{"id":4170,"date":"2016-02-17T17:41:52","date_gmt":"2016-02-17T17:41:52","guid":{"rendered":""},"modified":"2016-02-17T17:41:52","modified_gmt":"2016-02-17T17:41:52","slug":"the_fbi_vs_apple","status":"publish","type":"post","link":"https:\/\/admin.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/","title":{"rendered":"The FBI vs. Apple"},"content":{"rendered":"<p><a href=\"\/\/videos\/37\/70154\" target=\"_blank\"><img class=\"alignright\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\" alt=\"Listen to it Button\"><\/a><\/p>\n<p>RUSH: This situation with the iPhone 5c that was in possession of one of the San Bernardino 2 and the FBI desperately wanting to get into that phone to find out what was on that phone. Apple is saying, &#8220;Sorry, we can\u2019t. Our system is so encrypted; we can\u2019t get in there.&#8221; So the FBI went to a judge and the judge told Apple, &#8220;You gotta do it. You gotta get in there.&#8221; And Tim Cook sends a letter out to their customers, &#8220;Sorry, we won\u2019t do it. We prize customer privacy and security.&#8221; You know, I\u2019ve had more people today tell me&#8230;<\/p>\n<p>I find this fascinating. I know a lot of people who don\u2019t trust&#8230; They think the NSA is monitoring every conversation that they have. They think the NSA\u2019s following them into the bathroom, following them into the bedroom, following them into their car when the NSA doesn\u2019t even know they exist. And they\u2019re convinced that all these major smartphone companies and high-tech companies are in bed with the NSA and in bed with the government.<\/p>\n<p><img id=\"eZObject_118148\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/RushAppleDevices2.jpg\"\/><BR\/>And today they\u2019re pleasantly shocked and surprised when they learn the government can\u2019t break the encryption of an iPhone. And that, at the end of the day, is totally true. Those iPhones are so well made and the security systems are so encrypted, the data is so encrypted that not even the government can blast through. Now, there are ways. But I\u2019m gonna explain to you what the FBI is asking Apple to do, and I\u2019m gonna explain to you in detail why it is that the FBI and government officials cannot get past the four-digit security code.<\/line><\/p>\n<p>Now, if it\u2019s a four-digit security code &#8212; if that\u2019s all it is &#8212; then there is a way in.<\/p>\n<p>But Apple would have to make some adjustments on that phone, which they don\u2019t want to do.<\/p>\n<p>They would basically have to rewrite a firmware version and install it on that phone alone which would eliminate all of the security measures involved with logging into the phone. If the San Bernardino 2 used a six-digit instead of a four-digit sign-in code, then it\u2019s gonna be practically impossible to get into it. But, if they only did the standard, default four-digit alphanumeric and it\u2019s just numbers; then that can be broken. It takes&#8230; It can\u2019t be broken unless Apple does something, and what I\u2019m gonna try to do is explain what has to happen for the FBI to be able to get into it.<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>RUSH: Here\u2019s the deal with Apple and this phone. It\u2019s an iPhone 5c, which is important because that means it does not have fingerprint ID. The only way into the phone is through the PIN number that Syed Rizwan Farook set up when the phone was originally set up.<\/p>\n<p>Now, you may not know it, if you have recently purchased an iPhone, you might think you have to have a six-digit pin, but if you\u2019ve always had a four, it changed to six I think in iOS 9, you could have kept it at four if you would have read the small print and kept scrolling. I kept mine at four, but I have other procedures. Anyway, the phone\u2019s locked with that PIN, and nobody knows what the PIN is, the four-digit code that the terrorist used to lock his phone. Every person sets their own PIN.<\/p>\n<p>Apple doesn\u2019t know what it is. There\u2019s no way that PIN is backed up, it\u2019s part of any of the data on the phone, there\u2019s no way anybody can get it other than to run a password program or crash program, it\u2019s called brute force, just attack with every possible combination \u2019til the right one works and unlocks the phone. So how does Apple beat that? Apple has built in security features to make sure, because customer privacy is one of their primary marketing points, one of their primary sales points. So in the case of either a four-digit PIN or a six, let\u2019s deal with four because that\u2019s what this &#8212; well, they don\u2019t know. They don\u2019t know. If it is a six-digit PIN, it\u2019s gonna be a long time getting into this phone for anybody. If it\u2019s four digits, they have a chance.<\/p>\n<p><img id=\"eZObject_118119\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/Apple_FBI_SanBernadino_Phone-D.jpg\"\/><BR\/>But here\u2019s the way it works. If you forget your PIN, if you have a brain breeze, the first four attempts, there is no problem, you try to enter PIN, it\u2019s wrong, do it again, wrong, do it again, wrong, do it again, wrong. But the fifth time you try it, if you\u2019re wrong, you have to wait one minute. If the fifth attempt is wrong, you make the sixth attempt and if that\u2019s wrong, you have to wait another five minutes before trying again. If the sixth attempt is wrong, attempts seven and eight you have to wait 15 minutes for each. And if you don\u2019t get it right on either seven or eight, the ninth attempt cannot be attempted unless one hour has passed from the first attempt.