Posts

Militarization of Police –Rugged Radio Podcast

As the violent images of Ferguson, Missouri permeate the media, a debate has erupted about the “militarization of police.” Is it time to reconsider the Defense Logistics Agency (DLA) 1033 program, which gives surplus military equipment to police departments? Listen to podcast by clicking the bar at the top of the page.

Rugged Radio explores the world of rugged computers, unmanned systems, and related topics.  The opinions discussed in this podcast do not necessarily reflect those of AMREL, its employees, clients or partners.  

Last July, Dallas police killed a suspected gunman with an Unmanned Ground Vehicle (UGV). By any conceivable stretch of the imagination, this was a “good kill.” The gunman had murdered 5 policemen, threatened to kill more with hidden bombs, and refused to give up even after hours of negotiations. A credible threat against civilians had been made. The threat had to be neutralized in a timely fashion. Using an UGV reduced the danger to officers, and protected civilians at the same time.

We are not sure what kind of robot was used, but it was probably one designed to detect Improvised Explosive Devices (IED). Ironically, the robot, which was most likely designed to counter explosive devices, killed the gunman by detonating a bomb (a pound of C4 explosives).

Sources claim that the UGV was a Remotec Andros F-5 model (some say it was a MARCbot, but this appears to be speculation). We do know that the UGV was remotely controlled. Both the MARCbot and the Andros F-5 have been used in overseas combat operations.

The tactic of jury rigging an explosive device to a UGV in order to perform a kinetic action is not a new one. The Brookings Institution reported in the “Military Robots and the Laws of War” that soldiers would strap Claymore anti-personnel mines to UGVs in attempts to kill insurgents.

Some are alarmed that police used military equipment and tactics on American soil. Many feel that the whole “killer robot” scenario was just plain ominous. The following quotes are typical.

“The ‘targeted killing’ of a suspect on ‘U.S. soil,’ as opposed to extraterritorial declared or undeclared war zones, where this operation also has clear precedents too, has captivated the attention of scholars and the public. … the event raises many issues about the rules of engagement and the constitutional rights of a suspect—issues that obviously the Dallas police completely skirted, and do not seem too willing to discuss in the aftermath.” Javier Arbona, Assistant Professor, University of California at Davis in American Studies and Design, UC Davis

“As with other game-changing technologies, police robotics—especially as weapons—could change the character of law enforcement in society.”  Patrick Li, Director of the Ethics & Emerging Sciences Group and a philosophy professor at California Polytechnic State University, San Luis Obispo, IEEE Spectrum

“…placing a bomb on a police robot with the intention to kill a suspect—if that is, in fact, what happened—would represent a major shift in policing tactics….It now appears that a tactic of war deployed on foreign soil is being used on the streets of American cities. There are still a lot of moving pieces and things to sort together in the aftermath of the police shootings in Dallas. But one thing is clear: the rules of police engagement might have just changed forever.” Daniel Rivero, Fusion

As evidenced by the above quotes, legal experts and ethicists are anxious over the use of a “killer robot.” You know who didn’t seem concerned? Police.

 “Admittedly, I’ve never heard of that tactic being used before in civilian law enforcement, but it makes sense. You’ve got to look at the facts, the totality of the circumstances. You’ve got officers killed, civilians in jeopardy, and an active shooter scenarios. You know that you’ve got to do what you’ve got to do to neutralize that threat. So whether you do it with a sniper getting a shot through the window or a robot carrying an explosive device? It’s legally the same.” Dan Montgomery, former police chief, Time

I called AMREL’s Director of Public Safety Programs, William Leist, to ask his opinion. A former Assistant Chief California Highway Patrol, he has many years of police experience. He fell into the camp of no big deal.

 “Deadly force is deadly force. Whether we use a bomb, a vehicle or a firearm, if the situation is such that deadly force is authorized, lawful, and necessary, the mechanism really shouldn’t matter.”

I am inclined to strongly agree with Bill Leist (and not just because he works with AMREL in supplying rugged computers and biometric devices to law enforcement). The use of a UGV in this particular instance isn’t really a game changer, as some experts are maintaining.

However, let’s be devil’s advocate and point to potential problems. There is an old saying, “good cases make bad laws” In other words, a specific high-profile instance may not be the best guide for similar circumstances in the future. Just because the use of a UGV in Dallas was a lethal operation that even Gandhi would have approved doesn’t mean that there isn’t potential for abuse.

The adoption of new technologies does not always lead to expected results. Police have expanded an application of another new technology, UGVs, beyond the original purpose. Granted, this new application is justifiable in this instance, but are we in a position to predict future consequences?

Police are being overwhelmed with technology. Law enforcement officer are dealing with a multitude of biometric devices, communication technologies, non-lethal weapons, biometric equipment, and a wide variety of computer platforms. In many departments, training has not kept up with the needs. Should there be certain minimal standards for operators of UGVs? Who sets them?

Suppose something goes wrong and a civilian gets hurt. The police will say that it’s not their fault, because the UGV malfunctioned. The manufacturer will say their UGVs are not designed for lethal operations, so it isn’t their responsibility. Granted, almost all police actions have liability issues. However, unmanned technologies pose liability problems that are beyond traditional concerns, and are major factors in slowing their adoption.

What about visibility? Whether a shooting is justified or not may depend on what a policeman sees or what he thinks he sees. Remote-controlled unmanned systems, who operators may have limited visibility, may present new problems.

Using lethal force with an UGV does not herald a new era of law enforcement. The adoption of this new technology is unlikely to fundamentally alter the current legal dynamics surrounding the use of police force. However, they may present new complications and challenges.

 

This post originally appeared on Quora as an an answer to the question, “What do members of the United States military think of the Chinese army?

I am not a member of the American armed forces, but I read Defense publications every day for my job. For my corporate blog, I rely on many of the same sources that the American military relies on for their information. My impression, as an outsider, is that the American military simultaneously regards the Chinese with two opposing attitudes, i.e. respect and contempt.

Why respect?

  1. The Chinese have a reputation for being clever, resourceful, and practical. Only a fool would underestimate them.
  2. As noted in other answers, not only is the Chinese military big (really big!), but so is their economy, which means, in theory, they can adequately support their armed forces.
  3. The DF-21D anti-ship ballistic missile (ASBM) could play a significant role in countering US Naval capabilities in the most likely theater of conflict, the South China Sea. The US Navy is adjusting its plans for technological development and acquisition to specifically deal with this threat.
  4. Chinese anti-satellite and cyber capabilities are genuine concerns.

Why contempt? This is a little trickier to answer, since the American Defense establishment is highly motivated to praise Chinese capabilities, i.e. nobody ever got more money from Congress by telling them the enemy’s military stinks. However, the contempt is real, at least for some members of the American military.

Here are my best guesses why there is contempt:

  1. There are reasons why the Chinese have an army of cyber thieves trying to steal from us, and we are not trying to steal from them. As good as Chinese technology is, it’s just not where it should be for a first-class power. Their technological base lacks the quality and depth that is needed. Whenever I read a Western Defense publication reporting on a Chinese announcement of their latest and greatest super weapon (usually a bad copy of outdated Soviet technology), one can practically see the snark dripping off the webpage. For example, Chinese lack the capability of making an engine suitable for a fifth-generation combat jet (my info may be out of date on this). This negative assessment of their technological capabilities may be incorrect, but at least some analysts hold it.
  2. The American military is a highly-trained professional force that can project power anywhere in the world. The Chinese military is a mostly uneducated and conscripted force designed primarily for domestic control. Basically, some Americans look at the Chinese the same way that the British regulars looked at the American colonial militias. Yeah, they’re good on their home turf, but in a proper fight on foreign soil? Forget about it.
  3. The Americans fight wars all the time. The Chinese do not. We know which of our stuff works and our officers are experienced in combat. The Chinese military has demonstrated great capabilities in scaring Filipino fishermen, but how would they perform in actual fight with a significant foe? No one really knows.

