Case Study Of Cook's Dilemmas

Superior Essays
The dilemmas Cook faced, discussed in the case study (Jayakumar & Tahora, 2016), were as follows:Unlocking the terrorist’s iPhone and building a backdoor for the national security – Cook and Apple faced a dilemma in helping the U.S. government and the FBI unlock the iPhone of one of the terrorists who attacked victims in San Bernardino, California that had potential to reveal the terrorist’s motives of the attack as well as evidences of terrorist networks and trails of activities (Jayakumar & Tahora, 2016). Unlocking the iPhone became such a heated dispute because the terrorists had tried to destroy evidences that could turn into revealing their digital trace, and the iPhone, issued by the terrorist’s employer, San Bernardino County, was found …show more content…
government”Points in Cook’s open letter to Apple’s customer in response to the court order for the iPhone– While overlapping with the points discussed previously, Cook’s letter and the key points expressed from Apple’s perspective well illustrate Cook’s dilemmas (Jayakumar & Tahora, 2016):oThe U.S. government demanded Apple to create the backdoor to the iPhone the company didn’t have or considered too dangerous to create (as cited in Jayakumar & Tahora, 2016). This touches the dilemma Cook had between customer privacy or national security.oThe software the FBI wanted Apple to create for the terrorist’s iPhone had the potential to unlock any iPhone regardless of possession (as cited in Jayakumar & Tahora, 2016). This puts Cook in such dilemma that even international terror groups can exploit the U.S. government’s classified information. oThere was no guarantee that the use of the backdoor would be limited to the San Bernardino case (as cited in Jayakumar & Tahora, 2016). This presented another dilemma for Cook because this might open the flood gate.oBuilding the backdoor defeated the purpose of encryption (as cited in Jayakumar & Tahora, 2016). This would make Cook defensive as to why tech companies even needed encryption to begin with.oApple worked such hard to treat its customers’ privacy seriously, believing the contents of iPhone were not the company’s business (as cited in Jayakumar & Tahora, 2016). This might have forced Cook to face hard dilemma because it created conflicts with the company’s business model and brand’s marketing image.oIt created such moral dilemma for Cook because his engineers had worked to build strong security features in iPhone to protect customers’ privacy in the past, and now they were demanded to weaken the strong security features and force the customers unsafe (as

Related Documents

  • Improved Essays

    In the Text, “Why Cook?” by Michael Pollan, a question was never asked, only an answer given: Cook. This statement directly explains what the entire excerpt would be about. The author, Michael Pollan, not only has a background of cooking, but has written many articles about it. Therefore, he is very qualified to speak about the subject of cooking. Pollan chose the audience very directly when he said, “. . .…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Bryce Hickle Prof. Whitaker Rhetoric 14 March 2017 Apple v. FBI: Apple should have complied Syed Farook is one of the terrorists involved in the massacre that took place in San Bernardino in 2015 which resulted in the murder of fourteen people. Apple v. FBI was a legal dispute involving whether or not Apple should comply with a warrant demanding them to install a back door program into this dead terrorist’s cellphone. People who defended Apple’s position had made claims stating that it was legal for Apple to choose not to comply and that making a back door program would be either not possible, dangerous, or both. However, these statements are not true. Not only was it possible for Apple to comply with the FBI’s demands without endangering…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    Iphones, Inc. Case Study

    • 1642 Words
    • 7 Pages

    A very recent topic that has been circulating in the news is the topic of the FBI and the company known as Apple. Apple is known for its many products ranging from iPhones, MacBook’s, and watches that most of you, I imagine, have. The controversy surrounds an iPhone 5c that was found to be the work phone of one of the two Islamic San Bernardino terrorists. The FBI is requesting that Apple creates a backdoor to install on the phone to disable its security features. Apple does not want to do this for privacy reasons.…

    • 1642 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Apple Vs Fbi Essay

    • 521 Words
    • 3 Pages

    The issue of “Apple V.S The FBI” is should Apple create a program that can break into a terrorist phone. This is an issue because this could solve many terrorist problems but could also compromise the personal info and safety of Apple customers. From the reading “Apple VS The FBI” that “People's phones are a record of their most intimate thoughts and personal information”(Smith 7). This means that people's phones can hold personal information including financial records, friends, addresses, location data, personal photos and more”(Smith 7).…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Dangerous Precedent

    • 985 Words
    • 4 Pages

    In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple to create software to unlock a phone of a terrorist, who “killed 14 people” in San Bernardino (Issa, Paragraph 2). In the article, through the use of rhetorical question, simile and statistical facts, Congressman Issa is able to effectively show the readers…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Intro: In this essay I will give a brief overview of U.S Governments request to apple in conjunction with Tim Cook’s argument. Furthermore, I will provide my own opinion on the matter with support from the All Writs Act and the publics opinions, after reference to David Friedman about his views on privacy. Summary of Cook’s Argument: Tim Cook, Apple C.E.O has made a public announcement in regards to the U.S Government’s request to create an Apple Iphone “backdoor.”…

    • 1314 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    It’s going to be tough for the FBI to force Apple to give them a backdoor to people’s privacy information because if we think about it there isn’t any real…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In Defense of Apple Recently, there's been a dispute between Apple and the FBI. The reason this argument started was due to the mass attack on San Bernardino, California last year. Due to this, there is a discussion about whether a person’s rights outweighs national security. Here, an individual’s rights far outweigh national security, even if the individual in question commits a morally reprehensible act.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The current Apple case doesn’t involve a backdoor in the traditional sense. The FBI is asking Apple to create a tool that would circumvent a feature that deletes all of the information on the phone after 10 failed password attempts. Apple doesn’t want to break anyone’s encryption or set a master key loose on the land. Also, the authority over the master key that Apple would grant the FBI could be used again across a range of scenarios that weaken Apple’s privacy and security as well. 5.…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays