernie is doing
exactly what he needs to do to remain politically relevant. I can not blame him
as a politician for doing what he is doing. He has worked to bring himself
mainstream visibility in national politics and he wants to leverage that base of
support the best way he can. However, Bernie supporters are not beholden to
Hillary Clinton or the DNC. They can continue Bernie’s mission even if he can
not currently do so himself. Obviously he can no longer tell his supporters to
not vote for Hillary Clinton, but it doesn’t take much to read between the lines
on how he really feels about her.

The problem with supporting Hillary Clinton is that no one can trust her any
farther than they can throw her. Of course she says now that she will
advocate the policies that Bernie Sanders promoted. She needs the votes of
Bernie Sanders’ supporters to get elected! Like Barack Obama said in 2008,
Hillary Clinton will say anything to get elected. But what happens after she
gets elected? She will say and do anything it takes to keep political favor and
reward those who helped get her elected, which if you believe Bernie Sanders,
include a lot of Wall Street and big money donors. She is as just as likely to
align with Republicans (as her husband did in the 90’s) if that will help her
get re-elected or help her contributors. If I were a a Hillary Clinton
supporter, I would be scared to death that she will keep any of the promises she
is giving now – and so should Bernie Sanders supporters. There is nothing
keeping her from dropping you like a bad habit if she gets elected. She won’t
need you in the next election.


BERNIE SANDERS 2020?

My second conclusion is that for Bernie Sanders to ever have any chance at the
presidency, Hillary Clinton can not be elected president this year. The reality
for Bernie Sanders supporters is that the Senator is 75 years old. He would have
already been the oldest president ever elected this year. Four years from now at
79 years old is realistically his last chance at becoming president. If Hillary
Clinton or any Democratic Party member (Hillary Clinton might be impeached if
she is elected president) is the president 4 years from now there’s no way
Bernie Sanders will have an opportunity to run. Unless a Hillary Clinton
presidency is an absolute train wreck of unprecedented proportions, he can’t
honestly run against the party he supports. His only chance is for someone other
than a Democratic Party member to be president in 2020 so he can mount a viable
campaign. If you are a true Bernie Sanders supporter, electing Hillary Clinton
will kill any chance he has of ever becoming president and she likely will
suffocate his agenda to appease her big money supporters. A vote for Hillary
Clinton is shooting yourself in the foot and also excusing the DNC shutting for
out Bernie Sanders’ campaign and his supporters.


BUT DONALD TRUMP!

Ok, I get it that you can not support Donald Trump. I’m not asking you to vote
for him. In fact I’m not voting for him. There are ways besides voting for Trump
to show that you are not satisfied with the establishment candidates in this
presidential election. You also get an opportunity to punish the DNC for
disenfranchising your vote.

The simplest thing you can do is vote for a third-party candidate of your
choice. The most likely options are Gary Johnson of the Libertarian Party and
Jill Stein of the Green Party. The simple choice is that if you are more
anti-establishment, Gary Johnson is your man and if you identify as a true
socialist then Jill Stein better represents you. But do your own research to
make your own conclusions. That being said, I will add that if any third party
gets over 5% of the popular vote this election cycle, it gets them automatic
ballot access in the next election plus significant federal funding which will
start them on equal footing with the establishment parties. They can then put
more resources towards campaigning instead of fighting tooth and nail to get on
the ballots in all 50 states. Certainly having more political voices can only
help us all, much like Sanders did in his presidential bid. The most popular
third party candidate thus far is Gary Johnson, so if you want to help third
parties get more viability, then a vote for Gary Johnson will be the most likely
way to make that happen. If one third party can break the political glass
ceiling, then it will pave the way for others as well.

If you honestly can not vote for a third party, then a write in vote is an
option, but do note that write-in votes will not help any third-party gain
viability. You could also not vote, but that is truly wasting your voice. The
establishment parties are more than happy if you do not vote because then it
means your vote simply doesn’t exist and they get to keep the status quo. A vote
for a third party or even a write-in vote is an unmistakable message that you
are not happy with the political establishment. A non-vote simply disappears and
doesn’t really say anything at all. So whatever you do vote in some way, just
not for Hillary Clinton.

A lot of you will say that a third-party vote is still a vote for Donald Trump.
I respectfully disagree, but even if we accept this assumption, it is actually
more helpful for Bernie Sanders if Trump were elected than Hillary Clinton. If
Donald Trump is as bad as you think he is, then it makes it all the more likely
that Bernie Sanders would be the Democratic Party nominee next election cycle.
As a Bernie Sanders supporter, you believed that the best chance of defeating
Trump was Bernie Sanders. If you believed it then, you must believe that one
term of a Trump presidency will make it even more likely for Bernie Sanders to
win the next election. Yes, I agree this option stinks, but you were robbed of
your opportunity this election. If you want any chance at getting Bernie elected
president, you may need to put up with 4 years of Donald Trump. If anything this
is Hillary Clinton and the DNC’s fault so how can you reward them with your
vote?


WHO DO YOU REALLY BELIEVE IN?

It simply comes down to this for Bernie Sanders supporters: what do you believe
about Hillary Clinton? Do you believe what Barack Obama said in 2008 and what
Bernie Sanders said in the primaries about her corruption and big money
influences, or do you believe she will actually keep her word after she’s taken
your vote? If you trusted your candidate back then, know that he is doing what
he can as a politician to keep his influence by aligning with Hillary Clinton
now, but that doesn’t mean you must. Send a message to the DNC that they can not
get away with disenfranchising your vote and you will not support Hillary
Clinton this election so that Bernie Sanders can have one last chance at
becoming president next election.

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty


MATHEMATICAL PROOF GARY JOHNSON CAN WIN – THE POWER OF TWO!

August 24, 2016 by Marcel Brown 1 Comment
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

It should be no surprise to anyone that the level of voter dissatisfaction with
the candidates presented to us by the establishment parties is at an all-time
high. A huge number of people do not want to vote for either Donald Trump or
Hillary Clinton. So what are they to do? An ever increasing number of people are
considering voting for a third party candidate, but when discussing it with
others, they start to doubt the validity of voting for a third party.

Sadly, the number one objection to voting for a third party is that people think
they would be wasting their vote on a candidate that can’t win. With thinking
like that, it virtually guarantees that no third party will ever become relevant
and the political status quo will remain. How can a candidate ever get enough
support to win if people are waiting first for everyone else to get on the
bandwagon?

I’m sure you’ve all heard that if one person shares an idea with two people and
those two people each tell two more people, and so on, that idea will spread
very quickly. Mathematically speaking, this is called geometric (or exponential)
growth. When doubling something each time, the math formula is based
upon exponents of the number two, or in other words, the power of two. I bring
it up now to end the narrative that a third party presidential candidate,
specifically Gary Johnson, can not possibly win the presidential election and
hopefully help convince people to vote their conscience and bring about
political change in this country.


IT’S SIMPLE MATH

For purposes of this exercise, let’s ignore the electoral college and simply
surmise that it will take approximately 50 million votes to win in a three-way
race (it would probably be closer to 47 million, but 50 is a nice round number).
This assumes there would be about 130 million votes total, which would about
equal the highest ever number of popular votes in a presidential election: the
131 million cast in 2008. Mathematically speaking, if we started with a single
voter convincing two other voters, it would take only 25 “generations” of
subsequent voters convincing other voters to reach over 67 million votes, far
more than the 50 million needed. (The formula for computing the exponential sum
of a number taken to a certain power is basically to calculate one power higher
and subtract 1. So if 226 = 67,108,864, the sum of the powers of 2 up to the
25th power is 226 – 1.)

To put a timeframe around this calculation, what if we concluded that one voter
could convince two other voters in a single day? Then it would only take 25 days
to generate enough votes for a presidential candidate to win. If we slowed down
the process and assumed it took two days to convince two voters, then that is
still only 50 days needed to convince enough voters for a presidential win in a
three-way race. Pushing the timeframe out to three days equals 75 days, which at
the time of this writing is almost exactly the amount of time left before the
election. That is plenty of time for enough people to become convinced to vote
for any candidate, let alone one that already has growing popularity like Gary
Johnson.

If you feel that convincing two voters every few days is not realistic, realize
that we are not starting at one single voter. Gary Johnson received 1.2 million
votes in 2012 (with ballot access in only 48 states) – the most ever for a
Libertarian Party candidate. If we round down and make the starting point just 1
million voters, then it would only take 5 generations to reach 64 million votes,
much more than the 50 million he would need. If we started with one million
voters today, at the pace of convincing only two voters every week, that would
only require five weeks. If we stretch that out to every two weeks, that would
still be fast enough to get enough votes to win – with time to spare. Certainly
persuading two voters over the course of a week or two must seem feasible.

Still not convinced? Consider these facts:

 * Gary Johnson’s base of support has been growing steadily since he was
   officially nominated as the candidate of the Libertarian Party back on May
   29th – over 12 weeks ago. As it became clear that Donald Trump and Hillary
   Clinton were to be the official candidates of the Republican and Democratic
   parties 4 and 5 weeks ago, interest in third party candidates including Gary
   Johnson increased significantly. Given the exponential growth possibilities,
   that is a lot of time passed in which voters may have already been convinced.
 * If various polls are accurate (and they generally are skewed against third
   party candidates), with Gary Johnson approaching 15% of the vote, that is
   currently about 19 million out of 130 million votes. With that base of
   support, if those 19 million people each convinced just two other voters,
   that ALONE would be enough to go over the 50 million need to win in a
   three-way race.
 * If Gary Johnson is allowed to participate in the presidential debates, a lot
   of potential voters could be convinced “spontaneously,” adding to the base of
   people who could convince other voters.
 * Gary Johnson already has ballot access in all 50 states this election cycle.
   There’s no reason people won’t be able to vote for him if they so choose.
 * What if one voter could convince three other voters? Suddenly, the number of
   generations shrink significantly. Assuming one voter to start, it would take
   just 15 generations to reach over 43 million votes, which is close to the
   rounded-up 50 million number needed (a 16th generation would reach over 129
   million in theory). Assuming one million voters to start, it would only take
   3 generations to reach 81 million votes, obviously well more than needed. At
   19 million voters to start, convincing just three people each (a single
   generation) would be enough for 76 million votes, once again significantly
   more needed to win in a three-way race.
 * In this day and age of social media, just how many other people can one
   person help convince? They don’t call it “going viral” for nothing. Suddenly,
   convincing just two or three other voters seems too easy. What if one voter
   could convince four or five other voters? Or more?

Now obviously, convincing someone to vote for a candidate isn’t a simple
mathematical formula. It takes more than just merely telling someone about a
candidate – although with the high negative numbers the two establishment
candidates have this election cycle, it might not take all that much! This
article is not proof that Gary Johnson is GOING to win. It simply is proof that
it is entirely POSSIBLE for virtually anyone to get enough support to win a
presidential election in a relatively short timeframe IF voters are willing to
personally convince a few other voters. If we even allow for imperfect geometric
growth on the power of two, there is plenty of time left at this point in this
election cycle to convince enough voters for Gary Johnson to win outright, not
to mention that this process has been going on for at least a few months and
there is already momentum on his side.


YOU’VE GOT TO DO YOUR PART

Of course, convincing other voters requires people taking part in
conversations and discourse – and that is the entire point! It does require some
work and people need to be willing to put themselves out there a little bit.
However, if you aren’t satisfied with the political status quo and want to
effect substantive change, you need to put a little effort into it. If you feel
like it is impossible to help a third party candidate win, that you can’t do
much as one person, simply try to convince at least two other people to vote
third party and make sure to tell them to each convince at least two other
people. Feel free to share this article with them for emphasis. As this article
shows, you might just start the ball rolling on real political change in this
country. Even if you can’t vote yourself but you are politically inclined, as
many teenagers and immigrants may be, you can help influence the votes of
others. The two or more people you convince can start a tidal wave.

As I mentioned at the start of this article, when you are telling people about
third party candidates like Gary Johnson, the first thing you’ll likely hear is
that the person likes the idea of a third party candidate, but they don’t think
they can actually win. Therefore they don’t want to waste their vote. Hopefully
the information in article can be your first response to this objection and you
can start to change a few minds. By using the Power of Two, it only takes a few
people convincing a few other people and so on …

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty


9TH U.S. CIRCUIT COURT OF APPEALS RULING IS ELITIST, SEXIST, HOMOPHOBIC, AND
RACIST

June 9, 2016 by Marcel Brown 1 Comment
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

This is how the state of California and the 9th U.S. Court of Appeals view the
free people they supposedly serve

The 9th U.S. Circuit Court of Appeals has ruled that the 2nd Amendment does not
protect the right of individuals to carry concealed weapons. Certainly I have
much to say on the implications that this ruling has on our rights and freedoms.
However, that is the low-hanging fruit. I prefer to look a little deeper. In
reviewing the ruling, I think many people are overlooking the inherent elitism
that the court ruling implies, possibly going as far to be called sexist,
homophobic, and dare I say racist.

The basic crux of the matter at hand are that people in California are only
legally allowed to carry concealed weapons if they are granted a permit. Part of
being approved for this permit is dependent on the applicant proving that “good
cause exists” for carrying a concealed weapon. Each county in California is
allowed to define what exactly “good cause” means for the applicants in their
jurisdiction. One of the counties in question, Yolo County, does not explicitly
define “good cause,” but only gives examples of what they consider to be valid
reasons to carry a concealed weapon:

 * Victims of violent crime and/or documented threats of violence.
 * Business owners who carry large sums of cash or valuable items.
 * Business owners who work all hours in remote areas and are likely to
   encounter dangerous people and situations.

Additionally, both Yolo and San Diego County, the other named county in the
lawsuit against the state of California, explicitly define that “self protection
and protection of family” or “simply fearing for one’s personal safety alone”
are not valid reasons for carrying a concealed weapon. So let’s
further examine these “good causes,” shall we?


ELITISM IS ALIVE AND WELL IN BIG GOVERNMENT

Basically what these counties are saying, and by extension the state of
California and the 9th U.S. Circuit Court of Appeals endorse, is that the life
of a person or their family are not “good causes” worth protecting, but large
sums of cash or “valuable” items are. So cash and material items are more
“valuable” than human life according to these various big government entities.
Besides the inherent condescension of a government imposing where and how the
people they serve may exercise their own rights, not allowing people to defend
their own lives unless they have “valuable” cash or items smacks of
unabashed elitism. If one is looking for a situation where real privilege is
handed out, look no further than the state of California and their concealed
carry legislation. Apparently, only certain lives are privileged enough to
defend themselves.

The state of California and the United States government is basically telling
women that their bodies and health are not valuable enough to protect against
rapists. How sexist of them. Talk about a war on women, big government believes
women aren’t capable enough to determine for themselves when they have a “good
cause” to protect themselves from violent sexual predators. The same goes for
homosexuals. Big government in California does not allow the LGBT community to
decide for themselves when they think they posses “good cause” to
safeguard themselves from violent people. Are the state of California and the
United States government homophobic? Sure sounds like it.

However, if you are a business owner, and only a business owner, you apparently
are “likely to encounter dangerous people and situations.” Now, I wonder exactly
how the state of California defines “dangerous people.” Would they be people who
live in certain areas? Maybe those areas would include inner cities? Don’t
people of minority status live in inner cities? Racists!

Now, I admit that this last point may be a bit of a stretch. But, I would be
willing to bet that if the records of who was given concealed carry permits were
reviewed and for what circumstances, it could be interpreted in a way that would
show tendencies to give permits to people who were more affluent and
non-minority. I wonder if anyone has this information or if the state of
California would be willing to divulge such data?

So what do you think? Do you like the fact that certain governments think they
know better than you where and how you may protect yourself or your family? Or
are you happy that they consider cash and material items to be more valuable
than you and your family’s lives?