I want to make it clear that the above opinions do not necessarily reflect my own. I am merely reporting on what I have heard and read. For what it’s worth, I think the real wild card is the surreal level of Chinese corruption. Has it affected the ability of the Chinese military to project force? Again, no one really knows. Hopefully, we will never find out.

 

Once again we stare into the opaque crystal ball that is Washington and try to divine the fate of this year’s Defense appropriation bill.

The good news, sort of Out of the 12 appropriation bills facing Congress, Defense is the one that will most likely pass in time for due date. That is the view of Saxby Chambliss, a Southern senator who sounds and looks just like an actor playing a Southern senator from a 1930’s movie. Speaking at a recent Bloomberg web conference, he sounded cautiously optimistic, noting that the Senate and House have already passed versions of Defense bill, ahead of where we were at last year.

On the other hand… The House and Senate bills are different. The House authorized $583 billion, while the Senate funded $602 billion (these amounts vary in news reports, and to a certain extent are subject to interpretation; the Defense budget in a tricky multi-factorial affair).

Significantly, the House wants to diminish the Overseas Contingency Operation (OCO) fund, which is a gimmick designed to circumvent sequestration. In fact they shifted funds over to the base budget in order to mitigate the Army and Marine’s planned drawdown (and increase military pay by 2.1%, not the proposed 1.8%). The President is not amused and has threatened a veto over this and other issues.

The other issues The Senate, led by Senate Armed Services Chairman John McCain, has proposed that the position of Undersecretary of Defense for Acquisition, Technology, and Logistics (ALT) be eliminated. Responsibilities are to be divided between new Undersecretary of Defense for Research and Engineering, or USD(R&E), and the renamed Undersecretary of Management and Support, or USD(M&S).  Somehow, this bureaucratic reshuffle is supposed to make it easier for the military to adopt new technology.

Dear reader, does this make sense to you? I have been writing and reading about the acquisition for novel technology by the Department of Defense for several years now, and I can’t understand how this will help at all. If you have any ideas about this particular change, pro or con, please email me at editor@amrel.com. I need someone to explain this to me.

The administration doesn’t like these proposed changes, accuses Congress of “micromanaging,” and promises to veto these budgets. Other issues that the administration has with Congress’s Defense appropriation concern the proposed closing of Guantanamo, drafting of women, the role of readiness, and miscellaneous non-defense issues.

Don’t fear the veto The threat of the veto and the fight between the executive and legislative branches don’t overly concern Saxby Chambliss. This is par for the course, and even with a veto, there is more than enough time to pass the Defense bill.

Why are non-Defense issues significant in the Defense budget? One of the most interesting parts of the Bloomberg webinar was Saxby Chambliss’ description of the Congressional dynamics behind the Defense budget.

Congress has a lot of relatively new representatives who have no experience of the old days, when ideological and partisan opponents routinely worked together in a relatively non-contentious manner to pass bills. Besides Intelligence (which has its own problems), Defense is the only appropriation that is funded yearly as opposed to multi-yearly. It is one of the few times that congressmen from opposite sides of the aisle actually talk and work with each other. This is the new “normal.” As a result, a lot of non-Defense items (which get blocked in the polarized deadlocked Congress) get linked to the Defense budget.

I know what you did last session Another factor in the yearly Defense drama is the elimination of earmarks, and the severe limiting of riders. In the past, these “greased” the gears of the appropriation process. Now everything has to be fought out in the open, which is subjected to heightened scrutiny of the internet. It is common that when a proposal is first made by a representative in Congress, an immediate hostile reaction in social media follows in real time.

If you think things are bad now ….  An observation made at the Bloomberg webinar was that the current administration is avoiding critical decisions in Iraq and Afghanistan and is letting the clock run out. The next president will have some hard choices to face.

No Defense bill until November In spite of the Saxby Chambliss’ guarded optimism, the consensus of the Bloomberg webinar participants was that the Defense bill will probably not pass until the “lame duck” session after the election. Once the poll results are known for sure, the losing party will be more motivated to negotiate a compromise.

Watch for “continuing resolutions” One common “work around” when Congress gets paralyzed is the “continuing resolution.” This temporarily funds specific agencies and programs. If Congress goes this route, examine the length of the resolution carefully. It is a short or long term resolution? Will it kick the Defense budget mess over to the new Congress? Will it include the beleaguered OCO?

Of course, unexpected events, such as a new war, could significantly alter the dynamics of the appropriations process. Since AMREL supplies mission-critical rugged solutions to warfighters and other key defense personnel, we will keep a close eye on the fate of Defense funding. We will apprise you of future developments.

 

Memorial Day originally was called “Decoration Day.” It fixed a time for people to place flowers on the graves of those who fell in the Civil War. Now, on Memorial Day, we remind ourselves of the sacrifices of all veterans.

One person who did not need reminding of his sacrifice was Yale, a friend of my parents. After all, when he looked at the mirror every day, he saw an empty space where one of his arms used to be.

He lost his arm in the Spanish Civil War, while fighting in the Abraham Lincoln brigade, a collection of American volunteers. They were not the first Americans to seek combat overseas. From John Paul Jones serving in the Russian Navy to Ernest Hemingway driving ambulances in Italy before the US entry into World War I, Americans have participated in foreign wars.

Nor was Yale the last American volunteer. There are numerous reports about Western fighters who have volunteered to fight with the Kurdish Peshmerga forces in their war against ISIS. Estimates of their numbers range from “scores” to 2,000. In addition to Americans, volunteers hail from Australia, Great Britain, Germany, Spain, France, Canada, Israel, and the Netherlands.

Many are drawn by the justice of the Kurdish cause. Jason Matson, a former U.S. Army soldier, is typical.  “I’m not going back until the fight is finished and ISIS is crippled,” Matson told the Associated Press. “I decided that if my government wasn’t going to do anything to help this country, especially Kurdish people who stood by us for 10 years and helped us out while we were in this country, then I was going to do something.”

Some veterans see their Kurdish adventure as an opportunity for meaning in their life. They were disappointed with the inconclusive conclusions of the Iraq and Afghanistan conflicts. Returning to civilian life was alienating. The one thing they knew how to do – fight – was not valued by employers or their stateside community. At least with Kurds, they can put their training to good use.

The Kurds are ambivalent about these foreign volunteers. They want arms, night vision goggles, gas masks, artillery, and body armor, not people. Several have expressed astonishment that the volunteers did not bring their own weapons. Some leaders have publicly declared that they do not accept foreign volunteers, but since elements of the Kurdish armed forces are not subject to a central authority, these statements are dubious.

The Americans and other Westerners are also ambivalent. Accustomed to a highly educated professional military force, American veterans look askance at the young poorly trained Kurdish fighters. “There are 17-year-olds with no proper training who have seen their friends being killed. They think everyone is Isis – it sometimes feels like a school trip with guns,” said one Westerner.  A former US Marine explained “For a militia in the Middle East it’s up to standards, for most Americans I’ve met it’s insanity.”

There are other areas of contention. Some Westerners have been put off by ethnic hostility expressed by Kurds toward the Arabs. One Westerner was disciplined about challenging the practice of discarding first-aid kits. Some have criticized the Kurdish leadership for their inflexibility in adopting new methods. There has been a loss of confidence in the competence of their Kurdish commanders. One American explained his decision to leave the fight, by declaring “I realized that if I stayed I would die and I didn’t come here to die.”

Some elements of the Kurdish armed forces have been reluctant to put Americans on the front-lines, which have disappointed adventure-seeking volunteers. Others recognize veterans as a resource and put them to work training young fighters.

Still others view the foreigners as a public relations opportunity. Foreign volunteers are interviewed by the world press and lionized in social media. The Lions of Rojava are especially known for their skillful use of branded images and media outreach. Canadian Dillon Hillier is sometimes cited as an example of a foreign soldier whose fame has been leveraged for publicity by the Kurdish forces.

