Iphone Security Attack Essay

Improved Essays
Background:
Recently, Apple was required to unlock a work-issued iPhone-5C to cooperate with FBI in a terrorist attack. However, Apple declined the request.

Apple’s attitude on encryption: Law enforcement agents around the country have already said they have hundreds of iPhones they want Apple to unlock if the FBI wins this case. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks. Of course, Apple would do our best to protect that key, but in a world where all of our data is under constant threat, it would be relentlessly attacked by hackers and cybercriminals. As recent attacks on the IRS systems and countless other data breaches have shown, no one is immune to cyberattacks.
…show more content…
In fact, we have a dedicated team that responds to these requests 24/7. We also provide guidelines on our website for law enforcement agencies so they know exactly what we are able to access and what legal authority we need to see before we can help them. For devices running the iPhone operating systems prior to iOS 8 and under a lawful court order, we have extracted data from an iPhone. We’ve built progressively stronger protections into our products with each new software release, including passcode-based data encryption, because cyberattacks have only become more frequent and more sophisticated. As a result of these stronger protections that require data encryption, we are no longer able to use the data extraction process on an iPhone running iOS 8 or later. Hackers and cybercriminals are always looking for new ways to defeat our security, which is why we keep making it

Related Documents

  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    And my evidence is that only about 51% say that is should be unlocked and about 39% people say that they should not unlocked the phone. But the Apple company is like they should not give the software to the FBI but if they lose the case they will have to unlock the phone. But then the Apple company is have trouble with the FBI but the Apple company has some rules so that they will not unlock the phone. I wonder if the Apple company will still make a updated phone so that the FBI will not get in people phone any more. But I hope the FBI will leave the Apple compon alone and just find some hacker to open it.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    All Writs Act Case Study

    • 1295 Words
    • 6 Pages

    Up until now, the FBI has been working closely with Apple to help gain information from the iPhone that was needed to help insure national security. However, recently the FBI wanted Apple to create a new form of IOS, Apple’s operating system, that would allow for the FBI to input a passcode electronically and deactivate the limited amount of times you can put in a passcode before you are forced to wait a set time period. The FBI has gotten a warrant for Apple to unlock the iPhone,…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Should Apple help the FBI? After the San bernardino shooting the FBI needed to get call files from the shooters phone. The FBI decided to go to Apple for help in getting those files. Unexpectedly Apple refused to decrypt the files and the FBI had to find another company.…

    • 299 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    Apple Vs FBI

    • 1982 Words
    • 8 Pages

    Potapchuk, John L. “A Second Bite at the Apple: Federal Courts' Authority to Compel Technical Assistance to Government Agents in Accessing Encrypted Smartphone Data, Under the All Writs Act.” Boston College School of Law, vol. 57, no. 4, 2016, pp. 1403–1446. ABI/INFORM Global, doi:10.2139/ssrn.2768374.…

    • 1982 Words
    • 8 Pages
    Brilliant Essays
  • Decent Essays

    Killer's Phones

    • 130 Words
    • 1 Pages

    The government is attempting to find information on a killer's phone according to the New York Times article In Nods to Law Enforcement in Apple Case, by Julian Sanchez. President Obama tries to end the straddle for privacy to divide. President Obama is trying to convince Apple to get into hacking a terrorist phone named Sayed Rizwan Farook, who resides in San Bernardino, California. The NY Post "Can an 18th Century Law Force Apple into Hacking Killer's Phone?" by Shear D. Michael…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    A cryptography writer and technologist, Bruce Schneier, spoke on the subject: “We have examples of the NSA going in and deliberately weakening security of things that we use so they can eavesdrop on particular targets.” He also posed the question: “Should we compromise the security of everybody in order to access the data of the few?” It was reported that 90 percent of the people that are effected by the NSA’s methods and are caught in their dragnet of surveillance are innocent citizens.…

    • 1003 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Intro: In this essay I will give a brief overview of U.S Governments request to apple in conjunction with Tim Cook’s argument. Furthermore, I will provide my own opinion on the matter with support from the All Writs Act and the publics opinions, after reference to David Friedman about his views on privacy. Summary of Cook’s Argument: Tim Cook, Apple C.E.O has made a public announcement in regards to the U.S Government’s request to create an Apple Iphone “backdoor.”…

    • 1314 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Apple and the FBI are in a dispute over whether or not Apple should unlock one of the San Bernardino shooters phones in order to obtain personal records regarding potential terrorist activity. Apple believes they should not have to disclose this information and unlock the phone because it violates their “terms and agreements”. However, the FBI thinks Apple should unlock the phone because it will let them retain vital and personal information about the shooters. According to CNN writer Mike Rodgers, “The FBI was unable to access the encrypted smartphone to map the terrorist's connections to ISIS…” The FBI asked apple for help but they refused.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As the article, “That’s No Phone. That’s My Tracker” points out, the government is already exploiting the extensive usage of cell phones to gather data (Peter, Rajagopalan). Such projects as the Patriot Act and PRISM that grant the government unprecedented access to cellular data without consent pose a serious threat to the free world as it is known today. Certainly a day when the government will begin to invade the camera feeds of cell phones is just around the corner at the rate society is currently…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Superior Essays

    During his time dedicated to research, it was revealed that Apple thinks negatively upon the concept of jail-breaking. Apple employees and the Apple community inform their customers that jail-breaking their product is illegal, unethical and a bad decision. However, Wu found out that the action of unlocking his cell phone is in fact legal, and to many technologically sound people it is considered both ethical and a good decision. In my own experiences I have found many of these sentiments regarding jail-breaking…

    • 714 Words
    • 3 Pages
    Superior Essays
  • Decent Essays

    After the Patriot Act people were worried about their government watching their every move. 9/11 made people terrified of terrorists and willing to harm innocent people because of their race/ religion. But, when they have people who have been proven guilty of terrorism, they are not willing to let the government into their phones to catch more terrorists. The government has a warrant to search the iphone of Syed Farook but Apple won't allow it. Their claim is that they want to protect the privacy of their customers, but do they want to protect the pedophills and terrorists who harm thousands of people?…

    • 123 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    (Jayakumar, Tahora, 2016) In Apple attitude, the protection and privacy of Apple’s customers and partners estimated at least 1 billion devices (Statt, 2016) dictate their refusal based on the amount of the good for the largest amount of people. Similarly, rights of the users to choose privacy and the integrity of Apple to provide secure and encrypted products to its customers. Moreover, Apple competitive advantages, costs, and level of effort to build a backdoor to the iPhone could have future negative consequences on consumers’ expectations, sentiments, and trust. (Jayakumar, Tahora,…

    • 1298 Words
    • 6 Pages
    Great Essays