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty


DEMOCRATIC CANDIDATES TOTALLY LAME ON APPLE, FBI

March 3, 2016 by Marcel Brown 0 Comments
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Having no position is basically the same as siding with the FBI.

Last week I wrote an article taking the Republican presidential candidates to
task for not understanding the broad implications of the Apple and FBI
situation. I didn’t consider at the time what the two Democratic candidates’
positions were. So I did a little reading and found that while the Democratic
candidates were not firmly on the side of the FBI as the Republicans were, they
too didn’t seem to grasp the possible ramifications of Apple being forced to
comply with the FBI order. In some way, their weak-kneed refusals to choose a
stance are perhaps even worse than what the Republicans stated. I’ll explain
why.

Bernie Sanders said he is on “both” sides of the issue. He said he is fearful of
“Big Brother” but he also worries about another terrorist attack. Ultimately he
says that he believes that middle ground can be reached. At first glance this
seems like a perfectly balanced, rational answer, but it shows a tacit ignorance
of the technical issues involved. Political compromise will not work in the real
world of data encryption.

Hillary Clinton basically offered the exact same answer as Sanders. She also
fears abuse of encryption backdoors by “authoritarian regimes,” but believes
that there must be a way to find a solution that both keeps data secure and
allows law enforcement access. Again, seemingly reasonable but only if one does
not understand the underlying technical issues.


WISHY-WASHY PANDERING

The answers given by both Democratic candidates are political cop-outs. They are
not true position statements. While I appreciate the fact that at least these
two candidates aren’t calling for Apple to comply with the FBI order, by not
specifically siding with Apple, they are leaving the door open for some sort of
“compromise.” In this situation, to call for compromise is to implicitly end up
on the side of the FBI, which is to stand against individual privacy and
security.

The reality of strong encryption is that *ANY* sort of backdoor weakens the
encryption protocol to the point of insecurity. Any weakness will eventually be
exploited. I find it hard for anyone who does not understand the underlying
technical aspects of strong encryption, let alone government officials or
political candidates, to propose solutions that verge on pure fantasy. The type
of compromise that the the Democratic candidates floated (which is basically
what the FBI director wants) is what is termed the “magic pony” solution because
it is more wishful thinking than technical reality. I do not know of a single
cryptographic expert who would claim otherwise, and even publications like the
MIT Technology Review agree that there can be no technical middle ground on
strong encryption.

I stated earlier that the Democratic candidates’ responses are potentially worse
than the Republican candidates’ positions. By floating false solutions, the
Democrats are setting the stage for people to believe that a “compromise” is
possible. There is no more dangerous position to hold than one which deceives
people into a false sense of security. If people believe that a solution can be
created that allows for truly secure encryption that law enforcement can
decrypt, they are going to be sorely disappointed when the final political
solution shows itself to be insecure. At least we know where the Republicans
stand and we can fight their positions with no pretense. When a candidate shows
no position or shows a proclivity towards political compromise, we may not know
what we will end up with until after they are elected and it is too late.

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty, Technology


UNDERSTANDING APPLE’S SIDE OF THEIR FIGHT WITH THE FBI

February 29, 2016 by Marcel Brown 0 Comments
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

In analyzing the Apple and FBI court case over the iPhone used by a San
Bernadino terrorist, it has become quite obvious that many people are not
completely comprehending the entirety of the facts. Unfortunately for Apple, I
believe the complexity of the situation is hurting their position in the public
eye. The FBI’s side of the issue has generally become overly-simplified. “Apple
needs to unlock the iPhone of a terrorist,” is all that many people comprehend.
I believe it has been hard for most people to understand the nuances of Apple’s
defense. As with anything relating to technology, people can get easily
bewildered by explanations of complex topics. Given an overly simplistic and
one-sided viewpoint, it really is no wonder that there is much confusion over
the issue. When people are not clear on a subject, they tend to fall back to
whatever side feels the “safest.” In a case like this, it is no wonder public
opinion appears to lean towards the side of “national security.” As proof of
this, all one has to do is consider the fact that no candidate from either the
Democratic or Republican party has shown explicit support for Apple.

That being said, I believe Apple could be doing a better job of simplifying the
perception of their case in the court of public opinion. Unless someone wants to
study Apple’s public statements in detail, it can be hard to get to the heart of
Apple’s defense and understand why their position speaks to more broad-ranging
issues than simply the data on one terrorist’s phone. So to help simplify
Apple’s position, I have read Tim Cook’s open letter, watched his interview with
ABC, read every page of Apple’s Motion to Vacate, and just this morning, Apple’s
prepared statement to the House Judiciary Committee so that I can explain and
clarify Apple’s position plus impart why it is so important for everyone to
understand.

If you want a quick summary, Apple’s position basically states:

 * The FBI’s order goes far beyond any precedent set before.
 * It is unduly burdensome to Apple and the technology industry in general
 * The precedent set would give government virtually unlimited power to trample
   on personal liberties well outside of the scope of this case
 * Finally the FBI order is quite simply illegal. If anything, this is a matter
   for congress to legislate, not for the FBI or a judge to decide.

In a nutshell, the FBI’s actions could end up having far-reaching
repercussions that devastate the very freedom they are supposed to be
protecting. If you’d like a more through explanation, keep reading.


APPLE’S DEFENSE EXPLAINED

First, it can not be stressed enough that the FBI’s order is NOT a simple
warrant to search for some data. Nor is it a request for Apple to do something
they can easily do or have done before. It is not as simple as “pushing a few
buttons” or just removing some code. If it were so straightforward, Apple would
have already complied, as they have in the past and have cooperated so far in
this situation. Complying with the FBI’s order will be a massively complex
technical undertaking for Apple, taking hundreds or thousands of man-hours to
complete, plus potentially a significant amount more resources to maintain after
the fact. Never has a private company ever been forced to go through such
lengths on an investigation they are not a direct party to. Additionally, the
FBI unilaterally decided to change the iCloud password of the terrorist’s
account prior to consulting with Apple. Why they did this is not known at this
time, but by doing this they wasted a great opportunity to have access to the
data on the phone without needing to go through extraordinary measures. It is
entirely possible the FBI could have avoided this situation altogether had they
not make such a grievous error.

Second, the veritable Pandora’s box that would be opened by complying with the
FBI order would be an incredible burden to not only Apple but potentially much
of the technology industry. While the FBI claims this would be a one-time
request on a single phone, the reality is that many law enforcement departments
are already lining up to make the same request as the FBI – and the FBI
themselves already have several other cases in waiting! Besides being a
significant and costly burden for Apple or any other company with similar
products, the creation and maintenance of an insider hacking tool has serious
implications on the security of American technology products. If companies can
be forced to hack their own products, would they actually be able to create
truly secure devices anymore? The monumental burden for companies to create,
maintain, and keep secure these self-inflicted hacking tools would be unlike any
ever sustained before. Companies are used to protecting trade secrets from other
companies, but can they honestly be asked to protect hacking tools that
criminals and foreign espionage would no doubt target?

Now the two points I have brought up above are somewhat arbitrary. They
primarily speak to the undue burden that the government would place on Apple and
other technology companies. It is not hard to see that someone who takes a
hardline on national security could brush away these arguments with a simple,
“tough luck” rationale. However, the next two points are what I believe are the
meat and potatoes of Apple’s position, which truly should be the position of
anyone who is concerned with protecting privacy and individual liberties in this
country, as well as national security.

Apple’s third argument contends that legal enforcement of the FBI’s order
implies that they can literally enforce any request of any kind on any company
or individual as long as they claim it is “necessary” for the purposes of law
enforcement. There would be virtually nothing that could not be requested,
including forcing a company to create encryption backdoors. This is quite
literally the definition of conscription, impressment, or involuntary servitude.
While the FBI may not be technically asking for an encryption backdoor in this
particular case, it is in essence a legal back door to eventually forcing
technology companies to cripple the security of their products for the
convenience of law enforcement. It is precisely this legal back door that
privacy and liberty advocates should be the most concerned about, especially
because it could be so broadly applied to almost any company in any industry as
well as private individuals.

