SlideShare a Scribd company logo
1 of 5
Computer & Society
“Apple vs. FBI”
Instructor : Dr.Riham AbdelKader
Assistants:
Mr.Ali Ghosn
Ms.Madona Zankar
Course # : Cmps325
Hani Abdallah
201601941
vs
The Problem :
The FBI recovered an Apple iPhone 5C—owned by the San Bernardino County,
California government—that had been issued to its employee, Syed Rizwan Farook, one of the
shooters involved in the December 2015 San Bernardino attack. The attack killed 14 people and
seriously injured 22. The two attackers died four hours after the attack in a shootout with police,
having previously destroyed their personal phones. Despite having recovered Farook's work
phone, the authorities were at a loss, for it had been locked with a four-digit password and was
also programmed to automatically delete all its data after ten failed password attempts.
On February 9, 2016, the FBI announced that it was unable to unlock the county-owned phone it
recovered, due to its advanced security features, including encryption of user data. The FBI first
asked the National Security Agency to break into the phone, but they were unable to since they
only had knowledge of breaking into other devices that are commonly used by criminals, and not
iPhones. As a result, the FBI asked Apple Inc. to create a new version of the phone’s IOS
operating system that could be installed and run in the phone’s random access memory to disable
certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which
required it to never undermine the security features of its products. The FBI responded by
successfully applying to a United States magistrate judge, Sheri Pym, to issue a court order,
mandating Apple to create and provide the requested software.
Pros:
1- Help ensure and guarantee more security in the country.
2- Help to predict citizen social behavior by monitoring citizens.
3- Stop hateful and bad ideas from spreading on social media.
4- Guarantee a civilized and secure community.
Cons :
1- Not respecting the privacy of each individual.
2- Oppose against apple regulations and rules.
3- Cracking into 1 device will allow to get into more and more devices.
4- These private data could be stolen or sold to another parties.
5- Make Apple customers lose trust with Apple as a company.
vs
ETHICAL THE RIS :
vs
Kantianism:
-Rule 1: Its unacceptable , because by giving the FBI access to user iPhones we are no more
respecting the privacy of these users.
-Rule 2 : Its unacceptable , because if Apple gave access to FBI , Apple would be using users
privacy in order to satisfy FBI needs.
Social Contract Theory:
It’s unacceptable by the social contract theory , since Apple as a company has rules and privacy
policies and its to protect and ensure the data privacy of all its customers so giving access to user
data will be against Apple rules and policies.
Utilitarianism:
-Act: Its acceptable because the good in giving access to FBI is more than the bad since ensuring
a secure and protected environment is more important than caring about users privacy.
-Rule: Its acceptable because on long term the society will be more secure for every citizen to
live in , ensuring more civilized community.
vs
Point of view:
Apple was right for not giving access to FBI to access their phones even if they was asking
for one time entry , because this would lead to more and more accesses in the future which
will be against the right of privacy for apple customers and what apple promised for.

More Related Content

What's hot

Apple Inc. Analysis for Strategy Class
Apple Inc. Analysis for Strategy ClassApple Inc. Analysis for Strategy Class
Apple Inc. Analysis for Strategy ClassTadas Labudis
 
Apple Case Study.pptx
Apple Case Study.pptxApple Case Study.pptx
Apple Case Study.pptxsdfasd14
 
Apple - PESTEL Analysis
Apple - PESTEL AnalysisApple - PESTEL Analysis
Apple - PESTEL AnalysisSuyash Birje
 
Assessment of Apple's (sustainable?) competitive position / competitive advan...
Assessment of Apple's (sustainable?) competitive position / competitive advan...Assessment of Apple's (sustainable?) competitive position / competitive advan...
Assessment of Apple's (sustainable?) competitive position / competitive advan...Alexander Georgi
 
Apple Inc.
Apple Inc.Apple Inc.
Apple Inc.akhfkjaf
 
Apple in 2010 - Harvard Case Analysis
Apple in 2010 - Harvard Case AnalysisApple in 2010 - Harvard Case Analysis
Apple in 2010 - Harvard Case AnalysisVivek Mehta
 
Airborne presentation
Airborne presentationAirborne presentation
Airborne presentationYamna Rashid
 
Apple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisApple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisKatherine Fitzsimmons
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
Southwest Airlines in Baltimore
Southwest Airlines in BaltimoreSouthwest Airlines in Baltimore
Southwest Airlines in BaltimorePutri Arinda
 

What's hot (20)

Apple Inc.
Apple Inc.Apple Inc.
Apple Inc.
 
Android VS IOS
Android VS IOSAndroid VS IOS
Android VS IOS
 
The Apple Story
The Apple StoryThe Apple Story
The Apple Story
 
Apple Inc. Analysis for Strategy Class
Apple Inc. Analysis for Strategy ClassApple Inc. Analysis for Strategy Class
Apple Inc. Analysis for Strategy Class
 
Apple Incorporation
Apple Incorporation Apple Incorporation
Apple Incorporation
 
Apple Case Study.pptx
Apple Case Study.pptxApple Case Study.pptx
Apple Case Study.pptx
 
Apple - PESTEL Analysis
Apple - PESTEL AnalysisApple - PESTEL Analysis
Apple - PESTEL Analysis
 
Assessment of Apple's (sustainable?) competitive position / competitive advan...
Assessment of Apple's (sustainable?) competitive position / competitive advan...Assessment of Apple's (sustainable?) competitive position / competitive advan...
Assessment of Apple's (sustainable?) competitive position / competitive advan...
 
iPhone
iPhone iPhone
iPhone
 
Business risk(1)
Business risk(1)Business risk(1)
Business risk(1)
 
Apple Inc.
Apple Inc.Apple Inc.
Apple Inc.
 
