Profile cover photo
Profile photo
Richard Bondi
158 followers
158 followers
About
Posts

Post has attachment
Memorial day airshow at Moffett Field.
PhotoPhotoPhotoPhotoPhoto
5/28/17
34 Photos - View album
Add a comment...

Post has attachment
Why Apple is not being unreasonable

On February 19th, 2016, in response to Tim Cooke's open letter (http://apple.co/1orXjIg), the DoJ wrote to the Court (http://bit.ly/1oBvQUC): 

"Moreover, contrary to Apple's public statement that the assistance ordered by the Court "could be used over and over again, on any number of devices" and allow "[t]he government to hack our own users," the Order is tailored for and limited to this particular phone. ... Nor is compliance with the Order a threat to other users of Apple products. Apple may maintain custory of the software, destroy it after its purpose under the Order has been served, refuse to disseminate it outside Apple, and make clear to the world that it does not apply to other devices or users without lawful court order."

It's true: the Order doesn't require any of this.

What's also true: use of what is recovered from the phone in Court does. The FBI and the DoJ cannot use it without requiring everything that they say the Order does not require.

See Forensics Methodology and Stealing Apple's FBI Tool | Zdziarski's Blog of Things - Zdziarski.com
zdziarski.com/blog/?p=5645
Add a comment...

Post has attachment
Why Apple is not being unreasonable

On February 19th, 2016, in response to Tim Cooke's open letter (http://apple.co/1orXjIg), the DoJ wrote to the Court (http://bit.ly/1oBvQUC):

"Moreover, contrary to Apple's public statement that the assistance ordered by the Court "could be used over and over again, on any number of devices" and that "[t]he government to hack our own users," the Order is tailored for and limited to this particular phone. ... Nor is compliance with the Order a threat to other users of Apple products. Apple may maintain custory of the software, destroy it after its purpose under the Order has been served, refuse to disseminate it outside Apple, and make clear to the world that it does not apply to other devices or users without lawful court order."

It's true: the Order doesn't require any of this.

What's also true: use of what is recovered from the phone in Court does. The FBI and the DoJ cannot use it without requiring everything that they say the Order does not require.

See Forensics Methodology and Stealing Apple's FBI Tool | Zdziarski's Blog of Things - Zdziarski.com
zdziarski.com/blog/?p=5645

Add a comment...

Post has attachment

Post has attachment

Post has attachment
Take 90’000 resumes of top-secret cleared government employees all hired after 9/11, and extract all the universities they got a BA or lesser degree from. Sort these universities by the number of BA graduates who went on to get top-secret intel jobs in government, from most grads to least, and look at the first 100 only.

That's what Vice news did. Here's what they found.

Together, these universities produced more intelligence community employees than any others. Not one of these 100 universities is also in the top 100 liberal arts universities in America. Not one BA from the first 100 is in history. Not one is in a foreign language. The most common degrees are “systems management” and information sciences. 20% of these universities are online diploma mills.

It is difficult to see how organizations with this background can successfully understand foreign cultures and countries and the violent groups they produce, or forecast future threats from them.

http://www.vice.com/read/the-new-curriculum-teaching-college-students-how-to-spy-v22n11?source=mag_app Vice Magazine: THE NEW CURRICULUM

https://news.vice.com/article/the-most-militarized-universities-in-america-a-vice-news-investigation

https://news.vice.com/article/the-most-militarized-universities-in-america-our-ranking-methodology-explained
Add a comment...

Post has attachment

Post has attachment

Post has attachment
Wait while more posts are being loaded