This argument dovetails right into perhaps Apple’s most powerful defense, namely
that the federal government simply does not have the authority to make such a
request. It is categorically outside the power given to them through the
Constitution by we the people. Therefore such a request is plain illegal. I
don’t know how anyone could justify the federal government violating the very
Constitution they are sworn to defend and uphold. Tim Cook himself said, “To
oppose your government … on something where we are advocating on civil liberties
which they are supposed to protect, it is incredibly ironic.”


WHY YOU SHOULD CARE ABOUT WHAT APPLE IS DEFENDING

While the FBI and the Obama administration may be semantically correct that this
particular request is just about one iPhone,  it should be obvious that what the
FBI is trying to force Apple to comply with has ramifications far beyond just a
single investigation. Absolutely nothing would stop the FBI or other law
enforcement agencies from pursuing the same strategy on other cases. If the
software Apple were forced to develop were ever leaked into the public,
criminals and foreign governments would have a dangerous tool at their disposal.
The odds of the software leaking would increase every single time another agency
ordered its use.

As Tim Cook reiterated many times during his televised interview, this isn’t
about one iPhone, it is about the future. He brought up a great point that my
wife especially took notice of: your smartphone likely has more personal
information about you, including the location of your family and children, than
anything else in the world. The security of people’s data on their smartphones
is no trivial matter. If the FBI’s actions end up endangering the private data
on millions of people’s phones, that is potentially a disaster of
monumental proportions. When viewed as a public safety issue, Apple has just as
much of an argument on the side of national security as the federal government
does.

The bottom line is that if you care about the security of your most private
data: your finances, health data, and even the safety of your family, you must
realize that what the FBI is asking for is very dangerous. It would be
undermining the extensive security precautions Apple and other technology
companies have been refining in addition to subverting many of the principles of
individual liberties that this country was founded on. If we are working to
protect this country from terrorists who want to destroy our freedoms and
principles that we hold dear, why would we accept our own government destroying
them instead?

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty, Technology


REPUBLICAN CANDIDATES SCREW THE POOCH ON APPLE, FBI

February 26, 2016 by Marcel Brown 1 Comment
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

The party of small government? Apparently not when it comes to technology
issues.

The topic of the Apple vs FBI situation came up during the Republican
Presidential Debate on CNN last night. To my dismay, all the candidates of the
supposed party of small government took a hardline, big government stance
against Apple. I guess I shouldn’t be too surprised, as I expected this position
from a couple of the candidates, but it did confirm my fears on how the
situation is being misperceived amongst many in the public. I  would have loved
to see at least one candidate take a principled stand against the FBI (et tu,
Ben Carson?), which is one reason I really wish Rand Paul had stayed in the race
to provide a contrast when the other Republicans stray into the weeds on certain
issues. That being said, let’s do a quick run-down on each candidate’s comments:

Donald Trump: The frontrunner was not actually asked about this situation during
this debate, but based on his earlier comments, we know Donald Trump’s
position (and I’m paraphrasing): Terrorist BAD … FBI GOOD … Apple make me ANGRY!
But seriously, his position is based on a simple misunderstanding of the
situation, which it seems most of the candidates shared as I’ll explain below.

Marco Rubio: As he usually is, Marco Rubio seemed very rehearsed in his response
to the question. He delivered the best zinger of the night saying that “Apple
doesn’t want to do it, because they think it hurts their brand. Well let me tell
you, their brand is not superior to the national security of the United States
of America.” He correctly pointed out that the FBI’s request was not an
encryption backdoor but just a way to crack the password on one phone. So it was
clear that he had been well coached on the topic, but unfortunately those who
were advising him focused on the FBI’s side of the argument, ignoring the
positions Apple has brought up. Rubio however was clear that he did not support
encryption backdoors in general, so perhaps his team hasn’t had a chance to
review Apple’s court filing that was released earlier in the day. Perhaps he
will change his position upon further view.

Ted Cruz: For being such a strict Constitutionalist and generally a principled
defender of individual liberties, I was most dismayed that Cruz didn’t take a
more nuanced stance on the situation. He basically thought that Apple should
comply with a legal court order, clearly missing the point that the the legality
of the court order is in question – which is truly the heart of the issue. He at
least did clarify that he does not support government enforcing encryption
backdoors, but he apparently is not aware of the full implications of the FBI’s
orders on our rights and freedoms. I’m hoping that once he gets a chance to read
Apple’s court filing, he will modify his stance.

Ben Carson: Ben Carson has been a fairly principled small-government advocate
and one of the least hardline when it comes to national security issues. So it
was odd to hear him say that he believed Apple should comply with the FBI order.
However, I also got the impression that Carson was simply not up to speed on the
issue. Which again, if one only listens to the soundbites coming from the FBI
side of things, Apple just needs to “click a few buttons” and the FBI will have
their data. But it is far more complicated than that. Carson was basically just
repeating what the other candidates said which was that they believed Apple
should comply with a legal court order. Well, sure they should, but this court
order is possibly illegal. I’m sure Rand Paul would have pointed that out.

John Kasich: I think John Kasich is just trying to emulate Donald Trump the
longer the campaign drags on. Kasich did not actually express an opinion whether
or not Apple should comply with the FBI order, but instead just stuck out his
chest and admonished President Obama for not forcing Apple and the FBI to come
up with a solution. He said that if he were president, he would lock the two
sides into a room and not let them out until they reached an agreement. Well,
Mr. Kasich, that may work for someone who is an employee of the government under
your charge, but Tim Cook is a private citizen, Apple is a private company, and
locking up Cook or any Apple employee would basically be kidnapping or unlawful
detention. So Kasich showed he doesn’t understand the complexity of the
situation either and in some ways, his answer was the worst of any of the
candidates. Not all issues can be solved through political compromise,
especially when core issues of liberty and privacy are at stake. Going along to
get along might make good politics, but it doesn’t protect our freedoms very
well.


LET ME SPELL IT OUT FOR THE CANDIDATES

The bottom line is that it was clear none of the candidates understood the
technical underpinnings of this situation. This is not a simple warrant to
search for some data. If it were that easy, Apple would have already complied,
as they have in the past and already have cooperated so far in this situation.
There are four main points to consider in Apple’s defense. They are not hard, so
even a politician should have no trouble comprehending them:

First, the action the FBI is requesting is not as simple as pushing a few
buttons. It will be a complex technical undertaking for Apple to be able to
comply with the FBI’s request, taking hundreds or thousands of man-hours to
complete, and potentially a significant amount more to maintain after the fact.
As I mentioned already, Apple has already complied with all lawful requests from
the FBI and has even turned over data in their possession from previous iCloud
backups of the iPhone in question. Clearly it’s not like Apple isn’t complying
with all reasonable and legal requests. Additionally, had the FBI not
unilaterally made the decision to change the iCloud password prior to consulting
with Apple, they would have been able to make the iPhone initiate a new backup
and avoid this situation altogether.

Second, the veritable Pandora’s box that would be opened by complying with the
FBI order would be tremendously burdensome to not only Apple but potentially
much of the technology industry. While the FBI claims this would be a one-time
request on a single phone, the reality is that many law enforcement departments
are already lining up to make the same request as the FBI – and the FBI
themselves already have at least four other cases in waiting! Besides just being
a significant and costly burden for Apple or any other company with similar
products, the creation and maintenance of an insider hacking tool has serious
implications on the security of American technology products. If companies can
be forced to hack their own products, would they be able to create truly secure
devices anymore? The significant burden for companies to create, maintain, and
keep secure these self-inflicted hacking tools would be unlike any ever endured
before. Companies are used to protecting trade secrets from other companies, but
can they honestly be asked to protect hacking tools that criminals and foreign
espionage would no doubt target?

Third, the implications of the FBI’s order is that they can literally
enforce any request of any kind on any company or individual as long as they
claim it is “necessary” for the purposes of law enforcement. There would be
virtually nothing that could not be requested, including forcing a company to
create encryption backdoors. This is quite literally the definition
of conscription, impressment, or involuntary servitude. While the FBI may not be
technically asking for an encryption backdoor in this particular case, as Marco
Rubio pointed out, it is in essence a legal back door to eventually forcing
technology companies to cripple the security of their products for the
convenience of law enforcement. It is precisely this back door that
small-government advocates should be the most concerned about and why I’m
surprised they had not yet caught on to this critically important aspect of the
situation.