Apple
AppleApple
Apple
 
Apple in 2010 - Harvard Case Analysis
Apple in 2010 - Harvard Case AnalysisApple in 2010 - Harvard Case Analysis
Apple in 2010 - Harvard Case Analysis
 
Airborne presentation
Airborne presentationAirborne presentation
Airborne presentation
 
Apple strategic analysis
Apple strategic analysisApple strategic analysis
Apple strategic analysis
 
Apple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisApple Strategic Management Case Analysis
Apple Strategic Management Case Analysis
 
Apple Marketing Analysis
Apple Marketing AnalysisApple Marketing Analysis
Apple Marketing Analysis
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Ios vs android
Ios vs androidIos vs android
Ios vs android
 
Southwest Airlines in Baltimore
Southwest Airlines in BaltimoreSouthwest Airlines in Baltimore
Southwest Airlines in Baltimore
 

Similar to FBI–Apple encryption dispute

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxannettsparrow
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxvrickens
 
iPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradediPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradedmariuse18nolet
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprisecentralohioissa
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!iFixScreens
 
Presentation3
Presentation3Presentation3
Presentation3ChantallD
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
Mobile app privacy
Mobile app privacyMobile app privacy
Mobile app privacyLeo Lau
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101Lookout
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?SpymasterPro1
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 

Similar to FBI–Apple encryption dispute (20)

Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docx
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docxiPhone dilemmaThis is a discussion of a case. You will be graded.docx
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
 
iPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be gradediPhone dilemmaThis is a discussion of a case. You will be graded
iPhone dilemmaThis is a discussion of a case. You will be graded
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
cabao
cabaocabao
cabao
 
Presentation3
Presentation3Presentation3
Presentation3
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
File000092
File000092File000092
File000092
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Mobile app privacy
Mobile app privacyMobile app privacy
Mobile app privacy
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
How to view search history on iPhone?
How to view search history on iPhone?How to view search history on iPhone?
How to view search history on iPhone?
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

FBI–Apple encryption dispute

  • 1. Computer & Society “Apple vs. FBI” Instructor : Dr.Riham AbdelKader Assistants: Mr.Ali Ghosn Ms.Madona Zankar Course # : Cmps325 Hani Abdallah 201601941
  • 2. vs The Problem : The FBI recovered an Apple iPhone 5C—owned by the San Bernardino County, California government—that had been issued to its employee, Syed Rizwan Farook, one of the shooters involved in the December 2015 San Bernardino attack. The attack killed 14 people and seriously injured 22. The two attackers died four hours after the attack in a shootout with police, having previously destroyed their personal phones. Despite having recovered Farook's work phone, the authorities were at a loss, for it had been locked with a four-digit password and was also programmed to automatically delete all its data after ten failed password attempts. On February 9, 2016, the FBI announced that it was unable to unlock the county-owned phone it recovered, due to its advanced security features, including encryption of user data. The FBI first asked the National Security Agency to break into the phone, but they were unable to since they only had knowledge of breaking into other devices that are commonly used by criminals, and not iPhones. As a result, the FBI asked Apple Inc. to create a new version of the phone’s IOS operating system that could be installed and run in the phone’s random access memory to disable certain security features that Apple refers to as "GovtOS". Apple declined due to its policy which required it to never undermine the security features of its products. The FBI responded by successfully applying to a United States magistrate judge, Sheri Pym, to issue a court order, mandating Apple to create and provide the requested software.
  • 3. Pros: 1- Help ensure and guarantee more security in the country. 2- Help to predict citizen social behavior by monitoring citizens. 3- Stop hateful and bad ideas from spreading on social media. 4- Guarantee a civilized and secure community. Cons : 1- Not respecting the privacy of each individual. 2- Oppose against apple regulations and rules. 3- Cracking into 1 device will allow to get into more and more devices. 4- These private data could be stolen or sold to another parties. 5- Make Apple customers lose trust with Apple as a company. vs
  • 4. ETHICAL THE RIS : vs Kantianism: -Rule 1: Its unacceptable , because by giving the FBI access to user iPhones we are no more respecting the privacy of these users. -Rule 2 : Its unacceptable , because if Apple gave access to FBI , Apple would be using users privacy in order to satisfy FBI needs. Social Contract Theory: It’s unacceptable by the social contract theory , since Apple as a company has rules and privacy policies and its to protect and ensure the data privacy of all its customers so giving access to user data will be against Apple rules and policies. Utilitarianism: -Act: Its acceptable because the good in giving access to FBI is more than the bad since ensuring a secure and protected environment is more important than caring about users privacy. -Rule: Its acceptable because on long term the society will be more secure for every citizen to live in , ensuring more civilized community.
  • 5. vs Point of view: Apple was right for not giving access to FBI to access their phones even if they was asking for one time entry , because this would lead to more and more accesses in the future which will be against the right of privacy for apple customers and what apple promised for.