Preview

Iphone Security Issues

Good Essays
Open Document
Open Document
469 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Iphone Security Issues
Information breaks, hacking and device thievery is a standard piece of cutting edge life. So as to protect clients, Apple and Google added extremely viable security components to their phone working frameworks making them effectively unlockable. However, the FBI wants Apple to diminish advancements it has made on encryption programming, contending this is making it less demanding for fear based oppressors and different unsafe people to dodge identification.
It requested that Apple makes an "indirect access" to hack into the iPhone of one of the expired San Bernardino shooters. Apple, which has collaborated completely with the examination to this point, has declined to make a method for breaking iPhone encryption as it would expose hundreds of millions of IPhone users, violating their privacy and their civil rights. However, the FBI got their desired result by accessing the iPhone with the assistance of a third-party.
…show more content…

If this is done with this one phone, what will prevent the government from compelling Apple and other organizations to hack into different gadgets? Another key point is if the US government can force Apple to get into a specific gadget, won't different governments request the same power?
The underlying ethical issue for this situation is the contention between the two legitimate values: Security vs. Privacy. Both values are vital in a democratic society. Studies have demonstrated that when presented with an either/or situation, people, most likely will opt for security to the damage of privacy and even to the loss of freedom. In this case, People are influenced to believe that Apple should comply with the FBI in the matter of national security but fail to realize the long-term consequences that this could have on data security and


You May Also Find These Documents Helpful

  • Good Essays

    After having an extended and acrimonious sparring with Apple, the FBI has paid an astonishing amount of more than $1 million to hack into the gunman’s iPhone used in the San Bernadino shooting. This ends a legal battle between the FBI and Apple but leaves the question of law enforcement access to information unresolved.…

    • 421 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    How comfortable would you be with a government having access to your personal information and data on your phone? A recent incident involving a terrorist attack in San Bernardino, sparked a controversy between Apple and the Federal Bureau of investigation. Following the attack by two individuals committed an act of terror, killing 14 people, the iPhone belonging to one of the terrorists was found. As you may know, your organization is requesting the court for Apple's forced assistance in weakening the encryption on an IPhone related to the San Bernardino terrorist attacks and supposedly has vital information on it. These terrorist attacks were performed by ISIS's lone wolves, named Syed Rizwan Farook, who owns the phone and Tashfeen Malik, his wife. In my opinion, the phone shouldn't be cracked for three reasons. First of all because it undermines America's founding principles and it…

    • 642 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Case study 1

    • 466 Words
    • 2 Pages

    The blackberry controversy is prominent in Asia, particularly in the Middle East, and not anywhere else in the world because of the instability of the region, government corruption, and restricted freedoms. The governments in the Middle East are under threat and need all of the information on potential terrorist plots so they can get to protect their sovereignty. In order to protect the people, or to maintain a dictatorial grip on the power they wield, they suppressed freedoms for the populace. Also because of the different laws and attitudes towards privacy and human rights along with the differing degrees in the capabilities of governments to crack encryption; finally because of the domestic and regional political instability along with the occurrence of certain incidents that highlighted the security threats posed and the RIM’s secrecy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Good Essays

    In particular, that 45% of the court circuits have adopted as broad interpretation of the law while only 36% have adopted a narrow interpretation of the law (Mikulic, 2016). The cautionary tale that the author spelled out in part I of the article was in particular an eye opener. The famous hacker and “internet troll” (Lennard, 2014) Weev (Andrew Auernheimer) was “sentenced to 41 months in federal prison for revealing to media outlets that AT&T had configured its servers to allow the harvesting of iPad owners' unsecured email addresses” (EFF, 2013). Both Weev and co-defendant Daniel Spitler used “a script that [exploited] the security hole to collect roughly 120,000 email addresses” (EFF, 2013). Weev was indicted under the provisions of the CFAA law, in particular the broad interpretation of the law. In which Weev had exploited a security hole that AT&T had failed to secure. I found that the author described a strong case where millions of Americans can be punished under the broad scope of…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Technological Advances and Ethical Issues precipitating the passage of the Patriot Act and the Federal Information Security Management Act…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fbl Vs Apple Company

    • 110 Words
    • 1 Page

    Security and privacy are the two rights that are always closely related but also with contradiction as they are both correct. They now are obviously shown in a big conflict and successfully cause a strong controversy upon the Apple Company and FBL. Apple refused a court order to help FBL unlock an iphone of Syed Farook, one of two shooters in the ISIS-inspired San Bernardino attack last year. Apple protests the FBL's request violate the privacy of its costumers while FBL says the purpose of doing this is for the public safety of every citizen. Whether Apple accept the order to allow the FBL to hack the iphone or…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The information was gathered about this “hack” though Edward Snowden (Savage, et al 4). Snowden is a former NSA contractor, who has leaked over 200,000 documents to the press. Recently, Snowden is involved in the huge news story about the NSA hacking into Google and Yahoo and collecting data about millions of account users of these networks. He leaked stories to The Guardian and The Washington Post during his NSA career, because he knew something was happening that needed told to the public. They are supposed to protect our country by bringing in information to help take down potential or current terrorist threats, and, instead, the government is wasting money to have them spy on innocent citizens. So far there’s not even a good reason to it, because not every single person who owns a phone or computer is a threat. Some use these things to do homework and talk to people, without the worry of someone tracking their information and keeping it in data centers “just in case.” It’s all very…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The first reason is the Revolutionary War, this was a disagreement between Great Britain and the American colonies. The king himself had created a swamp of new buildings and offices. Hitler swamped and took them out. This is showing the colonies were in need of general searches. The British officers were just trying to received taxed goods. The next reason is Carroll v United States 1925. The United States supreme court was doing warrantless searches through automobiles. This is taking it too far, the US supreme court should not be able to go through somebody's vehicle without a warrant. There is no reasonable suspicion, this is just too far. Allowing Farook's Iphone to be unlocked allowed him to set up a terror attack. He was able to send drivers to locations and set up an attack. Apple took it too far and a chance of unlocking his Iphone to do…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NSA surveillance

    • 884 Words
    • 3 Pages

    If a person has nothing to hide there should be no reason to have a problem with the NSA and the things that they do. I do see how people can feel like it is an invasion of privacy but at the end of the day, would you want the NSA to check on you every once in a while or would you rather risk the possibility of a terrorist attack that can lead into millions of lives lost ultimately leading to war? The NSA is able to tap into anyone’s email and texts but they aren’t doing it with malicious…

    • 884 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Technology Civil Rights

    • 717 Words
    • 3 Pages

    According to apple consumers are their priority as they state,” When you pay for groceries, message a friend, track a workout, or share a photo, you shouldn’t have to worry about your information falling into the wrong hands. The personal data on your devices should be protected and never shared without your permission. That’s why we build strong, innovative safeguards into the things we make.” (Apple, 2017) Apple has protected its users by encrypting user’s data and by following our civil rights. Cristopher Soghoian mentioned in a ted talk presentation he gave that,” if the police seize an iPhone and it has a password, they'll have a difficult time getting any data from it, if they can do it at all. In contrast, the security of Android just really isn't as good. Android phones, or at least most of the Android phones that have been sold to consumers, do not encrypt data stored on the device by default, and the built-in text messaging app in Android does not use encryption. So, if the police seize an Android phone, chances are, they'll be able to get all the data they want from that device.” (Soghoian, 2017) and that is true android users need to set up an encryption app or enable it on their devices because someone other than the government may hack onto your phone and steal your…

    • 717 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Naikon the long-run this would have ended up being just another tool for the malicious users. The other way is what Mr. Tim Cook actually did i.e. to provide maximum support to the government on case to case basis but refuse to provide a backdoor or any information to bypass the securitythus,maintaining customer privacy. I believe Mr. Tim Cook took a wise, appropriate decision.He even so far as to update the security in the newer OS’s so that even his own engineers could not bypass the security anymore.This helped him maintain his commitment of Private Life, his responsibilities towards his customers (which is considered outside Firm’s boundaries as per the case study). Q3. Last yearSenatorsFeinstein and Burr released “Backdoor” Anti-Encryption Bill. Review the draft online and provide your insights.Answer. The Anti-Encryption bill called as “Compliance with Court Orders Act”was introduced by Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) (who represents California, where most of the companies that would be impacted are based) inthe month ofFebruary 2016as a result of increasingly rancorous debate over encryptionbetween the government agencies like FBI and the tech companies like Apple. If this bill was passed, it would have had requiredtech firms to decrypt customers’ data at a court’s request, essentiallyrequired theengineers to make their encryption reversible for investigators, create vulnerabilities into their products or servicesalso,potentially…

    • 754 Words
    • 4 Pages
    Good Essays