FBI search for iPhone used by the terrorists in San

Based on this article or other topic research, explain whether you agree with the FBI or you agree with Apple. Justify your stance with supporting information?

The government sought means to gain backdoor access to get into the iPhone used by the terrorists in San Bernardino, but after, requested for the case to be thrown out. Through the help of the Remote Operations Unit, the iPhone’s security passcode was cracked which did not trigger the stored data formatting feature that would wipe off the data in the device after ten failed attempts. The FBI purchased the method to be used but the technical details about the feature remained with the unidentified hackers. Many individuals that supported apple were skeptical of the means used to bypass Apple’s security. On Twitter, Edward Snowden tweeted that the government had already explained their wild goose chase for months, while the editorial board of the Wall Street Journal suggests the ending of the case was suspicious, hence more reasons to doubt the government of its competence and credibility (Pressman, 2018).

I agree with the FBI as the discovery of such software vulnerability is more reason to hide information on the tool and use it on other similar cases with older iPhone versions. Apple has and would push for the court to authorize the disclosure of the tool but their efforts may fall on deaf ears. The decision taken by the FBI to not submit the tool used by the third-party hackers is one that I support. Meaning the method’s ownership is still the hacker’s property and because the VEP (Victim Empowerment Program) cannot perform its duty with limited details about the extent or nature of the vulnerability (Kessler, 2016).

Describe a possible compromise to the solution for future cases that would allow the investigation to continue.

The FBI was pushing so hard to compromise the company’s value of privacy. Privacy and security are fundamental to designing all of Apple’s software, services, and hardware while building powerful safeguards for their operating systems, applications and devices. Tim Cook declares that they are standing up against this barbaric move for all the individuals who are thinking it but have no voice. New measures of security are already in place; improved security with each software update.

The final shootout included 23 officers who fired 380 bullets, while Farook and Malik fired 76. The investigation began with concerns of possible assistance to the attackers. To obtain any leads and avert plans for additional attacks, the FBI strongly insisted on accessing the contents of Farook’s iPhone. What the FBI is doing could be considered as using the publicity and fear of a terrorist attack to rally sentiment for more aggressive investigative techniques, and Apple is capitalizing on this opportunity to challenge the overreach of government (Kessler, 2016). It has decided to enhance the data protection that enabled access to files even when the iPhone was locked. The latest update protects the more interesting data that were not protected by the passcode initially and the police would like to put their hands into. With this, the brute force techniques for password guessing would not help to either unlock or get its data.

Take a position on whether you believe technology is moving too fast for the judicial system. Suggest at least two improvements that the courts can make to catch up and/or keep up with the advancements in technology issues and crimes.

If Apple’s security- brand identity- was breached, there would be a drastic decline in their products (Smartphones and tablets). Tim Cook is concerned with the legal standards forced to crack more iPhone passcodes and build more hacking tools in the future (Pressman, 2018). Although Apple is currently facing approximately twelve other similar cases, they continue to upgrade their security systems against threats as frequent as possible.

Resulting in unwarranted power-grab is a pressure sign that the government is struggling with the advances in technology. The government forfeiting the case does not change the fact that there is a need to put a leash on their ability to compel tech companies for their assistance. According to Kaminsky, a security researcher, the damage cannot be refuted and most of Apple’s resources, instead of being used to create better products, fought off an insecurity demand- a complete waste of resources (Kessler, 2016)..

Get Professional Assignment Help Cheaply

fast coursework help

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Our essay writers are graduates with diplomas, bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently

How It Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.


order custom essay paper

Leave a comment

Your email address will not be published. Required fields are marked *