Iphone Fraud Research Paper

Improved Essays
Final Exam
More than 700 million Iphones have been sold globally in 2015 (Costello). Iphones contain an unbelievable amount of personal information. From financial information, to emails, texts, photos, and passwords; imagine all that information being easily accessible to anyone. The FBI is currently trying to convince Apple to give them a “backdoor” to a particular phone. What the FBI fails to realize is how dangerous this could be for anyone else. Tim Cook, the chief executive of Apple, explains the consequences of creating the “backdoor” when he wrote:
The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices.

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Mitch Albom, author of “Mitch Albom: FBI vs. Apple about more than a phone”, builds an overall effective editorial that supports the readers point of view by fighting for the protection of our phone information. In this case, a man named Syed Farook, killed and injured several people, including his wife. The FBI believes that accessing information from his phone may be able to help them with their case. They order Apple to build a new software that will allow them to bust into phones by being able to guess passwords as many times as they want; as of now, someone can only guess a password 10 times before the information is lost. In court, the FBI fights that the law requires businesses not involved in the case, have to execute court orders.…

    • 1079 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief.…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The argument made by David Morris in FBI Will Help Local Police Unlock iPhones is that now that the FBI has the ability to crack into the data stored on iPhones, the agency will utilize this capability in many situations, including local law enforcement cases and federal counter-terrorism cases. More specifically, Morris argues that there will be an increased number of iPhones that are broken into in order to investigate crimes. He writes, “The agency has since unlocked other phones, and, CBS reports, now ‘owns the proprietary rights’ to its unlocking method.” In this passage, Morris suggests that this technique will become a common tactic in law enforcement, and Apple, while improving the security of their products, has to take the government’s…

    • 330 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Accessed 7 Mar. 2017. Landau, Susan. “The Real Security Issues of the IPhone Case.” Science, vol. 352, no. 6292, 17 June 2016, pp.…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dangerous Precedent

    • 985 Words
    • 4 Pages

    In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple to create software to unlock a phone of a terrorist, who “killed 14 people” in San Bernardino (Issa, Paragraph 2). In the article, through the use of rhetorical question, simile and statistical facts, Congressman Issa is able to effectively show the readers…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Right To Privacy

    • 1365 Words
    • 6 Pages

    I believe everyone can relate to this scenario while growing up; in school, one friend made a mistake or broke school's law and all other friends were also held accountable for one's misdeeds. Apple Vs FBI case from last year feels the same way. One bad guy happens to own an iPhone and commits a crime, and now, FBI wants a backdoor to the iOS operating system so that they can unlock any iPhone for investigation and save bad actors from doing bad things. Apple fulfilling FBI’s request will put hundreds of millions of people at security risk, and it will open the door for massive surveillance which is essentially contradicted the idea of right to privacy and First amendment right to expression. FBI seemed to undermine everything in the name of…

    • 1365 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Waiting is so unusual that many of us can 't stand in a queue for 30 seconds without getting out our phones to check for messages or to Google something. As a result, phones are the new generation. Phones present multiple tasks. Even though smart phones can be dangerous by causing accidents, affecting people’s health, and affecting people’s safety, smart phones are high in demand because they a main key to communication and two-thirds Americans use a smart phone.…

    • 775 Words
    • 4 Pages
    Improved Essays