Social media is a significant element in this fight. Just as Vietnam was the television war, the battle against ISIS is the Facebook war. Both sides aggressively recruit and lobby through Facebook and other social media.

Unfortunately, some pro-Kurdish Facebook pages are a bit suspect. For groups raising funds, there is no way of verifying their legitimacy.

While social media is undoubtedly valuable, it is the call of war that attracts young men. Kevin Williamson, a US Army veteran, who intends to join the Kurdish forces, explained, “Do I think there’s other ways to help, other than picking up a rifle and going overseas? Yeah, there’s multiple ways. People can help fundraise, people can write their congressmen … But my specific skill set? You know, I’m not really that great with anything other than being a soldier.”

Good luck, Kevin. I hope no one will be putting flowers on your grave for a long, long time.

 

AMREL announced the FBI’s certification of Flexpedient® AT80B Rugged Biometric Tablet.  It is now on the exclusive FBI’s Certified Products Listing.

“The FBI has certified that the AT80B is in compliance with the CJIS Division’s Next Generation Identification System Image Quality Specifications (IQS): EBTS Mobile ID FAP 45 Appendix F Specifications,” explains Richard Lane, AMREL Vice President of Strategic Business Development. “It meets or exceeds the criteria for for Single & Dual Finger Flat & Rolled Print which means it can access the FBI’s Next Generation Identification (NGI) database.”

AMREL developed the AT80B in cooperation with Integrated Biometrics. Fingerprints are captured by the industry-leading Sherlock, an Integrated Biometrics module which utilizes a state-of-the-art Light Emitting Sensor.  This sensor is fully rugged, uses little power, needs less maintenance than traditional methods, and captures FAP-45 quality images.

“Integrated Biometrics is proud that our LES technology is part of the Flexpedient® AT80B Rugged Biometric Tablet, a rugged device serving mobile identity needs in any environment,” said Mike Grimes, President of Integrated Biometrics.

This rugged tablet is designed to meet MIL-STD 810G and boasts an unusually durable IP67 rating. Built from the ground-up to be rugged, it is far tougher than a commercial tablet in a hardened case.

“The Flexpedient® AT80B Biometric Tablet is built on the AT80 platform,” explains Kalvin Chen, AMREL’s VP of Operations. “AT80’s unique channel design enables true off-the-shelf customization in a short period of time. The two-finger biometric sensor was added in less than a week.

AMREL plans to leverage AT80B’s customization capabilities in order to serve the Law Enforcement community. For example, a smart card reader can be easily and quickly integrated into the AT80B platform. AMREL is exploring adding an iris camera.

When asked about this biometric device, Assistant Chief William ‘Bill’ Leist (Ret) California Highway Patrol replied, “The AT80B is designed to fit the needs of modern law enforcement. The enrollment capability for high quality fingerprint capture will save officers from making unnecessary trips to booking stations. Furthermore, its exceptional ruggedness will ensure it will not break down at critical times.”

Although special measures were taken to assist the Public Safety community, the AT80B is designed for use in a variety of situations. For example, this biometric tablet is being used by professional sports franchises to fast track VIP admissions at games. Another example is the Youth Detention Authority in South Africa, which has piloted the AT80B to verify visitors and track residents at facilities across the country.

Standard features include Android 4.3 (Jelly Bean), 8” 10-point multi-touch capacitive touchscreen display, front/back 5 MP cameras, 802.11 b/g/n, GPS, and Bluetooth®.

Learn more at: computers.amrel.com/at80b

sofic 2016.jpg v2

Special Forces need logistics friendly, lightweight mobile computer solutions that never fail, even in the harshest conditions. AMREL’s ultra-rugged SlimLine meet the special needs of Special Forces.

Learn more about:

Make your appointment today to see these and other exciting SlimLine products at SOFIC!

Contact Javier Camarillo, AMREL’s Senior Applications Engineer, at

(800) 882 -6735  or javierc@amrel.com.

 

 

 

A recent blog post described the phenomenon of the “Bow Wave” and its importance to Defense spending priorities. AMREL takes its responsibility of supplying mobile computing solutions to warfighters seriously, so we keep a close eye on how Defense allocates its resources.

Under the “Bow Wave’s” influence, who are the winners and losers? Take a look at what the well-respected experts at the Center for Strategic and International Studies (CSIS) are predicting to be the top acquisition programs.

Defense 2

Defense Modernization Plans through 2020

A cursory analysis reveals that the Air Force, specifically aircraft acquisition (even more specifically the F-35) is the big “Bow Wave” winner.

“The Air Force is the largest contributor to the overall modernization Bow Wave. … funding for Air Force major acquisition programs is projected to grow by 73 percent in real terms from FY 2015 to its projected peak in FY 2023. This growth is driven primarily by aircraft programs. The Air Force’s three largest programs in terms of funding are the F-35A Joint Strike Fighter, Long Range Strike-Bomber (LRS-B), and KC- 46A aerial refueling tanker.”

Defense Modernization Plans through 2020

In spite of the presence of some big-ticket seafaring items on the above chart, the CSIS claims that the Navy and Marines do not much to look forward to in their future, at least according to a strict “Bow Wave’ analysis. However, I have doubts this will prove to be true. For one thing, they have plans:

“The Navy has been able to modernize by incorporating economically efficient capabilities, but much remains to be done. The sea service is making significant investments in aviation, he (Adm. Mulloy) noted, but it needs the RAQ-25 unmanned aerial vehicle quickly. Other critical capabilities include the SM-6, the LRASM, the HVP and maritime TACTOM.”

Signal

If things heat up in the South China Sea, I suspect the Navy won’t have any problems getting funding.

The CSIS analysis says that the Army will be another big winner.

“The Army’s budget for major acquisition programs is projected to increase 28 percent in real terms from FY 2015 to the peak in FY 2022. The Army’s plans indicate a significant Bow Wave in funding for ground systems…

“… the Army plans to ramp up funding for five major vehicle programs over the next five years… The largest of these programs is the Joint Light Tactical Vehicle (JLTV), a replacement for the Humvee. The program plans to reach full rate production of 2,200 vehicles per year by FY 2040. The Army is also developing the Armored Multi- Purpose Vehicle (AMPV), with low rate production planned to begin in FY 2020 and a total planned procurement of 2,897 vehicles. Programs are also planned to replace the Paladin self-propelled Howitzer, to upgrade Abrams tanks, and to modernize the fleet of Bradley Infantry Fighting Vehicles. Together these programs will increase funding for the Army’s major ground systems nearly threefold between FY 2015 an FY 2021.

“The Army has several modernization programs for communications systems planned as well. The Warfighter Information Network-Tactical (WIN-T) plans to continue fielding Increment 2 capabilities… The Army also plans to ramp up production of two variants of the Joint Tactical Radio System (JTRS): the Handheld, Manpack, and Small Form Fit (HMS radio and the Airborne, Maritime, and Fixed (AMF) radio. Having already experienced cost overruns, schedule slips, and many program changes, these three major Army communications programs are poised to more than double in funding between FY 2015 and FY 2021.”

Defense Modernization Plans through 2020

Then there are the non-service specific programs that can be expected to be well-funded. For example, cyber security will be favored in the budget process.

“Cyber right now is the cat’s meow—a notion sure to keep funding flowing for technological solutions, at least in the near term, to counter the emerging threats, according to Col. Gary Salmans, USAF, senior materiel leader of the Cryptologic and Cyber Systems Division within the Air Force Materiel Command.”

Signal

“President Barack Obama championed cybersecurity efforts Tuesday in seeking $19 billion for the cause as part of his fiscal year 2017 budget proposal. …The budget proposal for FY17, which begins October 1, is a 35 percent increase over the current fiscal year.”

Signal

Everybody loves SOCOM, so expect them to be eating steak, not hamburger. Space is being heavily militarized, so that’s another market Defense vendors should consider.

“In its enduring space race to narrow the materializing gap between the United States and peer competitors, the Air Force’s fiscal year 2017 budget emphasizes sustaining mission capabilities and improving space resilience by investing in command and control programs, situational awareness technologies, expendable launch systems and satellite communications.”

Signal

“U.S. officials to make recent bold leaps in their approaches, including establishing the Joint Interagency Combined Space Operations Center and making the Air Force secretary the principal DoD space adviser. With a goal to shift the Air Force’s space culture to one of warfighting, the center and the service secretary’s office will oversee a five-year, $5 billion budget increase for industry and allies to test new capabilities.”

Signal

 If I wanted to pick the fattest single Defense target, I would say it was retrofitting.

“Upgrades and retrofits of existing programs appear to give the greatest number of opportunities for COTS systems. These are often replacing proprietary systems for more open standards that are ultimately easier and cheaper to maintain going forward.”

Robert Day, Vice President, Sales & Marketing, Lynx Software Technologies,  Military Embedded Systems

The military can’t afford new stuff, so they want to make the old stuff last longer. At AMREL, we are very excited about this opportunity.  Our platform flexibility, extensive technical support, and customization capabilities make us a very good fit for this. In fact, many of the programs favored by the “Bow Wave” (communication, vehicles, SOCOM, etc.) present excellent opportunities for us and our partners.

For over 30 years, AMREL has been proud to provide mobile computer solutions for American Defense needs. Whatever requirements arise, you can be sure that we will be there to meet them.

Does the FBI have to tell Apple how it cracked the iPhone? The answer is not straightforward, and is illustrative of the many problems surrounding encryption.

 

The many discontents of encryption

Encryption is a very important security measure and it is also a real pain. For one thing, once encrypted, devices have a shorter battery life, and transmit data at a slower speed. In order to encrypt a device, valuable real estate can be taken up by the security hardware. At AMREL, we are familiar with this challenge, because our customization services are often asked to add Trusted Platform Modules (TPM) to our computer platforms.

In addition, high-security encrypted devices create bizarre unforeseen consequences. Soldiers are sometimes ordered to use systems for which that they are not cleared. Repairmen often lack clearance, so a broken encrypted device must be disposed rather than fixed.

 

Apple vs. FBI

In the latest round of “Game of Phones,” another unforeseen consequence appears possible. After months of applying legal pressure to Apple, is it the FBI who will ironically be forced to yield up their secrets? Will they be forced to tell Apple how they did their hack?

How did the FBI crack the iPhone in the first place?  Rumors have been circulating that the Israeli company Cellebrite Mobile Synchronization cracked the iPhone used in the San Bernardino terrorist shootings. That the FBI had to use an outside contractor to crack the iPhone is plausible. For one thing, there is a reason that the phrases “FBI” and “leading-edge technological capabilities” rarely appear together.

That an Israeli company did the hack is also believable, for that country has earned a reputation for expertise in encryption. Israel has developed these skills because its computer networks are under constant attacks. In addition, it has the highest number of programmers per capita of any country in the world. There is even a highly developed ancient tradition of cryptology and secret codes within Jewish mysticism.

Still any rumor in the Middle East has to be greeted with skepticism. I have met hackers who have valued reputation over the risk of legal retribution by falsely claiming exploits. The Cellebrite rumor appears to have some credibility. Around the time of the hack, it is a matter of official record that the FBI paid over $200,000 to this company.  A lot of people seem to believe this rumor, because the shares of its parent company, Japan’s Sun Corporation, have risen 40% since March 2.

 

Our lips are sealed

The fact that it is likely that a private corporation was the one to hack the iPhone is significant in the issue of who tells what to whom. Supposedly, the government is bound to inform companies of vulnerabilities in their encrypted systems, as determined by something called the “Vulnerabilities Equities Process” (VEP).

The VEP was developed in a thoroughly transparent process and actively shared with the public by the administration. Just kidding. Everything about the VEP is opaque. The Electronic Freedom Foundation (EFF) had to sue under the Freedom Information Act to get a highly redacted version of the VEP, which can be viewed here.  The EFF is not impressed with this document. Judging by information about government actions as revealed by the Snowden leaks, the EFF has dubbed the VEP as “…so much vaporware.”

 

The weird world of administrative law

Or is it? Just how meaningful is the VEP?  IF Apple could persuade a court that according to VEP, the government has to reveal the vulnerabilities of their encryption, would the administration have to follow their own rules? The VEP belongs to that surreal realm of “administrative law.”  Congress didn’t pass it. By and large, it’s not determined by court rulings or precedent. It’s just something that a bunch of administrative agencies made up.

I called a lawyer who has more than fifty years of experience of using the law to annoy the government. I asked, “Do government agencies have to follow their own made-up rules?” Her answer was a definitive, absolute, unqualified “Maybe.” In addition, she said that whatever decision is made by the courts, it will be “political.”

 

“It is a tale told by an idiot, full of sound and fury signifying nothing”

It is extremely unlikely a court will determine if the VEP applies or not. The fact that a private party (Cellebrite) probably hacked the iPhone is significant, because the VEP does not apply to private parties. The VEP only applies to vulnerabilities discovered directly by government agencies themselves.

Furthermore, according to the Washington Post, “FBI Director James B. Comey has said that the solution works only on iPhone 5Cs running the iOS 9 operating system — what he calls a ‘narrow slice’ of phones. Apple said last week that it would not sue the government to gain access to the solution.”

So after months of the FBI pressuring Apple to hack its own iPhone, it withdraws from the case, and says never mind. After months of declaring that the iPhone hack will endanger all iPhones, Apple has similarly dismissed its efforts to force the FBI to reveal its secrets. Some have suggested that the “narrow slice” description is accurate and Apple is not truly worried about the security of its future platforms.

The one thing that is clear from all this brouhaha is that our legal structure is completely inadequate for dealing with issues raised by new technologies. In the original court case, the FBI sued Apple on the basis of a law written in 1789.

In the meantime, I have a sinking feeling that the privacy of the average user was not a great concern in this latest round of legal wrangling. As Elliot Hannon wrote in Slate, “We’re all digital piñatas really.”

 

AMREL has announced the launch of APEX PX5, a 10.1” fully rugged, sunlight readable tablet with one of the brightest and sharpest displays on the market.

“What sets the APEX PX5 apart is the crisp image quality,” explained Kalvin Chen, AMREL’s Vice President of Operations. “Its visual excellence is a result of more than the 1000 nits rating. It also has a bright backlight, anti-reflective coatings, WUXGA 1920 x 1200 resolution, and directly bonded LCD layers. Very simply, the APEX PX5 has one of the best displays on any rugged tablet in the world.”

Built into the APEX PX5 is AMREL’s 30 years of expertise of supplying fully rugged computers to the frontline warfighters as well as Public Safety officers. In addition to its enviable IP65 rating, it complies with MIL-STD 810G, the military’s premier ruggedness standard.

“With scratch-resistant Corning Gorilla Glass 3, tough magnesium chassis, and a durable ABS plastic cover, you can have complete confidence in the APEX PX5 Tablet no matter where you take it,” declares Mr. Chen.  “In spite of all this ruggedness, the lightweight APEX PX5 is less than an inch thick.”

The APEX PX5 is built to meet modern demands. Boasting a speedy 4th generation Intel® Haswell Core ™ i5 processor, the APEX PX5 Tablet is ideal for graphic and other data-intensive applications. Its capacitive multi-touch supports glove touch, and a digitizer option. Other options include snap-on modules for magnetic stripe reader, smart card (CAC), NFC, as well as 2D barcode. To complete the tablet’s offering, it has a vehicle dock, desktop dock, VESA mount bracket, 2-bay battery charger, and dual capacity battery pack for extended use. The APEX PX5 supports Public Safety, industrial, field service, and commercial applications.

“We’re proud of the flexibility of the operating systems,” states Mr. Chen. “You can choose to use either full Windows 7, or Windows Professional or Embedded 8.1. You even have an option to install Windows 10 Internet of Things Enterprise.”

Learn more at computers.amrel.com/apex-px5