Preview

FBI Case Study: Apple Vs. The FBI

Good Essays
Open Document
Open Document
1357 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FBI Case Study: Apple Vs. The FBI
This Apple vs the Federal Bureau of Investigation (FBI) case study focuses on the one of many instances when the FBI has requested Apple to allow access into one of their devices. This case looks into a terrorist in California and gaining access into one of the terrorist’s iPhone. Apple is constantly looking to improve the security of their products because their customers value privacy. According to Muzamil Riffat, privacy is a subjective phenomenon. The definition of privacy is due to change based on several factors and geological location. Privacy is something that most people in the world value. Having passcodes on Apple products allow the users to feel safe. They know other people or the government cannot retain information on their phone. …show more content…
This wanted privacy only becomes an issue when other people are harmed or put in harmful situation, the people that do have something to hide can keep almost anything hidden because of this. This issue makes it very difficult now a days to get access to information that could help a court case or find crucial evidence. Apple is not in charge whether someone puts a passcode on their phone, they are just providing them with the option to do so. The FBI did the only thing they could do, hack into Farook’s phone to see what was on it. Most people suspect that the government is already watching them through their phone and laptop cameras, this suspicion is leading to a lack of trust with the security and privacy of people’s lives. Apple wants to be able to help the government, but will not put the information of their customers out in the public even though the circumstances were difficult. They could not give out Farook’s information without losing the trust of their users. The evidence on his phone was extremely important to the FBI to get a closer look into what information he had on the attack and maybe evidence for future …show more content…
Should Apple give up the privacy of all their users to help the government? People will always want their privacy and Apple continues to increase the security on their products. A solution to this problem could be to allow the FBI to hack into phones with a warrant. A warrant will allow the government to gain access to evidence on iPhones without going through hackers. For this case the FBI paid $1 million dollars for professional hacker to help. In situations like this, it will be very useful to have someone on their team that can gain access into any phone when there is a threat or act of terrorism. There is no specific way to handle an ethical dilemma, Apple has to figure out what is most important to their company and what their stakeholders want. With their decision, it was important for them to let their customers know that their privacy is extremely important to them and they will not give the government an easy system to hack into. Another option would be for the FBI law enforcement to improve their technical literacy. If they improve their technical literacy, they will be able to gain unauthorized access into any cell phone or device with a passcode on it. Although with each specific and unique case, one solution will not work for all of them. Law enforcers will have to be able to find ways to adapt to each case to get into any device for any reason. They want to be able to obtain all the

You May Also Find These Documents Helpful

  • Powerful Essays

    citizens, and the government would have too much capability to go behind our backs, unnecessarily, and spy on us. The Federal Bureau of Investigation has freely admitted that it has not launched or found any extensive cases through the Patriot Act’s privileges. (Ybarra, n.d.) The question is, though, if they can not find any cases of terrorism, smuggling, or organized crimes what are they doing? The Government is spying on us through every piece of technology that we own. They can find us within the blink of an eye through our cell phones, computers, and bluetooth devices. They can hack into any of our Facebook accounts, emails, internet search browsers. They can view a person through their phone or computer's camera without them even knowing. The government can also turn on your microphones through the same devices and listen to you and what you are doing at any moment. The National Security Agency has put its codes into Android's operating systems, hacking into three quarters of the world's smartphones. (Tyler Durden, July 9th,…

    • 3008 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The first reason is the Revolutionary War, this was a disagreement between Great Britain and the American colonies. The king himself had created a swamp of new buildings and offices. Hitler swamped and took them out. This is showing the colonies were in need of general searches. The British officers were just trying to received taxed goods. The next reason is Carroll v United States 1925. The United States supreme court was doing warrantless searches through automobiles. This is taking it too far, the US supreme court should not be able to go through somebody's vehicle without a warrant. There is no reasonable suspicion, this is just too far. Allowing Farook's Iphone to be unlocked allowed him to set up a terror attack. He was able to send drivers to locations and set up an attack. Apple took it too far and a chance of unlocking his Iphone to do…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    The indictment, said Janice Fedarcyk, assistant director in charge of our New York office, “describes an intricate international conspiracy conceived and carried out by sophisticated criminals.” She added, “The harm inflicted by the defendants was not merely a matter of reaping illegitimate income.”…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Good Essays

    How comfortable would you be with a government having access to your personal information and data on your phone? A recent incident involving a terrorist attack in San Bernardino, sparked a controversy between Apple and the Federal Bureau of investigation. Following the attack by two individuals committed an act of terror, killing 14 people, the iPhone belonging to one of the terrorists was found. As you may know, your organization is requesting the court for Apple's forced assistance in weakening the encryption on an IPhone related to the San Bernardino terrorist attacks and supposedly has vital information on it. These terrorist attacks were performed by ISIS's lone wolves, named Syed Rizwan Farook, who owns the phone and Tashfeen Malik, his wife. In my opinion, the phone shouldn't be cracked for three reasons. First of all because it undermines America's founding principles and it…

