Iphone Incident

Improved Essays
A terrorist attack left 14 people were killed and 22 people injured on December 2, 2015.
The San Bernardino shooting was a tragic event and the next step to getting things back to normal is opening Syed Rizwan Farook’s iphone. The only way to open the iphone is if the FBI and Apple work together.

On December 2, 2015 in San Bernardino, a holiday party was being celebrated at the Inland Regional Center. Then two people walked in the building walked into the building and opened gunfire. There were 14 people dead and 22 people were injured. The two suspects fled in a black car. Then it turned in a car chase with the police. During the car chase, there was traded gunfire. The suspects rolled the car, leaving one body in the street and one
…show more content…
The FBI believes Syed Rizwan Farook might have had contact with ISIS members or other terrorist groups. The FBI have backed up everything recent from Farook’s icloud. They are having trouble unlocking the iphone because there is a passcode. The FBI asked Apple to help them unlock the iphone by writing some new code, Apple refused. Apple designed the phone to be impossible to break into. When you open your iphone, you have 10 tries to open it and after you use all 10, the iphone will start to delete things and make you wait a small amount of time. The iphone let’s you make a password with as many numbers and letters as you want. Apple also made it impossible to hack into the iphone from a computer, you have to manually type in the passcode. The FBI wants Apple to write a code so they will be able to guess as many times as possible, Apple refused again. Apple then told the FBI that they made the iphone impossible to break into for customers privacy. Apple said that each iphone is set specifically for that user and only they know the code. The FBI then came back saying that they only want to open this one iphone and then delete the code. There could be potential terrorist contacts in that phone and other plans of what they were going to do. If there were terrorist contacts, that would help the government learn more about their tactics and what their plans are next so we can be ready to fight …show more content…
When it comes to unlocking the shooters iphone; Apple is willing to help, but they don’t want to create extra code. They believe that if they write a code it will make a “backdoor” for the FBI and hackers.If they write the code, they can help and unlock the iphone, but their company can be effected by it. If they create a “backdoor” the good guys can get in, but also can the bad guys. The FBI is saying that they want to create the code for the one phone then delete it. If Apple writes the code, then they can’t delete it because once you post something on the internet it will never go away. If Apple writes the code, it will reflect on their company forever. The code can potentially help hackers and terrorists because they can get into any iphone. The FBI is sending Apple a court order; Apple has to respond by February 26,

Related Documents

  • Decent Essays

    The IPhones parts and pieces are developed throughout the world to get just one IPhone. Today it is said to believe that Steve Jobs single handedly brought up his company from a garage. Without free enterprise his company would have not overtaken the country in such popularity. Apple believes in privacy of communication at the palm of your…

    • 279 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Syed Farook Shooting Dbq

    • 996 Words
    • 4 Pages

    Syed Rizwan Farook and Tashfeen Malik were believed to have planned the shooting in San Bernardino, California. They had gone to the shooting range days before they performed the planned shooting. During the shooting they gunned down fourteen people in the building. The survivors said that they only saw one gunman that was Syed Rizwan Farook his wife Tashfeen Malik was probably in the car waiting for him to get back. A FBI officer said that they had been radicalized for some time.…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The shooter was 64 years old.his name was Stephen Paddock. He lived in a retirement community in Mesquite, Nevada.59 people died and more than 500 injured . Omar Mateen was the shooter.49 people died and 50+ injured. It happened in a bar. It was the second biggest shooting.…

    • 186 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    They thought there might be information about the attack. The FBI should not force Apple to write a new software to unlock Syed Farook's Iphone because it violates the 4th Amendment. The 4th Amendment guarantees the right to privacy, and unreasonable searches and seizures. Although the fourth amendment does say that the government has a right to search personal property if its a warrantable cause, this does not say that third…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    If the FBI were to receive a way to access this private information, it will be like we are giving a hacker, or a criminal, a password to all devices. In the article Apple states “Building…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    On December 2, 2015, 14 people lost their lives and 22 people were injured when a terrorist attack occurred in San Bernardino. Both shooters were killed on the scene during a police shootout. However, one of the shooter’s iPhone was found on the scene of the crime.…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Some have tried to claim that it was dubious as to whether it was even possible for Apple to create a piece of software that performed what the FBI was demanding. This is a much more logically consistent counter argument because one cannot do the impossible, but the counter argument can be refuted via induction. Apple could automatically update iPhones without permission (Landau 1398). Apple has automatically updated iPhones without permission in the past (Landau 1398), and so Apple could do so again to install this back door. Also, based on the research lead by Dr. Choi (an expert in computer engineering), updates to the firmware of the smart phone could be utilized to create a back door program (39).…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    “The deadliest school shooting in U.S. history took place April 16th, 2007, when a gun man killed 32 people before killing himself at Virginia Tech, a public University in Blacksburg, Virginia.” (http://www.history.com/topics/columbine-high-school-shootings) On top of the 32 deaths that happened on this horrific day in our history, 17 people were wounded but survived. 30 of the deaths were students and 5 were faculty members of the university. Twenty-three year old Seung Hui Cho was heavily “armed with a 9-millimeter handgun, a 22-calliber handgun and hundreds of rounds of ammunition,” (http://www.history.com/this-day-in- history/massacre-at- virginia-tech-leaves-32-dead) and opened fire on the university he attended.…

    • 366 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    After all of that there was actually 1 more person. The same thing happened again and the police were after the 1 person. They found her she started shooting and running no one was able to hit her or get her so they got a sniper and shot her in the foot and then she fell trait to the ground, and the police got her and took her to jail and plus the one person had life in…

    • 413 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Dangerous Precedent

    • 985 Words
    • 4 Pages

    In the article titled “Forcing Apple to Hack That IPhone Sets a Dangerous Precedent”, Congressman Darrell Issa argues that protecting the privacy of millions of people should be more important that forcing Apple to unlock an iPhone that a terrorist used. Congressman Issa suggests that forcing Apple to create new software to unlock the device will put privacy of millions of people at risk. Congressman Issa writes this article in response to the controversial decision of the court to force Apple to create software to unlock a phone of a terrorist, who “killed 14 people” in San Bernardino (Issa, Paragraph 2). In the article, through the use of rhetorical question, simile and statistical facts, Congressman Issa is able to effectively show the readers…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    The source stated that “Comerford had people arriving at his home at odd hours, and he would come and go in the middle of the night.” The source provided the FBI with Comerford’s cell phone number and wireless provider. The FBI decided to corroborate the anonymous tip. The investigation made use of recently purchased surveillance technology known as “the Chum” that captures the IMSI of cellphones. IMSI-catching technology, such as the Chum, enables its users to obtain data from cell phones that reveals a phone’s location.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays