Iphone Abuse Research Paper

Decent Essays
A lot of crimes have been committed in the United States and around the world in which an IPhone is involved. In some instances the Iphone has a lot of evidence which can help solve the case but law enforcement officers such as the FBI are not able to get access to the phone because of its powerful encryption. It is very frustrating on the part of the FBI because they know that since the phone is an Apple product, Apple can give them access to penetrate the phone but Apple is unwilling to compromise. In some instances The FBI has passed through the court to force Apple to open the phone for them but they have not succeeded. One point of view is that Apple should not be refusing to unlock iPhone when it comes to criminal matter because by doing

Related Documents

  • Superior Essays

    History has allowed for police officers to search an arrestee’s person and vehicle without a warrant under certain circumstances. However, under the Fourth Amendment, is it constitutional for police officers to search through electronic data and information instilled in a cellphone? A cellphone may contain evidence pertaining to crimes, but cellphones also hold an immense amount of personal information of not only the owner’s, but of other people as well. Riley v. California seeks to establish a fine line between law enforcement and the protection of privacy.…

    • 942 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    David Riley Case

    • 528 Words
    • 3 Pages

    In today’s generation cell phones are now like pocket computers that are overloaded with immense amounts of private information. The material stored in cell phones cannot be compared to other routine items, like wallets, that are usually seized during an arrest. If the arresting officer really felt the need to search the contents of the cell phone, then a “police officer can e-mail warrant request to judges […] [and] judges have signed such warrants and e-mailed them back to officers in less than 15 minutes”. Consequently, the evidence obtained from Riley’s smart phone is in violation of his Fourth Amendment…

    • 528 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    4th Amendment Case Study

    • 276 Words
    • 2 Pages

    The FBI has been trying to hack Syed Farook’s iPhone but Apple would not allow them due to the 4th amendment. “Basic American rights were at stake, and the purpose of the law is to protect people’s rights” (Tribune News Service). That information shows how the FBI would be going against one of the rights listed in the constitution. Furthermore, customers could have…

    • 276 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Potapchuk, John L. “A Second Bite at the Apple: Federal Courts' Authority to Compel Technical Assistance to Government Agents in Accessing Encrypted Smartphone Data, Under the All Writs Act.” Boston College School of Law, vol. 57, no. 4, 2016, pp. 1403–1446. ABI/INFORM Global, doi:10.2139/ssrn.2768374.…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    The device happened to be an Apple product, which are specially designed to protect their consumer’s privacy. Therefore, a federal judge ordered the company to assist law enforcement with the “cracking” of the suspect’s phone. Tim Cook, the CEO of Apple, responded to the judge by rejecting the order. They rejected the order fearing that if they made an acceptation and invaded the privacy of one customer, then other customers would no longer find their products appealing.…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    4th Amendment

    • 1476 Words
    • 6 Pages

    In the article “Can Your Phone Testify Against You” in the New York Times UPFRONT written by Patricia Smith she states that “Chief Justice Roberts acknowledged that the ruling will make things harder for police. Cell phones can provide valuable incriminating information about dangerous criminals he wrote but, he emphasized, privacy comes with a cost.” An example of how this can be useful is when a person wants to rob a bank or bomb a place. They might have some information that can help law enforcement stop them from committing the crime or can help catch them if they do commit the crime. Important information like where to meet up, where they are going to buy supplies, what day it’s going to happen and why they are doing it is all the information that they say should not be considered private and can be used to stop future crimes.…

    • 1476 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    United States Vs. Apple Inc. In February of 2016 the court case of the United States vs. Apple came heavily into headlines. Earlier in the year the FBI had issued an order to apple for the help of unlocking the phone of a terrorist that killed 14 and injured 22 people. Apple declined the order on the basis's of breaking user privacy and the excessive efforts that would be required to by the current encryption codes.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The current Apple case doesn’t involve a backdoor in the traditional sense. The FBI is asking Apple to create a tool that would circumvent a feature that deletes all of the information on the phone after 10 failed password attempts. Apple doesn’t want to break anyone’s encryption or set a master key loose on the land. Also, the authority over the master key that Apple would grant the FBI could be used again across a range of scenarios that weaken Apple’s privacy and security as well. 5.…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Honestly, we are able to have a say to it. Apple should give into the FBI and should not to the government’s orders to break into their own devices. Apple is representing us as citizens, so they should help the citizens and decline assisting the FBI. Apple as a business should guarantee the safety and privacy of users information because it is confidential and should not be released without users’ permission. The government wielding too much power in that way would make way for a lot of potential abuse cases, especially when it comes down to accusing someone of being a terrorist and having their private information released just to see whether or not it is true.…

    • 1219 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Android Security Essay

    • 1462 Words
    • 6 Pages

    Analysis of Android Security 2. Application Signing and Distribution • ANDROID- Application signing is done to maintain the identity of the author or the developer of the application. Google ensures that the author or the vendor of the application signs the application with their key as their identity. Developers are required to sign their applications digitally using their private key and through this signature, trust is developed between Google and developers.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Waiting is so unusual that many of us can 't stand in a queue for 30 seconds without getting out our phones to check for messages or to Google something. As a result, phones are the new generation. Phones present multiple tasks. Even though smart phones can be dangerous by causing accidents, affecting people’s health, and affecting people’s safety, smart phones are high in demand because they a main key to communication and two-thirds Americans use a smart phone.…

    • 775 Words
    • 4 Pages
    Improved Essays