    • 642 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Case study 1

    • 466 Words
    • 2 Pages

    The blackberry controversy is prominent in Asia, particularly in the Middle East, and not anywhere else in the world because of the instability of the region, government corruption, and restricted freedoms. The governments in the Middle East are under threat and need all of the information on potential terrorist plots so they can get to protect their sovereignty. In order to protect the people, or to maintain a dictatorial grip on the power they wield, they suppressed freedoms for the populace. Also because of the different laws and attitudes towards privacy and human rights along with the differing degrees in the capabilities of governments to crack encryption; finally because of the domestic and regional political instability along with the occurrence of certain incidents that highlighted the security threats posed and the RIM’s secrecy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Federal Bureau of Investigation (FBI)is an agency made up of to protect the united states of america.They protect us from bad things and bad people.They can't get to every last crime on time to protect but most of the time they serve justice. The headquarters of the Federal Bureau of Investigation (FBI).They were established on July 26 in 1908.…

    • 310 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The NSA infiltrating the United States citizen's technology such as cell phones and computers is unjustified because there are no filters for the NSA or knowledge of their investigation taking place. For example "In his interview with RT, Binney emphasized that the FBI does not filter email messages but obtains and stores all of a person's e-mails, and when he or she becomes a target, their entire records are extracted and analyzed for the desired information" (NSA Whistleblower). Coming up with filtering processes would allow them to save time and filter out the non-terrorist threats. Many people make mistakes under pressure, knowing the National Security Agency is hunting you down is tons of pressure ask Osama bin…

    • 456 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The information was gathered about this “hack” though Edward Snowden (Savage, et al 4). Snowden is a former NSA contractor, who has leaked over 200,000 documents to the press. Recently, Snowden is involved in the huge news story about the NSA hacking into Google and Yahoo and collecting data about millions of account users of these networks. He leaked stories to The Guardian and The Washington Post during his NSA career, because he knew something was happening that needed told to the public. They are supposed to protect our country by bringing in information to help take down potential or current terrorist threats, and, instead, the government is wasting money to have them spy on innocent citizens. So far there’s not even a good reason to it, because not every single person who owns a phone or computer is a threat. Some use these things to do homework and talk to people, without the worry of someone tracking their information and keeping it in data centers “just in case.” It’s all very…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Consider the technology that defines everyday life in America- texts, email, internet, and phone calls. In performing these constant activities, most never questioned their privacy, that is, until Edward Snowden squealed on the NSA’s less than ethical maneuvers. Without citizens’ consent, the American government was collecting metadata, “all the information surround a call, including the caller’s number, the receiver's number, the time and location of the call, and how long it lasted” (Diamond). The government may have been shooting for just the bad guys, but all American civilians got caught in the crossfire. Nothing would exempt a person from these invasions of privacy, and their data would be scanned and stored just like that of a seasoned…

    • 1555 Words
    • 7 Pages
    Good Essays
  • Better Essays

    The Federal Bureau of Investigation (FBI) is a governmental agency belonging to the United States Department of Justice that serves as both a federal criminal investigative body and an internal intelligence agency (counterintelligence). Also, it is the government agency responsible for investigating crimes on Native American reservations in the United States[2] under the Major Crimes Act. The FBI has investigative jurisdiction over violations of more than 200 categories of federal crime.[3]…

    • 1044 Words
    • 5 Pages
    Better Essays
  • Good Essays

    To this day, devices such as, smartphones, smart tvs, tablets and smart-cars are evolving making people's personal lives more susceptible to having personal information that is stored to go wide and easy to gain. This has become easier due to the access we that to the internet and the fact that more and more quantities of devices are beginning to require internet. This brings the issue up for law enforcement agencies to question whether the law enforcements should or should not be required for devices to have warrants. Individuals believe that they should not be required to have a warrant to search people’s privacy and information because people tend to put their information out in the open for others to observe and gives away their direct…

    • 1007 Words
    • 5 Pages
    Good Essays
  • Good Essays

    NSA Pros And Cons

    • 514 Words
    • 3 Pages

    September 11, 2001 was the deadliest day for New York. Thousands died because of the terrorist attacks on the World Trade Center in New York City. Two planes crashed into the twin towers while a third crashed into the pentagon and a fourth into a field in Pennsylvania. Something this big could not have been decided that morning, it needed to be planned. All the people involved need to know what they were going to do. This meant they had to have some form of communication along the way, whether it was through calls or texts. Imagine if all of this could have been prevented. All those lives that were lost could have been saved. If only the NSA would have known. Even though it violates the privacy act of the constitution, it is better to be safe than sorry, potential terrorist attacks could be stopped, and it will not matter if you are not doing anything wrong.…

    • 514 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The 4th Amendment is extremely important to our country. This amendment in the United States Constitution provides the right for people to be secure in their own person, paper, and home, protects against unreasonable search and seizures, and states that no warrant will be issued without probable cause. 4th Amendment laws are more strict than any other amendment, and leaves absolutely no wiggle room to allow changes. Despite these strict laws being in place the government is at war with Apple because Apple encrypts everything to make a very good security, and they say allowing the government into people's phones would be against the 4th Amendment. 4th Amendment laws are very important, and should be followed closely. The 4th Amendment helps…

    • 151 Words
    • 1 Page
    Satisfactory Essays