Which dovetails right right into the final argument, that the federal government
simply does not have the authority to make such a request. It is simply outside
the power given to them through the Constitution by we the people. Therefore
such a request is illegal. I don’t know how anyone could justify the federal
government violating the very Constitution they are sworn to defend and uphold.
I wish Apple were pushing this point harder, because then I believe it would
make it crystal-clear to those who claim to support small government and privacy
rights.

It is not surprising to me that the campaigns of these candidates are not up to
speed on complex technical issues. A technology advisor is not something that
has been part and parcel of a political campaign in the past. But with
technology issues becoming more and more of a part of modern politics, perhaps
it is time for politicians to consult with technology experts prior to drafting
policy positions? I’m certainly willing to lend my expertise to any of these
campaigns, if they are willing to listen.

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty, Technology


TIM COOK, APPLE, ENCRYPTION, THE FBI, AND A CHANCE TO CHANGE THE WORLD

February 23, 2016 by Marcel Brown 0 Comments
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

It’s no secret I have a great interest in the technology industry, especially
when it comes to the topic of Apple. I also have a great interest in history and
politics, hence the name and topic of this blog. So when the situation with
Apple and the FBI came to a head last week, I knew I had to write about it. In
case you’ve been living under a rock, the FBI is attempting to force Apple
to help them break into the iPhone of a San Bernadino terrorist. Apple is
currently refusing to comply with the order, claiming the FBI’s specific
request would jeopardize the safety of their customers’ data and set a bad
precedent for the ability of government to force technology companies to
compromise the security of their own products.

There are strong opinions on both sides. There are people who believe in strong
privacy rights and applaud Apple for standing up against what they perceive as
government overreach. The other side can’t understand why anyone would want to
prevent law enforcement from investigating a terrorist. Both sides make good
points at certain times, which makes the situation far from black and white.
This is why I took my time in crafting this article so I could study all the
points involved and give a well-reasoned and through examination. So strap on
your seat belts because you are about to go on a wild ride through the topics of
technology and politics!


THE ISSUES ARE CONFLATED

There has been a long-running debate in techno-political circles regarding
strong encryption technology and law enforcement. Simply put, modern encryption
technology like that used by Apple and other smartphone manufacturers work so
well that no one is able to crack it – not even law enforcement agencies of the
federal government nor the manufacturers themselves. Obviously law enforcement
wants to be able to decrypt data from technology devices that are part
of criminal investigations. Government officials are suggesting that technology
companies should create “backdoors” into their products so that law enforcement
can decrypt their products. They are also threatening to create regulations that
will force them to do so if they do not comply voluntarily. It is against this
backdrop that the current predicament with Apple and the FBI is taking place.

However, this situation with Apple, the FBI, and the iPhone of the San Bernadino
terrorist is NOT the same as the above debate. In this instance, the FBI is not
attempting to force Apple to create or use an encryption technology with a
backdoor. Even if they were, it could not help them in this particular
scenario because the iPhone in question is already encrypted with virtually
unbreakable technology. Rather, what the FBI is asking of Apple is to create a
modified operating system that would remove safeguards against brute-force
password attacks for this particular iPhone. The FBI claims that if Apple were
to comply, they could crack the password on the iPhone and decrypt the data
without a backdoor.

Apple contends that complying with this order would require compromising the
security precautions they have built into their products. They claim that by
doing so they would put at great risk the privacy and security of the data of
all their customers. They are calling what the FBI is requesting a “backdoor.”
However, while Apple is technically correct in describing the FBI order as
exploiting a backdoor, it is NOT the same type of encryption backdoor that has
been the subject of much debate that I described above. The FBI has
responded that they are not asking for a backdoor to encryption (in which they
are technically correct), but rather just a one-time way to crack a password
on one particular iPhone.

Let me be clear. I wholeheartedly believe that the idea of government enforcing
encryption backdoors is a terrible idea and additionally they have no authority
to mandate this. However, in this case the backdoor already seems to exist. The
FBI claims they have discovered a way to work around the passcode protections on
an iPhone and Apple’s response seems to have confirmed that this exploit would
work. Apple is not fighting a battle on the front of encryption technologies in
this instance. It is an entirely, albeit related, confrontation here.

It is clear that Apple is waging a larger war. Apple has been very steadfast on
the encryption technology debate, staunchly rebuffing government suggestions for
backdoors and even calling out the Obama administration for not taking a stand
on the side of privacy rights. Perhaps that is why they are conflating the
issues at hand. Maybe they believe that these issues are similar enough and they
should just combine them for public debate. I can not blame them for taking this
tactic. To some degree, the idea that government can force a technology company
to exploit a security hole in their own product is related to the idea that
government can force a technology company to purposely create backdoors into
their products. But at the same time, I feel that Apple is possibly doing a
disservice to the cause in the way they are approaching this fight.


LAW VS OPINION

There are two battles being fought. One is playing out in an actual courtroom.
The other is being wrangled in the court of public opinion. Certainly in a
society with a government of the people, public opinion is extremely important.
With the support of enough people, government can be compelled to take or not
take certain actions. However, there is danger in popular democracy. Just
because a majority of people believe in a certain way does not mean they are
right. The opinion of the people can also be swayed by those with power and
influence. Additionally, the perception of popular opinion can be skewed to fit
a narrative. This is all especially true when dealing with complex technical
topics, given that most people will base their opinions upon only brief
soundbites.

Apple is taking a great risk by conflating the larger encryption debate with the
San Bernadino iPhone issue. It is entirely possible that the situation plays out
against Apple in either the courts of law or of public opinion. If that happens,
it could have negative ramifications for protecting strong encryption
technologies in general. The problem is that currently Apple’s main argument
seems to be in the realm of the theoretical. They are saying that the FBI’s
actions could have serious ramifications. It could set a very bad precedent.
However, there is nothing clear-cut that would immediately happen if Apple is
forced to comply with the FBI’s court order.

It is easy for naysayers to dismiss a theoretical argument when there is a
real-world situation at hand. I fear it will be all too easy for those on the
side of the FBI to wrap their messaging around the tragedy that took place in
San Bernadino and sway the courts as well as popular sentiment. Once they have
this momentum on their side, it could create new support (or at least the
perception of it) for restricting the type of encryption technologies companies
like Apple can use. If the FBI gets their way, it would be a simple task for
proponents of encryption backdoors to argue that the San Bernadino situation
is an example of why law enforcement needs an easy way to decrypt anyone’s
device. If I can imagine this scenario, it is certain that political strategists
have already played out this chess game in their minds.

While I don’t mind Apple bringing the issues at hand to the public’s attention,
I believe that Apple should also be taking a stronger approach. An approach
based in law that is not bound to the whim of popular opinion or that of
politicians. If they were to do this, Apple has a great opportunity to strike at
the root of not only the encryption debate, but also possibly tackle much
broader issues impacting privacy and freedom as well.


SHOULD NOT VS MAY NOT

It’s one thing to point out why the government should not do something, as
Apple’s strategy seems to be so far. However, it is entirely more powerful to
point out that government is not allowed to do something based on constitutional
law. It’s the difference between a philosophical discussion and a mathematical
equation. The first is open to interpretation while the second is based on hard
and fast rules that simply can not be broken. People may not agree on the
meaning of life, but 1+1 always equals 2.

If one believes that any law passed by a majority vote in a legislature is
valid, then theoretical arguments rule the day. Politicians can rationalize
almost any argument in their favor and they certainly have. For example, if
legislators can argue that a farmer growing wheat on their own land for their
own use should be considered interstate commerce AND they can get the Supreme
Court to agree with them, then politicians can rationalize just about anything.
While this scenario may sound like fantasy, it is sadly a very real case that
was decided in 1942 (Wickard v. Filburn).

Political power knows no bounds. In the United States, the only thing standing
in the way of unbridled government action are the limits upon it defined in the
Constitution. Politicians can not make the case they are going to
break constitutional law in order to accomplish something. Obviously that would
not fly with the public. This is why they will go through mental gymnastics to
try to fit something under their authority as they did in Wickard v. Filburn.
Astute readers will point out that politicians have been very successful at
rationalizing/ignoring laws for a long time and I definitely agree. The problem
is that there have been too few situations where a defendant has challenged the
government to prove their authority. While Wickard v Filburn was decided in
favor of unfettered government, more recently United States v. Lopez in 1995 was
the first significant decision since 1942 that ruled government had overstepped
its bounds. So there is still some glimmer of constitutional limits upon
government power that exist and I think Apple has an incredible opportunity to
make history if they are willing to go full bore against government overreach in
this situation.


HOW APPLE COULD MAKE LEGAL HISTORY

If Apple truly wants to close the door on government attempting to control the
use of strong encryption, as well as other related government infringements on
privacy and intrusions into personal technology, they need to force the
government’s hand. They need to make the federal government explain where they
claim to derive the authority to force a private company to comply with the type
of request they have made of Apple. Going further, Apple could challenge the
idea that government may simply pass a law that would require technology
companies to comply with these types of orders including the creation of
encryption backdoors. So how could Apple accomplish this?

To start, we must understand how the FBI is currently attempting to force Apple
to comply with their order. The FBI has cited a law called the All Writs Act of
1789 as their justification to force Apple into compliance. Yes, this law was
written in 1789, the first year of George Washington’s presidency. If there were
any other law on the books that the FBI could have cited that would have more
specifically forced Apple to comply, they would have used it. But there is not,
which is why the FBI must fall back to using the All Writs Act. Here is the
entire text:

> 28 U.S. Code § 1651 – Writs
> 
> (a) The Supreme Court and all courts established by Act of Congress may issue
> all writs necessary or appropriate in aid of their respective jurisdictions
> and agreeable to the usages and principles of law.
> 
> (b) An alternative writ or rule nisi may be issued by a justice or judge of a
> court which has jurisdiction.
> 
> (June 25, 1948, ch. 646, 62 Stat. 944; May 24, 1949, ch. 139, § 90, 63 Stat.
> 102.)

A “writ” is basically a legal order. The All Writs Act of 1789 states that
federal courts may issue all writs necessary or appropriate, which is a fairly
broad statement. However, it then says that those writs must be agreeable to the
usages and principles of law. Ok, so federal courts may issue legal orders but
those orders must be lawful themselves. How do we know if a writ is lawful?
Well, we could consult with an attorney to comb through volume after volume of
federal codes to find if certain writs fall within the authority of the courts …
OR we could consult for ourselves the supreme law of the land to see if the
federal government has any jurisdiction to begin with. The great thing about the
US Constitution is that it was written in plain language so anyone can read and
understand it. Since the founders intended this to be a government of the
people, they didn’t want it to be a government that only lawyers could
understand.

The fundamental question is does the federal government, or more specifically a
federal court, have the authority to force a company like Apple to create a
method to break into one of its products? A lot of people think that this
particular court order is a very simple warrant like most warrants, which allow
law enforcement to search a particular place. As I’ve explained already, this
case is nowhere near that simple. The FBI already has possession of the phone in
question and the phone technically belongs to the employer the terrorist worked
for, which has already given permission for the phone to be searched. Also,
Apple does not have in their possession any of the data currently on the phone.
In fact, Apple has already provided the FBI copies of old backups from this
iPhone that were stored on their iCloud servers. Apple claims they had already
complied with every legal request from the FBI to this point. What this
particular court order asks Apple to do is create a modified version of the
iPhone operating system that would work to effectively bypass some security
features.

So can a judge of a federal court make such an order? The judicial power of the
United States is defined entirely in Article III of the Constitution, which
itself is comprised of just three short sections. Section 1 merely defines that
the judicial power shall be vested in one supreme court and inferior courts as
Congress may establish. Skipping to Section 3, it only defines the crime of
treason and that congress can declare the punishment for treason within a few
limitations. The meat of the judicial power is contained within Section 2 of
Article III and all it really says is where judicial power extends. Part of
Section 2 says that this power extends to all cases arising under the
Constitution and the laws of the United States, which is sufficient enough for
discussion of this particular situation. The real question is does the
Constitution and/or any other law of the United States cover this particular
situation? If laws do not apply, then the courts should have no authority.

Does United States law cover the Apple and FBI situation? Obviously a crime has
been committed and the FBI has taken jurisdiction, investigating the San
Bernadino murders as an act of foreign terrorism. If the federal government has
the authority to investigate and prosecute terrorism, that power applies to the
subjects of the investigation. But Apple is not a subject of this investigation.
Other than the data they had in their possession that they’ve already turned
over, Apple has no involvement in this case. They are simply the manufacturer of
a product that was possessed by a criminal. We don’t even know if the phone was
used to communicate with anyone involved in the crime or if there is any data on
the phone that would be useful in the investigation. For most intents and
purposes, Apple is an independent third party to this investigation. It is one
thing for an independent party to offer to help law enforcement or to help when
requested. It is another thing entirely for a third party to be forced into
servitude of the government, especially when that servitude stands to materially
harm that party.

As I said above, the FBI has no option other than to use the All Writs Act of
1789. Because they are using such an old law that is quite vague in its
definition, we must fall back onto more foundational law, so once again we
consult the United States Constitution. The way the federal government works (at
least, the way it is supposed to work), all legal authority must flow from the
Constitution, as it is the supreme law of the land. The Constitution lays out
some very specific limited powers vested in the legislative body of the federal
government, as defined in Article I, Section 8. If one were to read the short
text of that section, one would not find any specific legal authority related to
this situation. Nowhere does it say that congress has the power to pass laws
forcing companies to help the government in a criminal investigation. Obviously
it does not say anything about computerized technology, given that this document
was written in the late 18th century. However, just because something did not
exist in the 1700’s, does not mean the government automatically gets authority
over it when it comes into existence. We the people must grant the government
any authority before it can legally exercise power. So it would appear from a
cursory review of the Constitution that the federal government would not have
authority to force Apple to comply with its request at this time, nor would they
even have the authority to pass a law requiring such things in the future. But
this situation can’t be so simple, could it?

Earlier I brought up Wickard v. Filburn as an example of the type of
rationalization government can use to justify their jurisdiction over an area of
law. This was not a random example. I brought it up because it will likely be
very relevant as this situation plays itself out over time. The federal
government has become quite astute at using the “interstate commerce clause” as
justification for nearly any and every law passed in the last 80 years that can
in any slight way be shown to somehow involve “commerce.” The government’s
go-to play would be to cite the Commerce Clause as the root of their power to
regulate Apple and the technology industry, given that they obviously are
involved in interstate commerce. So now it seems like a slam-dunk case for the
federal government, right? Not so fast. Finally we have arrived at the crux of
the situation and why Apple has a chance to make history.


APPLE VS THE COMMERCE CLAUSE

As United States v. Lopez showed, the Supreme Court seems willing to roll back
some of the authority the federal government has claimed under the interstate
commerce clause. This case was decided in 1995, which was at the dawn of the
Internet going mainstream. In 2016 and beyond, Apple could certainly use the
power of the Internet to shine light on the absurd Wickard v. Filburn ruling.
Apple actually has a chance to take this case to the Supreme Court and have
Wickard v. Filburn overturned! This is no small matter! In my opinion, it would
rank up there with Brown v. Board of Education of Topeka which overturned the
earlier Plessy v. Ferguson decision of “separate but equal.” The impact that
case had on civil rights could be the same type of impact that
overturning Wickard v. Filburn could have on privacy rights in this country. It
would significantly hamper the ability of the federal government to arbitrarily
infringe on our rights by strong-arming the companies that make our technology
products, making it a major victory for privacy rights and freedom.

Now let’s be clear, Apple may have no interest in taking on the Herculean
challenge of overturning Wickard v. Filburn. It would certainly be no easy road
to travel. Apple would make a lot of enemies among those who benefit from
establishment politics, which is to say they would piss off a lot of very
powerful people. This may not be something Apple wants to tackle, being that
they are not in the business of government reform. It may not exactly be
profitable for Apple to take on the full force of the federal government.

However, that being said, there may be no one in a better position to
overturn Wickard v. Filburn than Apple. They have several things going for them
that together could create just the right circumstances for this historic turn
of events. First, Apple has a lot of cash – a ridiculous amount of cash. This is
usually the primary requirement for mounting a legal challenge against the
federal government. Second, Apple is an extremely popular company. The public is
not likely to stand by idly if the federal government tries to bully Apple in
their quest to protect our privacy rights. No one wants to see a company as
iconically American as Apple get taken down by the federal government. Thirdly,
the privacy rights that Apple would be fighting for also seem to be extremely
popular among the general public and especially among the Internet-connected
younger demographics. Public support could definitely sway the political winds
as it has done a few times in the Internet/social media era.

Even with some potential advantages, Apple has to want to fight this fight. They
have every practical reason not to push the federal government that far,
settling for a smaller victory along the way. But I think they just might be
driven enough to eventually take on the misapplication of the Commerce Clause if
the federal government continues to try to regulate the technology industry.
While most may think of Apple as a technology company, those of us who have
studied Apple know that Apple’s mission has always been to change the world.
Steve Jobs did not want to start a business just to sell products, he wanted to
make products that were going to transform society. It just so happened that
technology was the avenue he saw to make that happen. Yes, Steve Jobs is gone,
but his legacy is instilled in the corporate culture of Apple. Based on what
I’ve seen from Tim Cook, his intensity in fighting this battle is a bit out of
character for him. Perhaps he has found a cause worth publicly fighting for.
This may be Tim Cook’s chance to change the world and leave a lasting legacy.
It’s now up to him and Apple to make that choice.

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty, Technology Tagged With: Apple, FBI


APPLE’S SECURITY CAN BE BYPASSED?

February 17, 2016 by Marcel Brown 0 Comments
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

A judge has ordered Apple to comply with the FBI’s request to bypass the
security features of an iPhone used by a San Bernadino terrorist. In an open
letter, Apple CEO Tim Cook has explained that what the government is requesting
threatens the security of all their customers. In effect, the FBI admits that
they can not decrypt the data on an iPhone without knowing the phone’s passcode.
The FBI knows that not even Apple can decrypt the data, however, they have
surmised that if they can load a version of the iOS that does not include
certain security features that defeat brute force password attacks, then they
can crack the passcode, which might only take minutes in a best case
scenario. They claim Apple can create a version of the iOS without these
security features, load it on the iPhone in question, and then the FBI can
attempt to brute-force guess the password.

Technology experts are warning that if Apple is forced to comply with this order
it would have far-reaching consequences for the technology industry, privacy,
and security. I am of the mind that the federal government does not have this
authority at all, either at the legislative or executive level, much less a
federal magistrate of a US District Court in California. It is an unreasonable,
overreaching request of a technology company to share a method of bypassing
security features in their own product. But there is plenty of discussion of
that already. The question I’m surprised so few are asking is why the
possibility even exists for Apple to defeat their own security functions?

The key point to consider is that the magistrate conceded that the FBI’s request
may not be technically feasible and allowed Apple to respond if that is the
case. Instead of stating that this request just isn’t technically possible as
Apple has done in the past with other law enforcement requests, Tim Cook instead
has vowed to fight this order. Which to me seems to imply that Apple COULD
comply with the order. I found one article that describes a technically workable
process by which Apple could comply with the FBI’s request. The article does
speculate that newer iOS devices with a feature called the Secure Enclave may
not be able to be hacked into in the process the FBI is requesting, but that is
not certain. The iPhone 5C in question does NOT contain the Secure Enclave
feature so that point is moot in this particular case, yet it does call into
question the overall security of older iPhones and possibly newer iPhones
pending the question of the security hardness of the Secure Enclave feature.

The reality is this: if Apple can technically comply with the FBI’s request, it
means that a backdoor to iPhone security does, in fact, exist. Yes, it is a
closely guarded secret by Apple, but in theory, this backdoor could be exploited
if the secret key that Apple uses to sign their iOS updates is compromised. I
would like to hear more about this from experts more versed in this topic than I
am as well as an explanation from Apple if this backdoor does in fact exist.

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty, Technology


DESPONDENT GOVERNMENT VEXED BY ENCRYPTION

February 17, 2016 by Marcel Brown 0 Comments
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

> The following is an article that I had been working on for some time. I’ve
> been editing and adding to this article to try to get it “just right” for
> several months now. However, with the situation Apple is facing today, I’ve
> decided that I must release this article now. So please forgive me if this
> article isn’t quite fully polished or rambles at times, but I felt that the
> core message had to be shared ASAP.

--------------------------------------------------------------------------------

It’s an issue that has been brewing over the last year-and-a-half. When Apple
introduced iOS 8 in the fall of 2014, one particular feature had privacy
advocates cheering. That same feature had certain law enforcement officials
seething. With the release of with iOS 8, all data on an iPhone or iPad is
encrypted when the devices are locked with a passcode. Not only that, but the
type of encryption used by Apple is not able to be bypassed, even by Apple
themselves. This means that even with a lawful search warrant or court order,
Apple can not extract data from any iOS device to provide to law enforcement. In
addition, the transmission of certain data, such as iMessages and FaceTime
calls, are encrypted from end-to-end, which means that those forms of
communication are not able to be intercepted by anyone, including Apple or law
enforcement.

At the time Apple introduced the new encryption feature, FBI director James
Comey criticized both Apple and Google for using encryption technologies that
were not able to be broken into by law enforcement. Apple CEO Tim Cook responded
in early 2015 by saying that Apple had no intention of preventing people from
encrypting their devices, in other words saying “tough luck” to government. The
issue heated up last summer as the FBI director testified during a hearing of
the US Senate Intelligence Committee, calling into question the idea that there
is no way to create a encryption system that can be circumvented by
manufacturers or law enforcement. He and representatives from the Obama
administration’s Department of Justice hinted that if technology companies were
not willing to cooperate in creating encryption with backdoor access,
legislation may be required to force them to comply. In September, Apple
formally declined compliance with a federal court order requiring them to turn
over real-time messaging between suspects using iMessage, stating that they
could not break the encryption technology used. All this was before the terror
attacks of Paris and San Bernadino where once again law enforcement officials
blamed technology companies for making it impossible for law enforcement to
intercept communications or retrieve data from devices. More recently, Tim Cook
strongly criticized the Obama administration for not issuing a strong public
statement defending the use of strong encryption. Finally, a recently proposed
bill in the the New York state assembly seeks to ban the sale of smartphones
that do not provide an encryption backdoor. Update: A judge has ordered Apple to
create a “hacked” version of the iOS that would bypass the security features
that defeat brute force password attempts on an iPhone for use on the particular
iPhone of a San Bernadino terrorist. More on this new situation in my next
article.


THE POOR GOVERNMENT IS JUST BESIDE ITSELF

The government is admitting that publicly available encryption technologies
are thwarting their efforts to intercept communications or gather evidence.
Current encryption protocols are so good that there is simply no feasible way
for government agencies to break them, even with gobs of cutting-edge technology
at their fingertips. So they are “kindly” asking technology companies to give
them a back door and pushing lawmakers to pass new laws that would not-so-kindly
force technology companies to use encryption that can be circumvented. They
claim that without the ability to decrypt communications and data, they will be
hampered in their ability to investigate terrorists and people will die. Oh,
and kidnappers will also run willy nilly and kids will suffer horribly and they
will die too. Don’t forget about the kids.

During the Senate hearing in the summer of 2015, several senators seemed shocked
and awed that law enforcement couldn’t decrypt modern communications. Some
agreed with the FBI and DOJ that legislation may be necessary. Others wondered
if technology companies could be help in contempt. Senator John McCain even
suggested that technology companies should give the government a special
stockpile of encryption keys that could be used to decrypt any data or
communication on their devices. “What’s the problem with that?” he asked.


BUT, BUT, BUT … THE FOURTH AMENDMENT!

It would be funny how politicians twist the meaning of the Constitution if it
wasn’t so sad. Some in government argue that the Fourth Amendment “allows” for
reasonable search and seizure. Therefore creating laws (or taking executive
actions?) that force technology companies to use encryption protocols
with backdoors for law enforcement must be “reasonable.” It is humorous to hear
otherwise “conservative” politicians argue that the Fourth amendment gives the
government authority to define for itself the parameters of reasonable search
and seizures. This is clearly a situation where some members of the supposed
party of small government have no clue what small government really means.

Let’s take a moment and read the actual text of the Fourth Amendment:

> The right of the people to be secure in their persons, houses, papers, and
> effects, against unreasonable searches and seizures, shall not be violated,
> and no Warrants shall issue, but upon probable cause, supported by Oath or
> affirmation, and particularly describing the place to be searched, and the
> persons or things to be seized.

Hmmm … looking over that text it does not state anywhere that the government is
given the authority for “reasonable search and seizure,” nor that they can
define what that means. Here’s your constitutional lesson of the day: the Fourth
Amendment does not confer any power upon the federal government. Not a single
one. It only serves to protect “the right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and
seizures.” It is not meant to grant power, as many politicians would try to
argue, but rather meant to strictly limit the power of government. It is a
guarantee against unreasonable search and seizures, not a license for the
federal government to define what is reasonable and unreasonable.


THE CONVENIENCE OF LAW ENFORCEMENT DOES NOT OVERRIDE OUR FREEDOMS

Even if we assume for a moment that the federal government has the authority to
perform reasonable search and seizures, nowhere in the Constitution is the
federal government given the authority to regulate encryption technology, nor
dictate how companies offer products or services in the chance that they would
need to perform a criminal investigation. If government has the authority to ask
for warrants to investigate something, it is not the same as having the
authority to require that they MUST be able to decrypt communications or data.
That power would be analogous to the federal government requiring that all lock
makers must give the federal government a way to easily pick their locks – just
in case they need to investigate something that is locked up by a suspected
criminal. If law enforcement has the means to decrypt communications or data,
that’s fine (in this context), but if they don’t, then that’s too bad.
Our freedoms are not subject to the convenience of law enforcement.


THE GOVERNMENT CAN’T KEEP ANYTHING SAFE

Finally, if we were to go so far as to allow the federal government to have
backdoor access into encryption technologies, do we have faith that they would
not abuse this privilege? Or do we trust that they could keep the backdoor keys
safe from criminals and other governments?

Edward Snowden pretty much blew out of the water the fantasy that government
does not seriously exploit its authority. Besides the documented blatant abuses
of the NSA, we also have government agencies like the IRS that can’t handle
running a simple e-mail server correctly and secretaries of state that claim
they can’t handle more than one mobile device. The purported lack of technology
knowledge in both of these instances led to the all-too-convenient loss of
communications that might have implicated government officials that were abusing
their power. It was either intentional deception by government officials or
cases of “innocence by incompetence.” Either way, this should not give anyone
the warm and fuzzies for the ability of government to handle technology
security. If certain people and agencies are given the power to decrypt the
private communications of virtually anyone in the world, just how long do you
think it will take for that authority to be abused or mishandled?

Also for a moment imagine just how valuable backdoor decryption keys would be.
Anyone who had possession of them would be able to pry into just about anyone’s
private lives, blackmail and extort people, and steal corporate secrets just to
name a few things. Backdoor encryption keys would be likely the most valuable
pieces of information the world has ever known!

We know humans are not perfect. How much money do you think criminal
organizations or other governments would pay to bribe the keepers of the keys?
That number would probably be astronomical and it would be hard for anyone to
not consider taking a bribe like that. Even if we completely trust the people
who would handle these incredibly valuable pieces of information right now,
what’s to say the next people in line won’t be corruptible?

Finally, even if we assume that those who have guard the backdoor encryption
keys will be paragons of morality, those secrets will be the most sought-after
data the world has ever known. Criminals and governments would likely stop at
nothing to steal them. The federal government can’t even keep hackers from
stealing information on tens of thousands of government employees, do we
honestly think they’ll be able to keep the keys to our private data safe?


THE GOVERNMENT DOESN’T CARE ABOUT YOUR PRIVACY

If you want a more concrete example about the lack of the ability of government
to keep your privacy safe, take the TSA. The federal government forces air
travelers to only use TSA-approved locks on their luggage. The TSA has access
to special “master keys” that can open any TSA-approved lock. What would happen
if the patterns to those master keys were compromised and leaked out into the
public? Then anyone could create a copy of keys that could open a traveler’s
luggage without leaving proof of the break-in. Of course that would never happen
because the TSA would take extreme caution with those sets of master keys,
right? Wrong. The seven master TSA keys have been compromised and anyone with a
3D printer can create a set of keys that will open any TSA-approved lock. And
guess what? The TSA couldn’t care less that YOUR privacy and security has been
compromised, as long as they can still open your luggage.

Now granted, when luggage travels through various airports, one should not
expect that the contents of that luggage is truly secure. So this appalling
failure of the federal government is not truly that big of a deal in the grand
scheme of things. However, this does spotlight that no system of backdoor access
can be trusted to stay secure, even if agencies specifically tasked
with security are handling them. One could probably count with an egg timer how
long it would take for the proposed backdoor keys for encryption to be
compromised. Even worse, most of us probably wouldn’t even know they had been
compromised because it would be in the best interest of those with the keys to
not publicize the fact that they had them.


IT’S TIME TO STAND UP

The idea that privacy must be balanced against security is a red herring
argument. At best it is government being lazy. At worst it is government
creating convenient excuses to grab themselves the legal authority to infringe
on our privacy. Again, our rights are not subject to the convenience of
government. Additionally the government must prove their authority to exercise a
specific power, of which forcing the types of encryption technologies we the
people can use is not one of them.

For far too long the government has assumed that just because a specific
guarantee to a “right to privacy” doesn’t exist in the Constitution, then they
have the power to trample over our unalienable privacy rights. Of course, the
9th and 10th amendments prove them wrong, but until enough of us demand that the
government follow their own laws, their might makes right. The good news is that
technology has developed to a point where we can take measures to protect our
own privacy rights even from government. We must fight against any attempt by
government to deny, circumvent, or ban these technologies because as we’ve seen,
government is one of the worst infringers of our rights – and their meddling
would make us all much less secure from anyone with bad intentions.

Share the knowledge!
 * Share
 * Post
 * Share
 * Pin
 * Share
 * Share
 * Mail
 * Share

Filed Under: Liberty, Technology
Next Page »
Subscribe to RSS


Get Life, Liberty, and Technology in Your E-mail

Enter your e-mail address:





ARCHIVES

Archives Select Month September 2017 November 2016 August 2016 June 2016 March
2016 February 2016 November 2015 July 2015 April 2015 March 2015 February 2015
January 2015 November 2014 October 2014 September 2014 August 2014 July 2014
June 2014 May 2014 March 2014 February 2014 January 2014 October 2013 September
2013 August 2013 July 2013 May 2013 April 2013 January 2013 December 2012
October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012
March 2012

THE MB TECH NETWORK

 * New Publishing Partners Success Strategies for the New World of Publishing
 * Solo Tech Pros THE Resource for Independent Technology Professionals
 * Soulmate Proprietors How To Run a Business With Your Spouse and STAY Married!
 * State of the Tech The Technology Industry for Mere Mortals
 * Technology Bytes by Marcel Brown Technology Tips and Advice
 * The Queen's Blog by Danelle Brown A Resource and Sounding Board for
   Entrepreneur Mothers
 * This Day in Tech History The History of Technology in a Daily Blog!

Marcel Brown on Google+

Return to top of page

Copyright © 2024 · Marcel Brown