{"id":4158,"date":"2016-02-18T17:31:31","date_gmt":"2016-02-18T17:31:31","guid":{"rendered":""},"modified":"2016-02-18T17:31:31","modified_gmt":"2016-02-18T17:31:31","slug":"what_the_fbi_really_wants_from_apple","status":"publish","type":"post","link":"https:\/\/admin.rushlimbaugh.com\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/","title":{"rendered":"What the FBI Really Wants from Apple"},"content":{"rendered":"<p><a href=\"\/\/videos\/37\/70178\" target=\"_blank\"><img class=\"alignright\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\" alt=\"Listen to it Button\"><\/a><\/p>\n<p>RUSH: The story with Apple and the terrorists\u2019 iPhone 5c and the FBI, the White House is weighing in on it. I think there needs to be some further explanation about what\u2019s really going on here, folks. Because it\u2019s become a PR battle, and it looks like Apple is gonna lose this, and it\u2019s gonna be very tough to win because here we have a terrorist\u2019s cell phone, and law enforcement wants in it and to find out what else might be planned, who else might be involved.<\/p>\n<p><img id=\"eZObject_118169\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/Complex-Understandable-iPhone-Lock-Combo-B.jpg\"\/><BR\/>And it\u2019s very tough to stand up for citizens\u2019 privacy rights when the FBI and the White House say, &#8220;Hey, it\u2019s just that one phone! Don\u2019t panic here. All we want is that one phone!&#8221; But that\u2019s not all they want. That\u2019s not all. This is the federal government making a move on a private corporation. And this was a strategically planned &#8212; this was a specifically chosen event by the FBI. In fact, I don\u2019t even think what\u2019s on this phone is the real target for the FBI and the government. I think it\u2019s just the way they\u2019re getting in.<\/line><\/p>\n<p>And just to set the table &#8212; and I\u2019ll come back later and give you details of this. The best way that I have found to explain to people what\u2019s going on here, is instead of this being a cell phone in possession of a dead terrorist, or a terrorist &#8212; a dead terrorist\u2019s cell phone &#8212; think of it as a safe in the terrorist\u2019s house. And think of it as a six-number combination safe, although the number of twists and turns really are not relevant for the discussion here.<\/p>\n<p>The government says, &#8220;No, no, no! We just want that one safe. We, the government, just want the safe company to crack that one safe. We want them to give us the combination to that one safe.&#8221;<\/p>\n<p>And everybody says, &#8220;Well, fine. What\u2019s wrong with that? The terrorists are dead. Who knows what\u2019s in that safe? Let\u2019s go in there and get it!&#8221;<\/p>\n<p><BR\/>But that\u2019s not what they\u2019re asking for, and I\u2019ll detail this in a moment. What the FBI is asking for is for the manufacturer &#8212; the safe company &#8212; to give them the combinations of every safe they have made and will make. That is essentially what the government, the FBI is asking of Apple.<\/line><BR\/>&#8220;Give us the key that will allow us to crack any phone.&#8221; Now, they\u2019re not saying that, but that\u2019s going to be the ended result if the FBI wins this. And they probably will.<\/line><\/p>\n<p>Because I don\u2019t care how big Apple is: When the full force of the government comes at you, there\u2019s any number of ways they can get what they want, and they can maybe structure it in such a way so that Apple appears to be hanging tough and hanging tough and hanging tough. And so they get the PR value of really hanging tough and trying to defend their customers, and at the end of the day they cave to it. More than likely, that\u2019s going to happen. For all of you people concerned about privacy and security, this is one of the biggest &#8212; I don\u2019t know &#8212; contradictions or dilemmas.<\/p>\n<p>I mean, I hear from people all the time paranoid, scared to death that the NSA\u2019s tracking them. The NSA\u2019s listening to their phone calls. The NSA is activating the cameras on their phones and watching them. Particularly Millennials don\u2019t like any of this invasion-of-privacy stuff. But all of a sudde,n everybody is demanding Apple give up and let the FBI into &#8220;this one phone.&#8221; It\u2019s just curious, because when you dig into this and find out, it\u2019s not just &#8220;this one phone,&#8221; and I don\u2019t even think it\u2019s this phone that\u2019s really the ultimate, long-term target.<\/p>\n<p>The FBI has been trying to get Apple to give them the code or the keys to break peer-to-peer encryption. That\u2019s really what they want. They want to be able to decrypt your messages, your e-mails. And they need to get into your phones to be able to do that. In fact, look at&#8230; This is, I think, an interesting way to look at this. Look at how differently a publicly traded company views the security of its customers compared to Barack Obama and Hillary Clinton and agents of the federal government.<\/p>\n<p>Look at how they protect, try to guarantee the safety and security of the citizens.<\/p>\n<p>Wouldn\u2019t it be nice if Obama and Hillary were doing everything they could to protect the American people from all of these threats from an open border, from Mexico, from ISIS? All of these migrants, all of these refugees, you think that\u2019s not a security breach? You think those are not security breaches waiting to happen? Can you believe Apple is doing and appears to care much more about the privacy and security of their customers than the United States government seems to care about the privacy, security, and what have you, of American citizens?<\/p>\n<p><img id=\"eZObject_118194\" class=\"alignright\" align=\"right\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/FBI_large.jpg\"\/><BR\/>Look how Hillary treated America\u2019s secrets on her off-the-grid e-mail server. Look at all the top secret data she was trafficking in, all the top secret documents, e-mails, and so forth. Her e-mail server wasn\u2019t secure. And it wasn\u2019t just hers, was it? &#8220;Hey, we just want in on this one phone,&#8221; says Josh Earnest. &#8220;We just want in that one phone. We don\u2019t want any others.&#8221; Yeah, it was just one Hillary e-mail server. Well, who else was she dealing with? Who else was able to traffic in these documents that Hillary was trafficking in?<\/line><\/p>\n<p>Who else had similar setups and so forth? The irony on this is that Tim Cook is probably gonna vote for people like Hillary or Bernie Sanders or what have you, and they want to seize his company. If you listen to Bernie, listen to Hillary, Cook\u2019s company and companies like his are the problem. They\u2019re the enemy. Yet Tim Cook &#8212; who\u2019s doing a greater job protecting the security and privacy of his own customers &#8212; is gonna vote for people that blow it up for everybody else.<\/p>\n<p>A well-known professional golfer sent me a little story going around in the professional golf world today. It\u2019s an attempt to illustrate to people who might be attracted to Bernie Sanders (for whatever reason) to understand what Bernie\u2019s actually proposing with his 90% tax rate. And it\u2019s very simple. You go into a pro shop and you want to buy a ball marker to mark your ball on the green. So you ask the guy at the pro shop, &#8220;How much is the ball marker?&#8221; The guy says, &#8220;It\u2019s a dollar.&#8221; You hand over your dollar, and he gives you a dime as your ball marker.<\/p>\n<p>That\u2019s Bernie Sanders\u2019 tax policy.<\/p>\n<p>He\u2019s gonna take $1 from you and give you back 10\u00c2\u00a2.<\/p>\n<p>It\u2019s a great way to illustrate for people what Bernie Sanders\u2019 tax policy is all about.<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH: No, no, no, no. I don\u2019t care what you\u2019ve heard or what you think you know. I\u2019m gonna stick with my safe analogy here. Forget we\u2019re talking about a cell phone. Think of it as a safe. The FBI is not asking Apple to go to the terrorists\u2019 house and open it with the combination they know the safe has and then let the FBI look around. The FBI is asking for the combination.<\/p>\n<p>The FBI is asking the company that makes the safes to give them the combinations of all the safes that they have made and will make in the future, because they don\u2019t want to have to go to Apple every time they need to get inside some potential criminal\u2019s phone. They want the key. They are using a 200-year-old law called the All Writs Act, w-r-i-t-s, which is a law that compels private companies to help the government in law enforcement primarily, but other endeavors as well.<\/p>\n<p><img id=\"eZObject_118227\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/San-Bern-FBI.jpg\"\/><BR\/>The argument here is does the All Writs Act enable the government to tell a private company that it must weaken itself, that it must build vulnerabilities into its product? In the case of Apple, Apple has made a big deal out of the fact that if you own an iPhone, nobody\u2019s getting in it unless you let \u2019em, or unless you screw up and somehow don\u2019t use the systems they provide. But nobody\u2019s breaking into your phone. And in the case of a lot of applications, there is encryption both ways, from the sender to the recipient and back, and even if somebody gets in your phone, they\u2019re not gonna be able to crack your communications because it\u2019s encrypted and nobody has the key to decrypt it.<\/line><\/p>\n<p>The FBI wants all of that, but they\u2019re claiming they want it for just one phone. And they want the data. They want the key. They don\u2019t want Apple to come in and open the phone. They want to do it themselves. That means they have to be given the key. Well, okay, so the FBI has the key. Then other law enforcement gets the key. By the time the first week is over hundreds of thousands of law enforcement people have the key to get into iOS devices. You think one of them is not gonna leak it, one of them is not gonna make a mistake, one of them not gonna see to it that it ends up in the hands of some bad guy? I mean, it is highly likely that this scenario could play out if Apple is made to give up the ownership of the combination to all of their safes.<\/p>\n<p>But there\u2019s more to this, and I\u2019ll get into it later. I\u2019m not doing it now \u2019cause I don\u2019t think it\u2019s a priority in terms of everything we\u2019re talking about here. But that\u2019s basically what this is about. And again, I need to draw the comparison, the analogy. I mean, look at the lengths to which a private-sector American business is going to protect the privacy and security of its customers compared to the federal government\u2019s efforts in that area. And they don\u2019t compare. You remember the hack not long ago that the ChiComs and the Russians are now in possession of the federal records of over 20 million government employees.<\/p>\n<p>Remember that hack? Remember hearing about that? How about the IRS and Lois Lerner and all these people digging deep into private tax return data and leaking that and then using the leaks to deny tax-exempt status to otherwise qualified applicants? It\u2019s not even a comparison.<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH: Here\u2019s Eric in Los Angeles. Back to the phones we go. Eric, great to have you. Hello, sir.<\/p>\n<p>CALLER: Thank you. Hi. I\u2019m looking at this iPhone issue with the government trying to force Apple to deencrypt it so they can get the information about the terrorists. And I\u2019ve been listening and listening, and everybody\u2019s got this wrong. There\u2019s a larger issue at stake here. We have a process of letting anyone and everyone come into this country unvetted. The wife of that San Bernardino terrorist walked right in saying she wanted to get married. And the larger issue is Obama and his policies are letting these terrorists come into this country and yet we\u2019re after the fact a symptom of this is trying to deencrypt a phone. Now, that\u2019s my problem. No one\u2019s looking at the big picture. You are, but who else is even talking about this?<\/p>\n<p>RUSH: Well, actually, I get your point. Your point\u2019s really valid. Let me restate for people that might &#8212; I just want to make it clear. He\u2019s saying the phone and the encryption and trying to get data from it is a symptom of a much larger problem, and that problem is we\u2019re letting the criminals of the world into this country, and we\u2019re not stopping them. We\u2019re not vetting them. We\u2019re not doing any about it, and then when they engage in criminal acts then we act, &#8220;Oh, my God, oh, my God, we gotta find out what they\u2019re doing,&#8221; and the time to find that out is before they get into the country, right? That\u2019s your point.<\/p>\n<p><img id=\"eZObject_118217\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/SanBern-Terr.jpg\"\/><BR\/>CALLER: Exactly. Think about this. We\u2019re worried about a dead terrorist\u2019s phone. How many people right now, how many terrorists or would-be terrorists are in this country with a phone, an encrypted phone, plotting to do something to somebody somewhere or groups of people of nice citizens &#8212;<\/line><\/p>\n<p>RUSH: Wait. See, you have just swerved into what this really is about, in my estimation. In my humble opinion this is the FBI here. This is not just and it\u2019s not very much about what\u2019s on this phone. It\u2019s exactly what you said. They are frozen out of any phone. They can\u2019t crack any iPhone. They are ticked off. They\u2019ve been publicly complaining about it. And on the other hand we got all these people worried about the government spying on \u2019em. How do they feel now they realize, in an iPhone, that iPhone you\u2019re holding, the government can\u2019t crack your phone; what are you being paranoid for? So the government wants in, and they\u2019re using the case of this terrorist phone and the incendiary, personal nature this case creates, in order to create a circumstance where they can crack any phone they want to crack, Eric. That\u2019s what this is about.<\/p>\n<p>CALLER: This is malfeasance and ineptitude at the highest level. This is Obama, and he\u2019s about to let how many Syrian refugees in? How many of these people are terrorists? How many people will be in here with an iPhone 5S plotting to do something to some group or some state or some city somewhere?<\/p>\n<p>RUSH: Well, speaking of that, let me just add, this was an iPhone 5C. The iPhone 5C is the least secure phone Apple makes. Starting with the iPhone 5S and on up into the iPhone 6 and 6S series, it\u2019s not just the four digital or six-digit PIN, you need fingerprints to get in, if you use it, and there\u2019s no way to crack that because let me tell you how this fingerprint thing works. People didn\u2019t even understand this.<\/p>\n<p>Your fingerprint is not actually stored on the phone, just like your credit card number is not stored on the phone on Apple Pay. You sample your fingerprints, your thumbs, whatever fingers you want, and a digital token is attached to each one. A digital token is what\u2019s saved in a portion of the processor called the secure enclave. It is, for visualization purposes, it\u2019s a tiny little section of the processor where nobody can go, not even Apple. And it\u2019s encrypted itself, but your fingerprint is not really there. It digitizes the fingerprint and assigns a token to it. And it recognizes your fingerprint that way, not by virtue of an actual picture of your fingerprint stored in the phone.<\/p>\n<p>Apple Pay, by the same token, your credit card number never gets transferred in a transaction on Apple Pay. Your credit card number, all the data that identify you as the credit card holder is represented by a token, a number, a convoluted, crazy number, and that number is what gets transferred to the merchant\u2019s card reader or device reader when you made a purchase with Apple Pay. It\u2019s more secure than a credit card. It\u2019s more secure than a credit card that you hand off to somebody at a store or a restaurant, and, by the same token, if this were an iPhone 5S or a 6 we wouldn\u2019t even be here because the enclave and the fingerprint adds an entirely new dimension to it.<\/p>\n<p><img id=\"eZObject_118223\" class=\"alignright\" align=\"right\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/181264085_large.jpg\"\/><BR\/>But this is not. This is an iPhone 5C. No fingerprint. All there is is that PIN, and nobody knows yet whether it\u2019s a four-digit PIN code or six-digit, \u2019cause nobody knows what operating system was on this phone. It could be iOS 8, in which case there\u2019s only a four-digit code. It was iOS 9 that introduced the option to use a six-digit code. But here is what the FBI, this what the government is asking in three separate items easily understood. The FBI is asking that the process by which people activate their phones by entering the PIN code be eliminated. The way it works now, if you forget your PIN, you\u2019ve got 10 chances to use it. After 10 chances, after 10 failures, your phone gets erased.<\/line><\/p>\n<p>You forget your four-digit PIN, you don\u2019t have it written down, you can\u2019t remember it, the first four times you try it, you can try \u2019em instantly. After the fourth time you have to wait one minute. After the fifth time you have to wait five minutes. Appear the sixth time you have to wait 15 minutes, up to number nine. The ninth time you have to wait an hour before trying. Well, this means that nobody can use automated, brute force technology to keep sampling four-digit codes in microseconds until they come up with the right one, which could be done in a half hour, because these delays are built in. And if after the tenth attempt, and you get it wrong all 10 times, your phone wipes.<\/p>\n<p>Security. That\u2019s how Apple builds it so that a thief can\u2019t get into your data. Well, the FBI needs ways around that. If they\u2019re gonna get whatever this terrorist had on his phone or her phone, they need to get around all those delays. The real thing they\u2019re asking for &#8212; this is the key &#8212; the FBI is asking to be permitted to submit potential pass code or PIN numbers via the lightning port on the bottom of the phone. Meaning they want to be able to connect another digital device to the phone that brute force attacks the phone by in microseconds trying every different combination possible of four-digit PIN codes.<\/p>\n<p>They\u2019re not asking to take the phone to Cupertino, to turn the phone over to an Apple engineer. The Apple engineer goes in, unlocks the phone, takes the data off it, because some of that data\u2019s encrypted. The iMessage data is encrypted in addition to the phone PIN. Some of the e-mail\u2019s encrypted. They\u2019re not asking Apple to go get all that and then hand it over to them. They are asking Apple to give them the keys to unlock this phone, which would unlock any phone. They\u2019re asking Apple for the keys, the combination to the safe. They\u2019re asking Apple for the combination for every phone eventually that\u2019s been made. That\u2019s their wish list, to deal with all these other terrorists who are currently out there plotting, using phones. The FBI wants to be able to track \u2019em. The FBI wants to be able to listen to their calls.<\/p>\n<p>The FBI wants to be able to read their messages. Right now, they can\u2019t. If they get&#8230; Even if they come across a terrorist\u2019s phone, they can\u2019t crack it. They can\u2019t get in. The message traffic is encrypted. They can\u2019t decrypt it. They need the keys. They don\u2019t want to have to go to Apple every time they grab a terrorist\u2019s phone. They want to be able to do it in-house. That\u2019s the big ask. And in business terms, they\u2019re asking Apple to essentially make their devices&#8230; They\u2019re asking Apple to build a vulnerability into the software or hardware, the firmware.<\/p>\n<p>It\u2019s not just about removing the roadblock of the PIN code. The FBI wants to be able to get in on their own. Actually they\u2019re also drawing the line on end-to-end encryption and that\u2019s a whole different thing from this PIN code thing. There\u2019s two different things that are being battled over here. End-to-end encryption is you sending a message to somebody, a text message to somebody, blue bubbles. If it\u2019s green bubbles, it\u2019s a cell text message and you gotta go to the phone company for that.<\/p>\n<p><img id=\"eZObject_118221\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/San-Bern-POLICE.jpg\"\/><BR\/>But if the bubbles are blue, then you\u2019re encrypted both ways. End-to-end means sender, recipient, and back. Nobody can crack it. You\u2019re totally safe. The DoD has gone public saying they can\u2019t crack it. The CIA has said they can\u2019t crack it. The NSA has said they can\u2019t crack it. So even if they had the phone and even if they had the keys to unlock the phone to get in, they still need to be able to have the keys to decrypt all of that data. That\u2019s what\u2019s really being fought over here.<\/line><\/p>\n<p>And Apple has made all of this security one of the top five reasons to buy their products. And they\u2019re claiming, &#8220;You\u2019re asking us to take away things that we are promoting, things that we are guaranteeing, things that we\u2019re promising,&#8221; which they can\u2019t really promise. Total security guarantee? You can\u2019t do that. There\u2019s always gonna be a flaw somewhere. But they are gonna suggest here, &#8220;You can\u2019t make us do it, after all of these years, just to help law enforcement.<\/p>\n<p>&#8220;You cannot tell us that we have to make an inferior product compared to what we\u2019ve been making,&#8221; and the government thinks they can, and a lot of lawyers think they can. And that\u2019s gonna be what the battle\u2019s over. And I already know what\u2019s gonna happen. The government does not lose these. They just don\u2019t. It\u2019s gonna take some time to play out, but it\u2019s gonna be &#8212; remember, perception is reality. And when certain perceptions have been realized here is when this case is going to be, quote\/unquote &#8220;solved.&#8221;<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH: Well, yeah, you could jail break it and you could get data that way. But what the FBI wants&#8230; This is where we get into this notion of the back door. There\u2019s all kinds of different terms being used here to describe what\u2019s going on, but the FBI essentially wants to be able to get into every device with a secret trapdoor that you can\u2019t use as the owner, that only law enforcement has, and they would only use it with a warrant and proper legal supervision, and they would only do if when there\u2019s just cause, proper whatever all that stuff is.<\/p>\n<p>But people are afraid. &#8220;No, no. They\u2019re gonna use it any time they want once they get access to it.&#8221; It\u2019s just the latest chapter in the ongoing battle of privacy from government intrusion. I don\u2019t mean to minimize it, but that\u2019s what this is, with a company that has used &#8212; as a primary marketing sales tool &#8212; the fact that nobody can do that to their devices. Their devices can\u2019t be cracked. &#8220;We care about your privacy. We care about your security. Screw the government, screw everybody else.&#8221; So the government\u2019s coming for \u2019em.<\/p>\n<p><img id=\"eZObject_118226\" class=\"alignright\" align=\"right\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/499890518_large.jpg\"\/><BR\/>BREAK TRANSCRIPT<\/line><\/p>\n<p><BR\/>RUSH: Just one more thing on this terrorist telephone business.  Our last caller made a really, really good point that all of this is only a topic right now because we are just letting these people in the country.  These people, these terrorists got in the country on what? A fianc\u00c3\u00a9 visa. Fareed Sahib, whatever her name was, got in that way.  &#8220;They were just a normal American couple,&#8221; and then something about the American health care system ticked \u2019em off and they became terrorists or some such thing.  Isn\u2019t that what it was?  <\/line><BR\/>Maybe not the health care system, but it was something, the office, whatever. I don\u2019t know what it was. But they were just fine, normal, happy-go-lucky, nice Americans who all of a sudden &#8220;got radicalized.&#8221;  (Gasp!)  And it was our fault, somehow; it always is.  But the caller made the point: &#8220;We can argue over what they want to do with the phone and the FBI and Apple and every customer and security, but if we just wouldn\u2019t make it so easy for these people to get in the country, we wouldn\u2019t have the problem.&#8221;  That\u2019s a good point.<\/line><\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>Selma in Ridgewood, Queens, New York.  Great to have you on &#8212; <\/p>\n<p>CALLER: (garbled cell) Mr. Limbaugh, listen: Bottom line of the story is, all the candidates on the right have, to one degree or another, want to secure the border.  But you\u2019ve done an invaluable service by providing civics studies to kids.  I homeschooled my son.  We have the A Beka Program, and we have great books.  Today the school system has thrown away the books.  But, listen, the bottom line (garbled) to keep our country safe, we have to do two things.  However, having said that, we cannot allow our government to circumvent the law, because when Snowden opened his big mouth, he disclosed things to us &#8212; the public &#8212; that the government has been endangering us by looking into our communication.  So I must disagree with the government and I have to disagree with Mr. Trump.  You may not circumvent the law because, bottom line of the story, if you get drunk, for instance &#8212; <\/p>\n<p>RUSH:  Wait, wait. Hold it. Wait, wait, wait. <\/p>\n<p>CALLER:  You\u2019re drunk as a skunk, and you all take a nap &#8212; <\/p>\n<p><img id=\"eZObject_118225\" class=\"alignright\" align=\"right\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/510897086_large.jpg\"\/><BR\/>RUSH:  Wait, wait. <\/line><\/p>\n<p>CALLER:  &#8212; on the phone &#8212; <\/p>\n<p>RUSH:  Wait.  Wait a second.  What do you disagree with Trump over and you agree with the government?  What is it you disagreeing with Trump on? <\/p>\n<p>CALLER:  No, I disagree with Trump as I disagree with the government that you may not circumvent the law and the rules that are in place now.  That law put in place &#8212; and obviously it\u2019s working.  When Snowden opened his big mouth &#8212; which I don\u2019t think he\u2019s a traitor. I think he\u2019s an honorable man for doing this, because he saved us. Billions of people now that the government has been spying on us for years, and I remember, before I had a cell phone &#8212; <\/p>\n<p>RUSH:  Should not go into iPhones. That\u2019s what she\u2019s saying. Yeah, okay. <\/p>\n<p>CALLER:  Huh? Hello? <\/p>\n<p>RUSH:  So, yeah, you think the iPhone should be off-limits for the government? <\/p>\n<p>CALLER:  Absolutely! I\u2019ll tell you why.  Because, for instance, people that are on medication that are taking psychotropic drugs may be disclosing things that are not based on reality. <\/p>\n<p>RUSH:  I know.  Look, there\u2019s no question what they could find (chuckling) in people\u2019s phones. Psychotropic drugs or who knows? Just your average, ordinary conversation between a couple of reprobates could trigger all kinds of things.  Especially if it\u2019s read out of context and so forth.  But I was very&#8230; Look, everybody in government &#8212; it\u2019s not just Trump. I think all the other candidates have sided with the government over Apple on this.  Am I wrong? (interruption) Kasich came out in favor of government&#8230;?  Of course. They\u2019re all going to.  Anyway, I appreciate the call, Selma, but we\u2019re just out of time here for this segment. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>RUSH: The story with Apple and the terrorists\u2019 iPhone 5c and the FBI, the White House is weighing in on it. I think there needs to be some further explanation about what\u2019s really going on here, folks. Because it\u2019s become a PR battle, and it looks like Apple is gonna lose this, and it\u2019s gonna [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ngg_post_thumbnail":0},"categories":[],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What the FBI Really Wants from Apple - The Rush Limbaugh Show<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:title\" content=\"What the FBI Really Wants from Apple - The Rush Limbaugh Show\" \/>\n<meta name=\"twitter:description\" content=\"RUSH: The story with Apple and the terrorists\u2019 iPhone 5c and the FBI, the White House is weighing in on it. I think there needs to be some further explanation about what\u2019s really going on here, folks. Because it\u2019s become a PR battle, and it looks like Apple is gonna lose this, and it\u2019s gonna [&hellip;]\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GeorgePrayias\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/\",\"name\":\"The Rush Limbaugh Show\",\"description\":\"Excellence In Broadcasting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\",\"contentUrl\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#webpage\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/\",\"name\":\"What the FBI Really Wants from Apple - The Rush Limbaugh Show\",\"isPartOf\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#primaryimage\"},\"datePublished\":\"2016-02-18T17:31:31+00:00\",\"dateModified\":\"2016-02-18T17:31:31+00:00\",\"author\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4\"},\"breadcrumb\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What the FBI Really Wants from Apple\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4\",\"name\":\"GeorgePrayias\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g\",\"caption\":\"GeorgePrayias\"},\"url\":\"https:\/\/admin.rushlimbaugh.com\/daily\/author\/GeorgePrayias\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What the FBI Really Wants from Apple - The Rush Limbaugh Show","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/","twitter_card":"summary","twitter_title":"What the FBI Really Wants from Apple - The Rush Limbaugh Show","twitter_description":"RUSH: The story with Apple and the terrorists\u2019 iPhone 5c and the FBI, the White House is weighing in on it. I think there needs to be some further explanation about what\u2019s really going on here, folks. Because it\u2019s become a PR battle, and it looks like Apple is gonna lose this, and it\u2019s gonna [&hellip;]","twitter_image":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg","twitter_misc":{"Written by":"GeorgePrayias","Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/","name":"The Rush Limbaugh Show","description":"Excellence In Broadcasting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/live-rush-limbaugh.pantheonsite.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#primaryimage","inLanguage":"en-US","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg","contentUrl":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg"},{"@type":"WebPage","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#webpage","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/","name":"What the FBI Really Wants from Apple - The Rush Limbaugh Show","isPartOf":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#primaryimage"},"datePublished":"2016-02-18T17:31:31+00:00","dateModified":"2016-02-18T17:31:31+00:00","author":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4"},"breadcrumb":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/daily\/2016\/02\/18\/what_the_fbi_really_wants_from_apple\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/live-rush-limbaugh.pantheonsite.io\/"},{"@type":"ListItem","position":2,"name":"What the FBI Really Wants from Apple"}]},{"@type":"Person","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4","name":"GeorgePrayias","image":{"@type":"ImageObject","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g","caption":"GeorgePrayias"},"url":"https:\/\/admin.rushlimbaugh.com\/daily\/author\/GeorgePrayias\/"}]}},"_links":{"self":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/4158"}],"collection":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/comments?post=4158"}],"version-history":[{"count":0,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/4158\/revisions"}],"wp:attachment":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/media?parent=4158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/categories?post=4158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/tags?post=4158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}