<\/line><\/p>\n<p>Now, this is done to defeat programs that constantly, with brute force, enter every possible four-digit code. If any four-digit code is entered after the fifth time, any machine program doing this is gonna stop and break down because the phone enforces a delay. That\u2019s the only way in, and the judge has told Apple that they have to go get this phone and they have to themselves write a new piece of firmware eliminating these delays. The only way the FBI can get into this phone is if Apple creates a brand-new operating system for that phone alone, which eliminates all of those delays, which would permit the automated brute force attack to finally hit the correct four-digit PIN and unlock the phone. And Apple is refusing.<\/p>\n<p>Tim Cook sent a big, long letter out to the Apple customer base today, and his point is, if they make us do it once, then it\u2019s over. If they make us do this once, if we write this special one-time-only operating system, it\u2019s there. We don\u2019t want to run the risk. Our customer privacy and satisfaction is paramount to us, and, if we do this one violation, that\u2019s the end of our security program. We cannot be made to violate our own promises.<\/p>\n<p>So I don\u2019t know where this is gonna end up. Cook is digging in his heels for Apple, and, of course, the legal system is the legal system. And the way it could end up is if the legal system attempts to punish Tim Cook personally as well as corporately for this inability, or finds a way to blame the Apple customer base for making it be this way. There\u2019s any number of ways the legal system could exert pressure, financial pressure, on Apple to relent here.<\/p>\n<p><img id=\"eZObject_118149\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/SteveJobsAmericanExceptionalism.jpg\"\/><BR\/>BREAK TRANSCRIPT<\/line><\/p>\n<p>We got a couple of interesting questions in the e-mail.  First question:  &#8220;Rush, why doesn\u2019t the FBI just&#8230; They\u2019ve got their IT specialists.  Why doesn\u2019t some of the FBI just write their own one-time patch to the Apple system software, eliminating all those delays entering the PIN code?&#8221;  Good question.  The reason they can\u2019t is because in any official, workable software &#8212; system software or otherwise &#8212; Apple has to sign it.  And that just means authorize it.  For example, right now the current release version of iOS is 9.2.1. <\/p>\n<p>If you, for some reason, you wanted to go back and put 9.1 on your phone, you couldn\u2019t.  Apple no longer signs it.  They don\u2019t want people using old software.  They want everybody using the latest and greatest for obvious reasons &#8212; marketing, but security as well &#8212; and so some of the great operating systems of the past are not available. You can\u2019t use \u2019em.  The FBI does not have the authority, the ability to sign as Apple on a patch.  The second question is a little bit more provocative. <\/p>\n<p>&#8220;Hey, Rush. Do you think Tim Cook would be a little bit more cooperative if the FBI were trying to capture a serial killer of gays rather than terrorists?&#8221;  You know, the way some people think, I marvel at it.  This is a terrorist\u2019s phone, the San Bernardino Two.  And Tim Cook has come out &#8212; he\u2019s gay &#8212; and said, &#8220;We\u2019re not violating the security of our products.&#8221;  You know, I think everybody ought to realize this. Do you realize what you\u2019re learning here?  The FBI cannot get into your phone! The FBI cannot crack your iPhone.  <\/p>\n<p>They cannot get in there, and, even if they do get in there, the communications in the messaging program, iMessages, are all encrypted front to back. From sender to recipient, those are encrypted.  They don\u2019t need a decryption key to understand those, too.  I mean, this is not a challenge for the FBI just getting into the phone.  Then you\u2019d have to decrypt a whole bunch of the content.  They have busted their rear ends on security on these things, and I have people say, &#8220;Yeah, Rush, you know the FBI and the NSA? <\/p>\n<p><img id=\"eZObject_118150\" class=\"aligncenter\" align=\"middle\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/Rush-Watch-2.jpg\"\/><BR\/>&#8220;They\u2019re following me around! They\u2019re GPS locating me. They know where I am every day. They can probably activate the microphone in my phone and they can listen to what I\u2019m saying to anybody, even when the phone\u2019s off.&#8221;  You wouldn\u2019t believe the paranoia that\u2019s out there \u2019cause of Snowden, and now we\u2019re learning the FBI cannot crack a little iPhone 5c unless Apple helps \u2019em.  But this question: &#8220;If the FBI were trying to capture a serial killer of gays, could Tim Cook&#8230;?&#8221; Now, that\u2019s just catty.  <\/line><\/p>\n<p>Now, Trump on this Apple and iPhone business. He is slamming Apple for refusing to unlock the terrorists\u2019 phone, asking, &#8220;Who does Apple think they are?  They have to open it up.&#8221;  He said, &#8220;I agree 100% with the courts.  In that case, we should open the phone up.  I think we have to open it up. We have to use our heads. We have to use common sense.  Somebody the other day called me &#8216;a common-sense conservative.\u2019  Well, we have to use common sense.  We gotta find out what this terrorist is doing. <\/p>\n<p>&#8220;There\u2019s too much on that phone we can learn, who he was working with, who else may be involved, what future plans there might have been.  It\u2019s all on that phone; if it\u2019s there, we gotta go get it.&#8221;  And I find&#8230; You know, most people have always traditionally been sympathetic and supportive of law enforcement.  But this with Snowden\u2019s revelations and the NSA, there is outright suspicion and paranoia of the government.  I mean, really, some of the most boring people in the world think that there are government employees following every moment of their lives.  <\/p>\n<p>They\u2019d be shattered and crushed to learn that it\u2019s not happening.  But I don\u2019t know how you come down on this, because Apple says if they make us&#8230; By the way, this is not a back door.  The back door is something that would be permanently built in to everybody\u2019s phone, everybody\u2019s operating system, that the FBI could use any time they wanted.  And, theoretically, only law enforcement would have the keys to get into the back door, and Apple is refusing to even talk about a back door. <\/p>\n<p>And they\u2019re saying that this, if they are forced to allow brute force attacks to attack the four-digit PIN on this phone, that that\u2019s the first step in being forced to create a back door in the operating system, and they don\u2019t want to do it.  And here\u2019s the thing: If this is a six-digit PIN, if Syed Farook used a six-digit PIN, then all bets are off in cracking.  You know, the two extra digits expand the geometric possibilities, combinations by a factor of from here to the moon.  It\u2019s incredible.  It could take years, even with a brute force attack to crack a six-digit code.  <\/p>\n<p>Four digits you can do&#8230; What did I see, three weeks max it would take depending how far you have to go.  Now, they would try&#8230; You know, most people do it the four corners or 0000, 1111.  You know what the most common password is? This has been researched and found out. (interruption) No, not numeric, not digital.  The most common password involving letters on a website, not a phone PIN code, but a passport for a credit card or whatever. What do you think the most common password is?  <\/p>\n<p><img id=\"eZObject_118158\" class=\"alignright\" align=\"right\" src=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/RushApple_large.jpg\"\/><BR\/>You\u2019re right: &#8220;password.&#8221;  The actual word &#8220;password&#8221; is the most common.  After that it\u2019s somebody\u2019s birthday, and then &#8220;admin,&#8221; short for administrator.  Because people feel inconvenienced by it, so they don\u2019t want to ever run the risk of forgetting it.  So they come up with something that\u2019s easy. So those are the first things that the brute force attacks go for, and, then after all the obvious things are utilized, they start just every possible combination that you could&#8230; (interruption) Well, yeah, law enforcement could include the IRS.  <\/line><\/p>\n<p>There are agents called the Federal Reserve. (interruption)  Oh, yeah.  I mean, the Federal Reserve has agents that got huge badges that weigh a lot. (interruption) Oh, yeah. The US Treasury has agents. Damn right! Revenuers, FBI, they\u2019re all&#8230; (interruption) Yes, they do.  Well, if they are made to build a back door into the software, into the operating system, then any law enforcement &#8212; as they say in New York, law\u2019r enforcement &#8212; can get in there.  (interruption) Well, Lois Lerner would not have access, unless she knows somebody in law enforcement who would give it to her in violation of privacy laws &#8212; which, of course, with this Regime we know don\u2019t count a hill of beans to them anyway.  <\/p>\n<p>So, yeah, Lois Lerner, probably true.<\/p>\n<p>BREAK TRANSCRIPT<\/p>\n<p>The nitpickers out there think they got me.  Remember when I just said the current operating system for Apple is 9.2.1 and if you wanted to go back to 9.1 you couldn\u2019t do it.  I have some, &#8220;Hey, I\u2019m still running system 8.4.  And my phone &#8211;&#8221;  If you\u2019re still running an old program, an old operating system, fine, but if you upgrade, let\u2019s say you\u2019re running 8.4 right now from last summer, if you\u2019re running first 8.4 and you upgrade to 9.1 and don\u2019t like it, you\u2019re stuck; you can\u2019t go back to 8.4, because it will not install.  <\/p>\n<p>Well, jailbreaking it, that\u2019s a whole different thing.  I don\u2019t know anything about jailbreaking.  I only know what I read about jailbreaking.  So I\u2019d need to get a jailbreaking expert to tell me if you can go back to unsigned, unauthorized operating systems while jail broken.  That I don\u2019t know.  I hate admitting that, too, but it\u2019s true.  When I don\u2019t know something, I will say it.  It is historical.  (interruption) Well, you don\u2019t need to know, but you still have people that do it just for the heck of it because they want apps and they want to rearrange the operating system that Apple won\u2019t permit.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>RUSH: This situation with the iPhone 5c that was in possession of one of the San Bernardino 2 and the FBI desperately wanting to get into that phone to find out what was on that phone. Apple is saying, &#8220;Sorry, we can\u2019t. Our system is so encrypted; we can\u2019t get in there.&#8221; So the FBI [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ngg_post_thumbnail":0},"categories":[],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The FBI vs. Apple - The Rush Limbaugh Show<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:title\" content=\"The FBI vs. Apple - The Rush Limbaugh Show\" \/>\n<meta name=\"twitter:description\" content=\"RUSH: This situation with the iPhone 5c that was in possession of one of the San Bernardino 2 and the FBI desperately wanting to get into that phone to find out what was on that phone. Apple is saying, &#8220;Sorry, we can\u2019t. Our system is so encrypted; we can\u2019t get in there.&#8221; So the FBI [&hellip;]\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GeorgePrayias\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/\",\"name\":\"The Rush Limbaugh Show\",\"description\":\"Excellence In Broadcasting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\",\"contentUrl\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#webpage\",\"url\":\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/\",\"name\":\"The FBI vs. Apple - The Rush Limbaugh Show\",\"isPartOf\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#primaryimage\"},\"datePublished\":\"2016-02-17T17:41:52+00:00\",\"dateModified\":\"2016-02-17T17:41:52+00:00\",\"author\":{\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The FBI vs. Apple\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4\",\"name\":\"GeorgePrayias\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/live-rush-limbaugh.pantheonsite.io\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g\",\"caption\":\"GeorgePrayias\"},\"url\":\"https:\/\/admin.rushlimbaugh.com\/daily\/author\/GeorgePrayias\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The FBI vs. Apple - The Rush Limbaugh Show","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/","twitter_card":"summary","twitter_title":"The FBI vs. Apple - The Rush Limbaugh Show","twitter_description":"RUSH: This situation with the iPhone 5c that was in possession of one of the San Bernardino 2 and the FBI desperately wanting to get into that phone to find out what was on that phone. Apple is saying, &#8220;Sorry, we can\u2019t. Our system is so encrypted; we can\u2019t get in there.&#8221; So the FBI [&hellip;]","twitter_image":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg","twitter_misc":{"Written by":"GeorgePrayias","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/","name":"The Rush Limbaugh Show","description":"Excellence In Broadcasting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/live-rush-limbaugh.pantheonsite.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#primaryimage","inLanguage":"en-US","url":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg","contentUrl":"https:\/\/live-rush-limbaugh.pantheonsite.io\/wp-content\/uploads\/listentoit.jpg"},{"@type":"WebPage","@id":"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#webpage","url":"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/","name":"The FBI vs. Apple - The Rush Limbaugh Show","isPartOf":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#primaryimage"},"datePublished":"2016-02-17T17:41:52+00:00","dateModified":"2016-02-17T17:41:52+00:00","author":{"@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4"},"breadcrumb":{"@id":"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rushlimbaugh.com\/daily\/2016\/02\/17\/the_fbi_vs_apple\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/live-rush-limbaugh.pantheonsite.io\/"},{"@type":"ListItem","position":2,"name":"The FBI vs. Apple"}]},{"@type":"Person","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#\/schema\/person\/9a33276eb9dc5b6d3f8218957f30e6b4","name":"GeorgePrayias","image":{"@type":"ImageObject","@id":"https:\/\/live-rush-limbaugh.pantheonsite.io\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d290ab65e2eaca3719268528f83b85bf?s=96&d=mm&r=g","caption":"GeorgePrayias"},"url":"https:\/\/admin.rushlimbaugh.com\/daily\/author\/GeorgePrayias\/"}]}},"_links":{"self":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/4170"}],"collection":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/comments?post=4170"}],"version-history":[{"count":0,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/posts\/4170\/revisions"}],"wp:attachment":[{"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/media?parent=4170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/categories?post=4170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/admin.rushlimbaugh.com\/api\/wp\/v2\/tags?post=4170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}